<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/401-access-denied/" rel="self" type="application/rss+xml"/><title><![CDATA[401 Access Denied]]></title><podcast:guid>5ab5a8e9-2e15-534d-b0e6-84dc8972bfc5</podcast:guid><lastBuildDate>Wed, 19 Feb 2025 12:36:17 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2025 Delinea]]></copyright><managingEditor>Delinea</managingEditor><itunes:summary><![CDATA[Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. 

Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. 

Joe will be speaking with current leaders and experts in the IT and Cybersecurity fields discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent. 

Whether you want to learn more about the latest hacking techniques, or navigate how to become a CISO, stay up to date with discussions and insight from the experts. ]]></itunes:summary><image><url>https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg</url><title>401 Access Denied</title><link><![CDATA[https://delinea.com/events/podcasts]]></link></image><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><itunes:owner><itunes:name>Delinea</itunes:name></itunes:owner><itunes:author>Delinea</itunes:author><description>Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023&apos;s Best Tech Podcast by TMCnet. 

Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea&apos;s ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. 

Joe will be speaking with current leaders and experts in the IT and Cybersecurity fields discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent. 

Whether you want to learn more about the latest hacking techniques, or navigate how to become a CISO, stay up to date with discussions and insight from the experts. </description><link>https://delinea.com/events/podcasts</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Education"></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/401-access-denied/</itunes:new-feed-url><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>401 Access Denied Podcast Ep. 126 | Power of Brand and Communications in Cybersecurity with George Kamide</title><itunes:title>401 Access Denied Podcast Ep. 126 | Power of Brand and Communications in Cybersecurity with George Kamide</itunes:title><description><![CDATA[<p>Cybersecurity isn’t just an IT issue—it’s a societal challenge. In this special episode of <em>401 Access Denied</em>, Joseph Carson sits down with <em>Bare Knuckles and Brass Tacks</em> host, George Kamide, to discuss how branding, community building, and effective communication are reshaping the cybersecurity landscape. From the power of podcasts in education to the critical role of user experience, they explore what it takes to stand out and build meaningful connections in a digital world. Tune in for a conversation that goes beyond security to uncover the human side of the industry.</p><p><strong>Connect with George:</strong></p><p><a href="https://www.bareknucklespod.com/" rel="noopener noreferrer" target="_blank">https://www.bareknucklespod.com/</a></p><p><a href="https://www.linkedin.com/in/george-kamide/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/george-kamide/</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Cybersecurity isn’t just an IT issue—it’s a societal challenge. In this special episode of <em>401 Access Denied</em>, Joseph Carson sits down with <em>Bare Knuckles and Brass Tacks</em> host, George Kamide, to discuss how branding, community building, and effective communication are reshaping the cybersecurity landscape. From the power of podcasts in education to the critical role of user experience, they explore what it takes to stand out and build meaningful connections in a digital world. Tune in for a conversation that goes beyond security to uncover the human side of the industry.</p><p><strong>Connect with George:</strong></p><p><a href="https://www.bareknucklespod.com/" rel="noopener noreferrer" target="_blank">https://www.bareknucklespod.com/</a></p><p><a href="https://www.linkedin.com/in/george-kamide/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/george-kamide/</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">a06be4b5-a112-42f3-8563-8c823d0a04fe</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 19 Feb 2025 07:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f9497ade-0d27-488a-967f-b249339eb90e/401-access-denied-ep126.mp3" length="44050669" type="audio/mpeg"/><itunes:duration>30:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>126</itunes:episode><podcast:episode>126</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 125 | Balancing Security and Availability in Cybersecurity with Wenzel Huettner</title><itunes:title>401 Access Denied Podcast Ep. 125 | Balancing Security and Availability in Cybersecurity with Wenzel Huettner</itunes:title><description><![CDATA[<p>Cyber threats are evolving—are your defenses keeping up? In this episode of&nbsp;<em>401 Access Denied</em>, host Joe Carson sits down with Wenzel Huettner, CEO and co-founder of Defend, to explore the future of cybersecurity. From the rise of Zero Trust to the critical role of incident response, they break down what organizations need to know to stay secure. Don’t miss this insightful discussion on building a resilient security strategy while keeping friction low. Tune in now!</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Cyber threats are evolving—are your defenses keeping up? In this episode of&nbsp;<em>401 Access Denied</em>, host Joe Carson sits down with Wenzel Huettner, CEO and co-founder of Defend, to explore the future of cybersecurity. From the rise of Zero Trust to the critical role of incident response, they break down what organizations need to know to stay secure. Don’t miss this insightful discussion on building a resilient security strategy while keeping friction low. Tune in now!</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">8f1b0f06-af35-4165-a626-6d1c8732e56d</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 05 Feb 2025 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/49e50eeb-b66f-49a1-a67a-c32fa0a10ec1/401-access-denied-ep125.mp3" length="57871534" type="audio/mpeg"/><itunes:duration>40:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>125</itunes:episode><podcast:episode>125</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 124 | 2025 State of Cybersecurity with Dan Lohrmann</title><itunes:title>401 Access Denied Podcast Ep. 124 | 2025 State of Cybersecurity with Dan Lohrmann</itunes:title><description><![CDATA[<p>As cybersecurity threats evolve, staying ahead is more critical than ever. In this episode, Joe Carson welcomes back Dan Lohrmann to discuss what 2025 holds—from the rise of agentic AI to deepfakes, social engineering, and shifting regulatory pressures. They explore proactive security measures, the impact of global dynamics like US-China relations, and why continuous learning is key to staying protected.</p><p>Don't miss this insightful discussion packed with expert analysis and strategies to navigate the future of cybersecurity.</p><p><strong>Resources:</strong></p><ul><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.govtech.com%2Fblogs%2Flohrmann-on-cybersecurity%2Fthe-top-25-security-predictions-for-2025-part-1&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522078601%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=86o6l%2Fe0DYCf7ZFerZItl0TFUgRvTd7nfqP9LaxtbH8%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-25-security-predictions-for-2025-part-1</a></li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.govtech.com%2Fblogs%2Flohrmann-on-cybersecurity%2Fthe-top-25-security-predictions-for-2025-part-2&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522108427%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=6widMv4H72Z3%2BpZpfpqf7OgKH9Df9hQXDMfWsON0yBw%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-25-security-predictions-for-2025-part-2</a>&nbsp;</li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.amazon.com%2FCyber-Mayday-Day-After-Disruptions%2Fdp%2F1119835305&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522125138%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=bniWKTsvEef07N3lYG1Xkii3YayFBNp8rnhOvG3Vmjg%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305</a></li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.govtech.com%2Fblogs%2Flohrmann-on-cybersecurity&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522141338%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=UAF36Xpar%2F3I401k1RLB%2BdgCwOwE8sUJYTrskXRvNnc%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.govtech.com/blogs/lohrmann-on-cybersecurity</a>&nbsp;</li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.csoonline.com%2Fprofile%2Fdan-lohrmann%2F&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522156946%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=VxODSHneQ%2BUDJe9O1s06PG8nkrDPBnOMksXqddFJL5g%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/profile/dan-lohrmann/</a>&nbsp;</li></ul><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a...]]></description><content:encoded><![CDATA[<p>As cybersecurity threats evolve, staying ahead is more critical than ever. In this episode, Joe Carson welcomes back Dan Lohrmann to discuss what 2025 holds—from the rise of agentic AI to deepfakes, social engineering, and shifting regulatory pressures. They explore proactive security measures, the impact of global dynamics like US-China relations, and why continuous learning is key to staying protected.</p><p>Don't miss this insightful discussion packed with expert analysis and strategies to navigate the future of cybersecurity.</p><p><strong>Resources:</strong></p><ul><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.govtech.com%2Fblogs%2Flohrmann-on-cybersecurity%2Fthe-top-25-security-predictions-for-2025-part-1&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522078601%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=86o6l%2Fe0DYCf7ZFerZItl0TFUgRvTd7nfqP9LaxtbH8%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-25-security-predictions-for-2025-part-1</a></li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.govtech.com%2Fblogs%2Flohrmann-on-cybersecurity%2Fthe-top-25-security-predictions-for-2025-part-2&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522108427%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=6widMv4H72Z3%2BpZpfpqf7OgKH9Df9hQXDMfWsON0yBw%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-25-security-predictions-for-2025-part-2</a>&nbsp;</li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.amazon.com%2FCyber-Mayday-Day-After-Disruptions%2Fdp%2F1119835305&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522125138%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=bniWKTsvEef07N3lYG1Xkii3YayFBNp8rnhOvG3Vmjg%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305</a></li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.govtech.com%2Fblogs%2Flohrmann-on-cybersecurity&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522141338%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=UAF36Xpar%2F3I401k1RLB%2BdgCwOwE8sUJYTrskXRvNnc%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.govtech.com/blogs/lohrmann-on-cybersecurity</a>&nbsp;</li><li><a href="https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.csoonline.com%2Fprofile%2Fdan-lohrmann%2F&amp;data=05%7C02%7CJoseph.Carson%40delinea.com%7Cdecbb882d1594a94dfb208dd3a27f478%7C18d6ed03f0e5486183d2bb7b6c7c2bb2%7C0%7C0%7C638730665522156946%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=VxODSHneQ%2BUDJe9O1s06PG8nkrDPBnOMksXqddFJL5g%3D&amp;reserved=0" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/profile/dan-lohrmann/</a>&nbsp;</li></ul><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">e33150ce-047c-4181-b3c9-5b3a9a1e4867</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 22 Jan 2025 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5b5e57a9-7537-4b2e-8fae-7cece84e7f47/401-access-denied-ep124.mp3" length="59271488" type="audio/mpeg"/><itunes:duration>41:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>124</itunes:episode><podcast:episode>124</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/faa62ec1-9a74-4341-9f92-addbcc49bb13/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 123 | Securing Tomorrow: What to Expect for Cybersecurity in 2025 with Wendy Nather</title><itunes:title>401 Access Denied Podcast Ep. 123 | Securing Tomorrow: What to Expect for Cybersecurity in 2025 with Wendy Nather</itunes:title><description><![CDATA[<p>In an ever-evolving digital landscape, how do organizations build resilience against cyber threats? In this episode, Wendy Nather, a renowned expert in cybersecurity strategy, joins us to explore what it means to think differently about security. From fostering collaboration to embracing innovative approaches, Wendy offers thought-provoking insights that challenge conventional wisdom and inspire forward-thinking solutions. Tune in for a lively and enlightening conversation that will leave you eager to rethink your own approach to cybersecurity.</p><p><strong>Key Takeaways:</strong></p><ol><li>The importance of fostering a collaborative security culture across teams and organizations.</li><li>Innovative strategies for building resilience against emerging cyber threats.</li><li>Why traditional security models may no longer be enough in today’s digital world.</li><li>Actionable insights to rethink and enhance your approach to cybersecurity.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In an ever-evolving digital landscape, how do organizations build resilience against cyber threats? In this episode, Wendy Nather, a renowned expert in cybersecurity strategy, joins us to explore what it means to think differently about security. From fostering collaboration to embracing innovative approaches, Wendy offers thought-provoking insights that challenge conventional wisdom and inspire forward-thinking solutions. Tune in for a lively and enlightening conversation that will leave you eager to rethink your own approach to cybersecurity.</p><p><strong>Key Takeaways:</strong></p><ol><li>The importance of fostering a collaborative security culture across teams and organizations.</li><li>Innovative strategies for building resilience against emerging cyber threats.</li><li>Why traditional security models may no longer be enough in today’s digital world.</li><li>Actionable insights to rethink and enhance your approach to cybersecurity.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">29df25cf-56f0-4bb9-ad31-f38033d75d7a</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 08 Jan 2025 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/68bc49d1-2b86-43c0-8cd0-403a09bac70c/401-access-denied-ep123.mp3" length="51229745" type="audio/mpeg"/><itunes:duration>35:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>123</itunes:episode><podcast:episode>123</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 122 | Top Trends &amp; Future of Cybersecurity with Frank Vukovits</title><itunes:title>401 Access Denied Podcast Ep. 122 | Top Trends &amp; Future of Cybersecurity with Frank Vukovits</itunes:title><description><![CDATA[<p>In the latest episode of <em>401 Access Denied</em>, host Joseph Carson and cybersecurity expert Frank Vukovits examine 2024’s top cybersecurity trends and what lies ahead. They discuss evolving ransomware tactics, AI's dual role in defense and attack, the skills gap, and quantum computing's threat to encryption. Key topics include cloud security, AI governance, identity protection, and data privacy regulations, offering insights and strategies to navigate the rapidly changing cybersecurity landscape. Don’t miss their expert predictions for 2025 and actionable takeaways.</p><p>Listen in for:</p><ol><li>The latest ransomware tactics shifting toward data extortion.</li><li>Insights on AI's transformative role in both attack and defense strategies.</li><li>Predictions on the impact of quantum computing on encryption.</li><li>How organizations can bridge the cybersecurity skills gap and strengthen retention.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In the latest episode of <em>401 Access Denied</em>, host Joseph Carson and cybersecurity expert Frank Vukovits examine 2024’s top cybersecurity trends and what lies ahead. They discuss evolving ransomware tactics, AI's dual role in defense and attack, the skills gap, and quantum computing's threat to encryption. Key topics include cloud security, AI governance, identity protection, and data privacy regulations, offering insights and strategies to navigate the rapidly changing cybersecurity landscape. Don’t miss their expert predictions for 2025 and actionable takeaways.</p><p>Listen in for:</p><ol><li>The latest ransomware tactics shifting toward data extortion.</li><li>Insights on AI's transformative role in both attack and defense strategies.</li><li>Predictions on the impact of quantum computing on encryption.</li><li>How organizations can bridge the cybersecurity skills gap and strengthen retention.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">5869add0-f8f9-43b5-850a-b68e04d80851</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 25 Dec 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/67cb2a38-c578-46ef-a3a2-ec51d3057131/401-access-denied-ep122.mp3" length="58648938" type="audio/mpeg"/><itunes:duration>40:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>122</itunes:episode><podcast:episode>122</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 121 | Navigating the Future of Identity Threats with Gal Diskin</title><itunes:title>401 Access Denied Podcast Ep. 121 | Navigating the Future of Identity Threats with Gal Diskin</itunes:title><description><![CDATA[<p>In this episode of <em>401 Access Denied</em>, host Joe Carson and cybersecurity expert Gal Diskin explore the evolving challenges of identity threats. They discuss how attackers compromise identities, the importance of phishing-resistant multi-factor authentication (MFA), and the need for continuous monitoring and detection.</p><p>The conversation highlights the criminal economy behind identity theft, the risks of security misconfigurations, and how AI is reshaping the landscape for both attackers and defenders. Listeners will learn actionable best practices to protect against identity threats and the importance of staying informed through collaboration within the cybersecurity community.</p><p><strong>Key Takeaways:</strong></p><ol><li>Identity threats demand advanced solutions and continuous vigilance.</li><li>Misconfigurations are a leading cause of data breaches.</li><li>AI introduces both opportunities and risks in cybersecurity.</li><li>Staying connected with the cybersecurity community is essential for staying ahead of threats.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of <em>401 Access Denied</em>, host Joe Carson and cybersecurity expert Gal Diskin explore the evolving challenges of identity threats. They discuss how attackers compromise identities, the importance of phishing-resistant multi-factor authentication (MFA), and the need for continuous monitoring and detection.</p><p>The conversation highlights the criminal economy behind identity theft, the risks of security misconfigurations, and how AI is reshaping the landscape for both attackers and defenders. Listeners will learn actionable best practices to protect against identity threats and the importance of staying informed through collaboration within the cybersecurity community.</p><p><strong>Key Takeaways:</strong></p><ol><li>Identity threats demand advanced solutions and continuous vigilance.</li><li>Misconfigurations are a leading cause of data breaches.</li><li>AI introduces both opportunities and risks in cybersecurity.</li><li>Staying connected with the cybersecurity community is essential for staying ahead of threats.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">cc40851a-43a1-4a66-be9b-719be8145598</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 11 Dec 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6b7db9ac-bc26-433a-999f-96cb1b7d1667/401-access-denied-ep121.mp3" length="51893046" type="audio/mpeg"/><itunes:duration>36:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>121</itunes:episode><podcast:episode>121</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/0fc563d5-2292-4fff-ab56-d43be78549c5/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="401 Access Denied Podcast Ep. 121 | Navigating the Future of Identity Threats with Gal Diskin"><podcast:source uri="https://youtu.be/Bhoon7hIMxI"/></podcast:alternateEnclosure></item><item><title>401 Access Denied Podcast Ep. 120 | Bridging Borders: How INTERPOL Tackles Cybercrime Worldwide with Craig Jones</title><itunes:title>401 Access Denied Podcast Ep. 120 | Bridging Borders: How INTERPOL Tackles Cybercrime Worldwide with Craig Jones</itunes:title><description><![CDATA[<p>Join us as Joe Carson sits down with Craig Jones, a former director at INTERPOL’s Global Cybercrime Programme, to explore the ever-evolving world of cybercrime. With over 40 years in public service, Craig shares unique insights on how criminals have adapted to tech advancements and the immense challenges law enforcement faces in today’s digital landscape. Discover the crucial role INTERPOL plays in bridging global efforts and the pivotal lessons from ransomware attacks like WannaCry. Get ready for a fascinating conversation on what it takes to protect our digital world!</p><p>Key Takeaways:</p><ul><li><strong>Cybercrime’s Evolution</strong>: Criminals adapt quickly, making cyber threats more complex.</li><li><strong>Global Cooperation</strong>: Interpol’s work shows that international teamwork is key in fighting cybercrime.</li><li><strong>Ransomware Lessons</strong>: The WannaCry attack highlighted the need for fast, coordinated responses.</li><li><strong>Community Role</strong>: Public awareness and community involvement strengthen cybersecurity.</li></ul><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Join us as Joe Carson sits down with Craig Jones, a former director at INTERPOL’s Global Cybercrime Programme, to explore the ever-evolving world of cybercrime. With over 40 years in public service, Craig shares unique insights on how criminals have adapted to tech advancements and the immense challenges law enforcement faces in today’s digital landscape. Discover the crucial role INTERPOL plays in bridging global efforts and the pivotal lessons from ransomware attacks like WannaCry. Get ready for a fascinating conversation on what it takes to protect our digital world!</p><p>Key Takeaways:</p><ul><li><strong>Cybercrime’s Evolution</strong>: Criminals adapt quickly, making cyber threats more complex.</li><li><strong>Global Cooperation</strong>: Interpol’s work shows that international teamwork is key in fighting cybercrime.</li><li><strong>Ransomware Lessons</strong>: The WannaCry attack highlighted the need for fast, coordinated responses.</li><li><strong>Community Role</strong>: Public awareness and community involvement strengthen cybersecurity.</li></ul><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">0f15d174-8df7-4752-ac99-0b870c6c16d6</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 27 Nov 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a6fe57b9-0636-4e83-a36f-4558e6f09755/401-access-denied-ep120.mp3" length="58623234" type="audio/mpeg"/><itunes:duration>40:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>120</itunes:episode><podcast:episode>120</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/066d49c9-4ffa-44ca-880d-1f9001129480/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="401 Access Denied Podcast Ep. 120 | Bridging Borders: How INTERPOL Tackles Cybercrime Worldwide with Craig Jones"><podcast:source uri="https://youtu.be/5maFZyZJhhM"/></podcast:alternateEnclosure></item><item><title>401 Access Denied Podcast Ep. 119 | Segregation of Duties: A Key to Security with Chris Katz</title><itunes:title>401 Access Denied Podcast Ep. 119 | Segregation of Duties: A Key to Security with Chris Katz</itunes:title><description><![CDATA[<p>In this episode of <em>401 Access Denied</em>, Joe Carson and guest Chris Katz dive into identity compliance essentials. They cover the critical steps for organizations to secure access, from defining roles and managing risks to enforcing governance and regular audits. Chris shares insights on using community resources and staying up-to-date through conferences to enhance compliance and reduce risks.</p><p><strong>Key Takeaways:</strong></p><ol><li>Clear role definitions, audits, and training are key.</li><li>Segregation of duties prevents errors and fraud.</li><li>Community and conferences offer essential support and learning.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of <em>401 Access Denied</em>, Joe Carson and guest Chris Katz dive into identity compliance essentials. They cover the critical steps for organizations to secure access, from defining roles and managing risks to enforcing governance and regular audits. Chris shares insights on using community resources and staying up-to-date through conferences to enhance compliance and reduce risks.</p><p><strong>Key Takeaways:</strong></p><ol><li>Clear role definitions, audits, and training are key.</li><li>Segregation of duties prevents errors and fraud.</li><li>Community and conferences offer essential support and learning.</li></ol><br/><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">5beee0ab-7191-4df7-b285-e62828bb4e35</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 13 Nov 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5c410aad-2a24-4384-bda8-c1b7633ee8a9/401-access-denied-ep119.mp3" length="55439639" type="audio/mpeg"/><itunes:duration>38:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>119</itunes:episode><podcast:episode>119</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/21ca52c0-1590-47b9-899a-7241d4b8e387/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Segregation of Duties: A Key to Security with Chris Katz | Episode 119"><podcast:source uri="https://youtu.be/4l0UbAbg6kw"/></podcast:alternateEnclosure></item><item><title>401 Access Denied Podcast Ep. 118 | CISO Stories: Leading Today, Shaping Tomorrow with Joshua Brown</title><itunes:title>401 Access Denied Podcast Ep. 118 | CISO Stories: Leading Today, Shaping Tomorrow with Joshua Brown</itunes:title><description><![CDATA[<p>H&amp;R Block’s transformational CISO, Joshua Brown, shares lessons for building a security strategy that provides guardrails so business can move faster. He and Joe discuss how to speak the language of the business in terms of motivations and metrics, and the importance of aligning on risk management for material incidents. With a distributed attack surface, including 10,000 retail locations and a seasonal workforce, Joshua has developed effective strategies for building highly collaborative teams, gaining executive buy-in, and driving adoption for security best practices.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>H&amp;R Block’s transformational CISO, Joshua Brown, shares lessons for building a security strategy that provides guardrails so business can move faster. He and Joe discuss how to speak the language of the business in terms of motivations and metrics, and the importance of aligning on risk management for material incidents. With a distributed attack surface, including 10,000 retail locations and a seasonal workforce, Joshua has developed effective strategies for building highly collaborative teams, gaining executive buy-in, and driving adoption for security best practices.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">1c34022c-75ae-422e-a98e-6f59b28ffc27</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 30 Oct 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1fab8937-1c3e-4dd8-8edd-028429d1ff27/401-access-denied-ep118-1.mp3" length="58508425" type="audio/mpeg"/><itunes:duration>40:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>118</itunes:episode><podcast:episode>118</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 116 | Mastering Passwords: Strategies for Security with Evil Mog</title><itunes:title>401 Access Denied Podcast Ep. 116 | Mastering Passwords: Strategies for Security with Evil Mog</itunes:title><description><![CDATA[<p>Executive managing hacker at IBM X Force, known as Evil Mog, is a specialist in authentication security research and passwords. He joins Joe to discuss modern methods for abstracting passwords away from human decision-making and moving them into the background for stronger security. The two discuss how strategies for password management vary depending on your compliance needs, dependencies of legacy systems, and goals for user experience. You’ll learn best practices for managing enterprise passwords and other shared secrets to reduce user fatigue and avoid credential theft.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Executive managing hacker at IBM X Force, known as Evil Mog, is a specialist in authentication security research and passwords. He joins Joe to discuss modern methods for abstracting passwords away from human decision-making and moving them into the background for stronger security. The two discuss how strategies for password management vary depending on your compliance needs, dependencies of legacy systems, and goals for user experience. You’ll learn best practices for managing enterprise passwords and other shared secrets to reduce user fatigue and avoid credential theft.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">b26a250c-cc9e-4cfa-a5d9-924796cd7348</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 16 Oct 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bb3e9348-e7d5-4457-bf85-8b2ddbc451d5/401-access-denied-ep117.mp3" length="50058623" type="audio/mpeg"/><itunes:duration>34:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>117</itunes:episode><podcast:episode>117</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/a492fb77-964c-4909-a50a-f7e58c5b3525/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 116 | Security by Design: A Risk Based Approach with Nathan Wenzler</title><itunes:title>401 Access Denied Podcast Ep. 116 | Security by Design: A Risk Based Approach with Nathan Wenzler</itunes:title><description><![CDATA[<p>If you started viewing your cybersecurity program through a risk lens, rather than a technical lens, how would that change the conversations you have with business leadership? You might be asking questions like, “How valuable is the thing we’re trying to protect?” “What does it mean to the business?” “What would be the impact if it were compromised?” And, of course, “How much are we willing to invest to protect it?” In this episode, Nathan Wenzler, field CISO and advisor, shares his perspective on the meaning of “Security-by-Design.” More than guiding how you implement security tools or write code, he views it as a mindset shift to view your security program through a risk lens, not purely a technical lens. He and Joe share recommendations for a risk-based security strategy and communicating metrics in the language of the business. Tune in to learn how you can build the case for security investments and a program that’s going to be successful in the long term.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>If you started viewing your cybersecurity program through a risk lens, rather than a technical lens, how would that change the conversations you have with business leadership? You might be asking questions like, “How valuable is the thing we’re trying to protect?” “What does it mean to the business?” “What would be the impact if it were compromised?” And, of course, “How much are we willing to invest to protect it?” In this episode, Nathan Wenzler, field CISO and advisor, shares his perspective on the meaning of “Security-by-Design.” More than guiding how you implement security tools or write code, he views it as a mindset shift to view your security program through a risk lens, not purely a technical lens. He and Joe share recommendations for a risk-based security strategy and communicating metrics in the language of the business. Tune in to learn how you can build the case for security investments and a program that’s going to be successful in the long term.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">0be1668b-74e0-4801-bc73-ad4c19d0c449</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 02 Oct 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d1437fa1-5359-460a-a18a-26d4ecbfc4b1/401-access-denied-ep116.mp3" length="58415717" type="audio/mpeg"/><itunes:duration>40:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>116</itunes:episode><podcast:episode>116</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/f1814e45-c2e5-4df5-8f22-636b06fbcb5a/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="401 Access Denied Podcast Ep. 116 | Security by Design: A Risk Based Approach with Nathan Wenzler"><podcast:source uri="https://youtu.be/ZKrdgqeghrk"/></podcast:alternateEnclosure></item><item><title>401 Access Denied Podcast Ep. 115 | Balancing Access, Risk, and Interoperability with Nabeel Nizar</title><itunes:title>401 Access Denied Podcast Ep. 115 | Balancing Access, Risk, and Interoperability with Nabeel Nizar</itunes:title><description><![CDATA[<p>Access controls have evolved from attribute and role-based to today’s policy-based and knowledge-based access controls. Static controls miss the mark in organizations where job functions are fluid and access to IT systems and business applications must be granular. Nabeel Nizar, EVP of advisory at MajorKey Technologies, joins Joe to share strategies for setting permissions and entitlements that avoid excess privileges and ensure every access request isn’t based on exceptions. They discuss a crawl-walk-run approach to adopting emerging technologies that leverage data and context for access controls that adapt dynamically.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Access controls have evolved from attribute and role-based to today’s policy-based and knowledge-based access controls. Static controls miss the mark in organizations where job functions are fluid and access to IT systems and business applications must be granular. Nabeel Nizar, EVP of advisory at MajorKey Technologies, joins Joe to share strategies for setting permissions and entitlements that avoid excess privileges and ensure every access request isn’t based on exceptions. They discuss a crawl-walk-run approach to adopting emerging technologies that leverage data and context for access controls that adapt dynamically.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">69ed25c0-795d-4679-8e0a-353dd4133836</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 18 Sep 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5e9a35ed-f685-4b73-bfbb-1db83200acaa/401-access-denied-ep115.mp3" length="48881859" type="audio/mpeg"/><itunes:duration>33:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>115</itunes:episode><podcast:episode>115</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/effed04f-af8d-4c2f-a082-0e17c77072e4/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="401 Access Denied Podcast Ep. 115 | Balancing Access, Risk, and Interoperability with Nabeel Nizar"><podcast:source uri="https://youtu.be/G3r4ebmkhAQ"/></podcast:alternateEnclosure></item><item><title>401 Access Denied Podcast Ep. 114 | The Rise and Future of Identity with Ian Glazer</title><itunes:title>401 Access Denied Podcast Ep. 114 | The Rise and Future of Identity with Ian Glazer</itunes:title><description><![CDATA[<p>Join Joseph Carson and digital identity expert Ian Glazer as they dive into the complex world of identity management. Discover the evolving tech expectations, the rise of non-human identities, and why visibility and automation are crucial for incident response. They’ll explore the future of identity management, including AI’s role in detection and policy enforcement. Tune in to understand the shift towards dynamic access, the limitations of role-based access, and how event time data can enhance control models. Don’t miss this deep dive into achieving zero-standing privilege and the future of identity and access management!</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Join Joseph Carson and digital identity expert Ian Glazer as they dive into the complex world of identity management. Discover the evolving tech expectations, the rise of non-human identities, and why visibility and automation are crucial for incident response. They’ll explore the future of identity management, including AI’s role in detection and policy enforcement. Tune in to understand the shift towards dynamic access, the limitations of role-based access, and how event time data can enhance control models. Don’t miss this deep dive into achieving zero-standing privilege and the future of identity and access management!</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">6d6e49fb-9af5-4511-a586-1f7ad20a8f64</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 04 Sep 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cebaefe8-ddb2-4fcf-a361-bcd2477cfc51/401-access-denied-ep114.mp3" length="69374607" type="audio/mpeg"/><itunes:duration>48:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>114</itunes:episode><podcast:episode>114</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/41e9cde4-ca57-480c-9da3-2e31d5765c3e/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="401 Access Denied Podcast Ep. 114 | The Rise and Future of Identity with Ian Glazer"><podcast:source uri="https://youtu.be/wQ8sbkGFsZo"/></podcast:alternateEnclosure></item><item><title>401 Access Denied Podcast Ep. 113 | The Evolution of Platforms and the Role of AI with Phil Calvin</title><itunes:title>401 Access Denied Podcast Ep. 113 | The Evolution of Platforms and the Role of AI with Phil Calvin</itunes:title><description><![CDATA[<p>Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platforms benefit customers by streamlining the user experience with a set of shared services and a common interface. Learn how platforms bring together multiple use cases so that people get the information they need with context, so they can collaborate more effectively and make better decisions.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platforms benefit customers by streamlining the user experience with a set of shared services and a common interface. Learn how platforms bring together multiple use cases so that people get the information they need with context, so they can collaborate more effectively and make better decisions.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea X:<strong> </strong><a href="https://x.com/delineainc" rel="noopener noreferrer" target="_blank">https://x.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">ee3523b2-a0b9-4b48-8fdb-9e0a5484d957</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 21 Aug 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6c6ad6a3-5706-4bb8-b3ef-888ee02215e5/401-access-denied-ep113.mp3" length="21708452" type="audio/mpeg"/><itunes:duration>15:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>113</itunes:episode><podcast:episode>113</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/7e8c1ab4-2d4a-4937-a0d9-bb67b0047d47/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 112 | Prioritizing the Protection of the Brand for CISOs with Myrna Soto</title><itunes:title>401 Access Denied Podcast Ep. 112 | Prioritizing the Protection of the Brand for CISOs with Myrna Soto</itunes:title><description><![CDATA[<p>In this episode, Joseph Carson interviews Myrna Soto, former Global CISO for Comcast, about the changing role of CISOs. Myrna shares her journey into cybersecurity and highlights the importance of business relationships and brand protection. She also offers tips on communicating with the board and staying informed. Tune in for valuable insights and practical advice!</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, Joseph Carson interviews Myrna Soto, former Global CISO for Comcast, about the changing role of CISOs. Myrna shares her journey into cybersecurity and highlights the importance of business relationships and brand protection. She also offers tips on communicating with the board and staying informed. Tune in for valuable insights and practical advice!</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">e922a919-9efc-4a4d-b948-64641edf800f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 07 Aug 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4e229ef1-dbe7-48f9-a86e-54ea4633f05f/401-access-denied-ep112-1.mp3" length="72025931" type="audio/mpeg"/><itunes:duration>50:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>112</itunes:episode><podcast:episode>112</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/dbd69b6e-1707-473b-b437-aa9a4ed2b2e7/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 111 | 3 Keys to Protecting Identities: Authentication, Authorization, and Governance with Frank Vukovits</title><itunes:title>401 Access Denied Podcast Ep. 111 | 3 Keys to Protecting Identities: Authentication, Authorization, and Governance with Frank Vukovits</itunes:title><description><![CDATA[<p>You can think of authentication as the key that lets you inside a house. Authorization allows you to enter a specific room, open the closet, turn on the TV, and look under the bed. Governance is the historical record of all activity that took place. In an enterprise environment, those interconnected “rooms” are core infrastructure, cloud platforms, and business applications. Authentication, authorization, and governance work together to protect the identity framework across them all. Frank Vukovits, chief security scientist at Delinea, joins Joe to break down how each of these elements contributes to effective identity security. An experienced auditor, Frank shares the importance of compliant user provisioning for critical business applications such as Oracle, SAP, Netsuite, and Microsoft Dynamics, especially as employees join, change roles, and ultimately leave an organization. You'll see why permissions in these systems must be carefully managed through authentication, authorization, and governance to shrink your attack surface, avoid toxic conflicts, and reduce the potential for fraud.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>You can think of authentication as the key that lets you inside a house. Authorization allows you to enter a specific room, open the closet, turn on the TV, and look under the bed. Governance is the historical record of all activity that took place. In an enterprise environment, those interconnected “rooms” are core infrastructure, cloud platforms, and business applications. Authentication, authorization, and governance work together to protect the identity framework across them all. Frank Vukovits, chief security scientist at Delinea, joins Joe to break down how each of these elements contributes to effective identity security. An experienced auditor, Frank shares the importance of compliant user provisioning for critical business applications such as Oracle, SAP, Netsuite, and Microsoft Dynamics, especially as employees join, change roles, and ultimately leave an organization. You'll see why permissions in these systems must be carefully managed through authentication, authorization, and governance to shrink your attack surface, avoid toxic conflicts, and reduce the potential for fraud.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">5355acb0-4373-4081-9dd4-d3c696ff9e70</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 24 Jul 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e00de3e7-248d-44d5-9829-3c2145decbcf/401-access-denied-ep111.mp3" length="52704932" type="audio/mpeg"/><itunes:duration>36:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>111</itunes:episode><podcast:episode>111</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 110 | Exploring the Impact of the EU AI Act with Dr. Andrea Isoni</title><itunes:title>401 Access Denied Podcast Ep. 110 | Exploring the Impact of the EU AI Act with Dr. Andrea Isoni</itunes:title><description><![CDATA[<p>Join Joseph Carson and Dr. Andrea Isoni as they dive into the complexities of artificial intelligence. Explore AI's definition, practical applications in medicine and law, and the ethical challenges, including algorithmic bias and human oversight. They discuss the EU AI Act, its impact on AI development, and the global challenges of regulation. Discover the importance of accuracy, transparency, and explainability in AI systems, and the balance needed between protecting citizens and fostering innovation.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Join Joseph Carson and Dr. Andrea Isoni as they dive into the complexities of artificial intelligence. Explore AI's definition, practical applications in medicine and law, and the ethical challenges, including algorithmic bias and human oversight. They discuss the EU AI Act, its impact on AI development, and the global challenges of regulation. Discover the importance of accuracy, transparency, and explainability in AI systems, and the balance needed between protecting citizens and fostering innovation.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">335a7426-4c1f-4a02-94a9-fb4328972b2c</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 10 Jul 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7ff7fdfa-938d-425f-811b-e6b4bb606572/401-access-denied-ep110.mp3" length="75072853" type="audio/mpeg"/><itunes:duration>52:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>110</itunes:episode><podcast:episode>110</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/2b45aede-1f9f-42c6-ab9a-56310bf2525d/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="401 Access Denied Podcast Ep. 110 | Exploring the Impact of the EU AI Act with Dr. Andrea Isoni"><podcast:source uri="https://youtu.be/6BDEhWXePto"/></podcast:alternateEnclosure></item><item><title>401 Access Denied Podcast Ep. 109 | The Lazarus Heist: A Cybercrime Ocean&apos;s 11 with Geoff White</title><itunes:title>401 Access Denied Podcast Ep. 109 | The Lazarus Heist: A Cybercrime Ocean&apos;s 11 with Geoff White</itunes:title><description><![CDATA[<p>Geoff White, author and investigative journalist, has interviewed the masterminds behind some of the most notorious cyberattacks. His new book, <a href="https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838" rel="noopener noreferrer" target="_blank"><em>Rinsed</em></a>, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media. In this episode, the expert on technology and organized crime joins Joe to share what he’s learned about the motives and techniques cyberattackers use to conduct their crimes. Listen in to learn their secrets. This is more than the typical discussion of phishing, social engineering and malware, as Geoff and Joe dig into the intricacies of cryptocurrency, money laundering, and diversionary tactics. The more you know about emerging techniques, the more prepared you’ll be to prevent, detect, and combat them.</p><p>Rinsed: <a href="https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838" rel="noopener noreferrer" target="_blank">https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838</a> </p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Geoff White, author and investigative journalist, has interviewed the masterminds behind some of the most notorious cyberattacks. His new book, <a href="https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838" rel="noopener noreferrer" target="_blank"><em>Rinsed</em></a>, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media. In this episode, the expert on technology and organized crime joins Joe to share what he’s learned about the motives and techniques cyberattackers use to conduct their crimes. Listen in to learn their secrets. This is more than the typical discussion of phishing, social engineering and malware, as Geoff and Joe dig into the intricacies of cryptocurrency, money laundering, and diversionary tactics. The more you know about emerging techniques, the more prepared you’ll be to prevent, detect, and combat them.</p><p>Rinsed: <a href="https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838" rel="noopener noreferrer" target="_blank">https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838</a> </p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">84758a7e-b2e5-40ce-ab6a-41371850d9db</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 26 Jun 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f4fc3362-74a5-4e4e-a1a7-be8ddbfe87da/401-access-denied-ep109.mp3" length="53866649" type="audio/mpeg"/><itunes:duration>37:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>109</itunes:episode><podcast:episode>109</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/9fbc343a-7aa3-4340-8cb5-2be946295f46/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 108 | The Rise of Ransomware and Data Exfiltration with Tony Goulding</title><itunes:title>401 Access Denied Podcast Ep. 108 | The Rise of Ransomware and Data Exfiltration with Tony Goulding</itunes:title><description><![CDATA[<p>Joe Carson and Tony Goulding dive into the Verizon Data Breach Investigations Report (DBIR), revealing key insights on the top threats in cybersecurity. Discover why credential compromise remains the leading attack method and how ransomware, data exfiltration, and extortion are on the rise. Learn about the critical importance of strong authentication, authorization, and continuous monitoring. Don’t miss their expert advice on protecting credentials and staying ahead of evolving security threats.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Joe Carson and Tony Goulding dive into the Verizon Data Breach Investigations Report (DBIR), revealing key insights on the top threats in cybersecurity. Discover why credential compromise remains the leading attack method and how ransomware, data exfiltration, and extortion are on the rise. Learn about the critical importance of strong authentication, authorization, and continuous monitoring. Don’t miss their expert advice on protecting credentials and staying ahead of evolving security threats.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">b9c4c168-c2c5-4a60-a253-f79c12f5dd89</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 12 Jun 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/295bf09f-4489-487c-a804-47a69193b9d2/401-access-denied-ep108.mp3" length="49881199" type="audio/mpeg"/><itunes:duration>34:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>108</itunes:episode><podcast:episode>108</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/83a3eade-f393-4a53-82db-27aabbd650dd/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 107 | CISO Insights &amp; Managing Risks with Brent Deterding</title><itunes:title>401 Access Denied Podcast Ep. 107 | CISO Insights &amp; Managing Risks with Brent Deterding</itunes:title><description><![CDATA[<p>In this episode, join us as Brent Deterding, a cybersecurity professional with 19 years of experience, unveils his top strategies for managing stress, prioritizing risks, and building resilience in the high-stakes world of cybersecurity. Discover how Brent's focus on controllable factors and his calm, composed approach—drawn from emergency medicine—can transform your risk management practices. Dive into his expert insights on the critical role of a CISO, effective third-party risk management, and the power of compelling storytelling to win stakeholder support. Plus, learn why Brent champions risk reduction over compliance and how Estonia's cutting-edge cybersecurity methods can inspire seamless, secure interactions.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, join us as Brent Deterding, a cybersecurity professional with 19 years of experience, unveils his top strategies for managing stress, prioritizing risks, and building resilience in the high-stakes world of cybersecurity. Discover how Brent's focus on controllable factors and his calm, composed approach—drawn from emergency medicine—can transform your risk management practices. Dive into his expert insights on the critical role of a CISO, effective third-party risk management, and the power of compelling storytelling to win stakeholder support. Plus, learn why Brent champions risk reduction over compliance and how Estonia's cutting-edge cybersecurity methods can inspire seamless, secure interactions.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">7046a3a7-49cc-4d8b-bbfa-a73e9ae36471</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 29 May 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f693700b-353d-4879-8d74-e4cbb0172d99/401-access-denied-ep107.mp3" length="87974281" type="audio/mpeg"/><itunes:duration>01:01:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>107</itunes:episode><podcast:episode>107</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/96496c9f-a611-439a-b25f-a63af055a6c2/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 106 | HackTricks with Carlos Polop</title><itunes:title>401 Access Denied Podcast Ep. 106 | HackTricks with Carlos Polop</itunes:title><description><![CDATA[<p>It’s becoming more common for companies to rely on cloud platforms like AWS, SaaS tools, Okta, and Github actions on CICD pipelines. In this episode, penetration tester and creator of HackTricks Carlos Polop shares how he’s helping cloud-first organizations understand the risk of vulnerabilities, misconfigurations, and exploitation techniques such as stealing secrets and abusing trusted relationships. His videos, demos, and training sessions are essential resources for IT security pros in cloud or hybrid organizations. Listen in as he shares his research on how cloud services are commonly misused and exploited and breaks down the latest strategies for maintaining a strong security posture.</p><p>Carlos' book: https://book.hacktricks.xyz/ </p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>It’s becoming more common for companies to rely on cloud platforms like AWS, SaaS tools, Okta, and Github actions on CICD pipelines. In this episode, penetration tester and creator of HackTricks Carlos Polop shares how he’s helping cloud-first organizations understand the risk of vulnerabilities, misconfigurations, and exploitation techniques such as stealing secrets and abusing trusted relationships. His videos, demos, and training sessions are essential resources for IT security pros in cloud or hybrid organizations. Listen in as he shares his research on how cloud services are commonly misused and exploited and breaks down the latest strategies for maintaining a strong security posture.</p><p>Carlos' book: https://book.hacktricks.xyz/ </p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://youtu.be/kWADSiXLYwc?si=tyJy5oBNoyeBgK_N]]></link><guid isPermaLink="false">4526c1e1-b639-4193-98b5-12b7b2421f0f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 15 May 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9c7c3f05-94df-46f1-a0b1-b2a09358e9b3/401-access-denied-ep106.mp3" length="55139962" type="audio/mpeg"/><itunes:duration>38:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>106</itunes:episode><podcast:episode>106</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/8f7a288f-49f9-4735-b96a-63fec1939e34/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 105 | Passwords: Cracking, Chaos, &amp; The Future with Evil Mog</title><itunes:title>401 Access Denied Podcast Ep. 105 | Passwords: Cracking, Chaos, &amp; The Future with Evil Mog</itunes:title><description><![CDATA[<p>Evil Mog is the Chief Architect of IBM X-Force, IBM's Hacking Incident Response and Threat Intelligence division, and a renowned password security researcher. He studies the movements of access brokers across the criminal software supply chain and warns that credentials are being traded on the Dark Web for pennies on the dollar, stored in Github, and driving the growth of identity-based attacks. Meanwhile, shared passwords, reused passwords, legacy software, and the growth of AI applications makes effective authentication challenging. He and Joe discuss the latest research on the current state of passwords and how they’re evolving for layered authentication and authorization. You’ll learn how you can move manual password processes into the background and improve security through password managers, passkeys, MFA tokens, FIDO2 and other techniques. If you have questions about passwordless authentication, you’ll want to tune in.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Evil Mog is the Chief Architect of IBM X-Force, IBM's Hacking Incident Response and Threat Intelligence division, and a renowned password security researcher. He studies the movements of access brokers across the criminal software supply chain and warns that credentials are being traded on the Dark Web for pennies on the dollar, stored in Github, and driving the growth of identity-based attacks. Meanwhile, shared passwords, reused passwords, legacy software, and the growth of AI applications makes effective authentication challenging. He and Joe discuss the latest research on the current state of passwords and how they’re evolving for layered authentication and authorization. You’ll learn how you can move manual password processes into the background and improve security through password managers, passkeys, MFA tokens, FIDO2 and other techniques. If you have questions about passwordless authentication, you’ll want to tune in.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">172d4fe5-8ace-42bc-8b56-770e42f92cfb</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 01 May 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/656d68f0-f1b4-47a0-9a65-a417b31ec6fc/401-access-denied-ep105.mp3" length="69807821" type="audio/mpeg"/><itunes:duration>48:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>105</itunes:episode><podcast:episode>105</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/54d158d4-f72c-4e3f-8d73-fb067411cc86/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 104 | The Importance of Software Bill of Materials (SBOM) with Allan Friedman</title><itunes:title>401 Access Denied Podcast Ep. 104 | The Importance of Software Bill of Materials (SBOM) with Allan Friedman</itunes:title><description><![CDATA[<p>Allan Friedman of the Cybersecurity and Infrastructure Security Agency (CISA) explains how creating a Software Bill of Materials (SBOM) for any application you build helps you improve quality control and proactively address your customers' security questions. You'll learn how to build SBOMs into your process and increase collaboration between vendors and buyers to improve the security of the global supply chain.</p><p><strong>Connect with Allan: </strong></p><p>Website: <a href="http://allan.friedmans.org/" rel="noopener noreferrer" target="_blank">http://allan.friedmans.org/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/allanafriedman/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/allanafriedman/</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Allan Friedman of the Cybersecurity and Infrastructure Security Agency (CISA) explains how creating a Software Bill of Materials (SBOM) for any application you build helps you improve quality control and proactively address your customers' security questions. You'll learn how to build SBOMs into your process and increase collaboration between vendors and buyers to improve the security of the global supply chain.</p><p><strong>Connect with Allan: </strong></p><p>Website: <a href="http://allan.friedmans.org/" rel="noopener noreferrer" target="_blank">http://allan.friedmans.org/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/allanafriedman/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/allanafriedman/</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">3687991e-a8a2-4049-9e00-6f832b356969</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 17 Apr 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4c136781-1001-4e96-b988-5216e9c10508/401-access-denied-ep104.mp3" length="57243968" type="audio/mpeg"/><itunes:duration>39:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>104</itunes:episode><podcast:episode>104</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/05c09b73-2380-4bec-99d8-e3fc75197857/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 103 | The Future of Identity Security with Art Gilliland</title><itunes:title>401 Access Denied Podcast Ep. 103 | The Future of Identity Security with Art Gilliland</itunes:title><description><![CDATA[<p>In this episode, Joseph Carson interviews Art Gilliland, CEO of Delinea, about the challenges and trends in identity security. They discuss the shift in identity security from infrastructure-centric to security-centric, driven by the move to cloud and SaaS products. They highlight the importance of visibility and security controls in a decentralized infrastructure. The conversation also covers the concepts of authentication, authorization, and governance in identity security. They explore the future of digital wallets and federated identity, as well as the need for consolidation and convergence in authorization. The episode concludes with a call to prioritize identity as a security asset.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, Joseph Carson interviews Art Gilliland, CEO of Delinea, about the challenges and trends in identity security. They discuss the shift in identity security from infrastructure-centric to security-centric, driven by the move to cloud and SaaS products. They highlight the importance of visibility and security controls in a decentralized infrastructure. The conversation also covers the concepts of authentication, authorization, and governance in identity security. They explore the future of digital wallets and federated identity, as well as the need for consolidation and convergence in authorization. The episode concludes with a call to prioritize identity as a security asset.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">2d5afae4-6aef-474d-b187-d5c41f456281</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 03 Apr 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b13e47c3-4ad7-43c0-b262-76e1a9f2f8f3/401-access-denied-ep103.mp3" length="36000073" type="audio/mpeg"/><itunes:duration>25:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>103</itunes:episode><podcast:episode>103</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/bf641bfe-a365-4795-9f09-676e61a32965/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 102 | Retro Gaming &amp; Hacking Games with Louis Zezeran</title><itunes:title>401 Access Denied Podcast Ep. 102 | Retro Gaming &amp; Hacking Games with Louis Zezeran</itunes:title><description><![CDATA[<p>Joe Carson and Louis Zezeran explore why the ethos that drives gamers is so relevant for hackers. As they note, the culture and ideas attackers are using today often stem from the environment of retro gaming. Both groups use techniques such as reverse engineering, modifying signals, upscaling, and software emulation. Though most retro games simply want to improve their own experiences and keep playing the games they love, malicious hackers and criminal gangs are skirting restrictions and copyrights to stop sales. Joe and Louis share ideas on how gaming and hacking communities can learn from each other. Plus, their recollections of classic games will make you nostalgic for the early days of gaming and their recommendations for new games will get you reaching for the console.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Joe Carson and Louis Zezeran explore why the ethos that drives gamers is so relevant for hackers. As they note, the culture and ideas attackers are using today often stem from the environment of retro gaming. Both groups use techniques such as reverse engineering, modifying signals, upscaling, and software emulation. Though most retro games simply want to improve their own experiences and keep playing the games they love, malicious hackers and criminal gangs are skirting restrictions and copyrights to stop sales. Joe and Louis share ideas on how gaming and hacking communities can learn from each other. Plus, their recollections of classic games will make you nostalgic for the early days of gaming and their recommendations for new games will get you reaching for the console.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">8dbb1c96-53ed-4ca4-b4d0-1825c04603b6</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 20 Mar 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d5465215-13f7-48a0-a636-1a8df4202395/delinea-video-401-access-denied-ep102-1.mp3" length="84352174" type="audio/mpeg"/><itunes:duration>58:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>102</itunes:episode><podcast:episode>102</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/99331b3a-4095-4c72-a0bb-ad893f2f5905/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 101 | Ransomware Trends and Emerging Threats with Dan Lohrmann</title><itunes:title>401 Access Denied Podcast Ep. 101 | Ransomware Trends and Emerging Threats with Dan Lohrmann</itunes:title><description><![CDATA[<p>What do public sector organizations need to know about ransomware trends, identity-based attacks, and incident response? Hear from Dan Lohrmann, Field CISO for the public sector at Presidio and co-author of <em>Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions</em>. He and Joe discuss the reasons for ransomware’s decline in 2022 and subsequent acceleration in 2023, as threat agents leverage AI, social engineering, data exfiltration, and ransomware-as-a-service techniques. Dan shares the background of recent ransomware incidents that have impacted state, local, and educational organizations in Texas, Florida, and Michigan. You’ll get tactical recommendations on how to test your incident response plan with best practices for tabletop exercises and emergency communications.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>What do public sector organizations need to know about ransomware trends, identity-based attacks, and incident response? Hear from Dan Lohrmann, Field CISO for the public sector at Presidio and co-author of <em>Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions</em>. He and Joe discuss the reasons for ransomware’s decline in 2022 and subsequent acceleration in 2023, as threat agents leverage AI, social engineering, data exfiltration, and ransomware-as-a-service techniques. Dan shares the background of recent ransomware incidents that have impacted state, local, and educational organizations in Texas, Florida, and Michigan. You’ll get tactical recommendations on how to test your incident response plan with best practices for tabletop exercises and emergency communications.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">16a23e49-7df3-418d-90a4-e5565e8bfc89</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 06 Mar 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e3a1e1a1-f9f0-4aae-98dc-8f66cfd9dfd1/delinea-video-401-access-denied-ep101.mp3" length="68382790" type="audio/mpeg"/><itunes:duration>47:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>101</itunes:episode><podcast:episode>101</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/b6f9156d-798f-4c16-a4d1-1eba67ffaf68/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 100 | Protecting Citizens Online at the UK National Cyber Security Centre with Ciaran Martin</title><itunes:title>401 Access Denied Podcast Ep. 100 | Protecting Citizens Online at the UK National Cyber Security Centre with Ciaran Martin</itunes:title><description><![CDATA[<p>As founding chief executive of the UK National Cyber Security Centre (NCSC), Ciaran Martin sits at the intersection of national security, law, and politics. In this episode, he and Joe discuss how the UK NCSC took on the challenge of understanding security concerns and best practices from the private sector and translating them into effective crisis communications and policy changes. They share stories of cyber threats and attacks on critical infrastructure, and the impact these incidents have on citizens financially, physically, and psychologically. You’ll get a look at what it took to update the UK’s cybersecurity posture, including understanding the severity of different types of cyberattacks and data breaches, incident response, and threat intelligence, to improve the country’s cyber resilience.</p><p><strong>Connect with Ciaran:</strong></p><p>Twitter: @ciaranmartinoxf</p><p>LinkedIn: https://ie.linkedin.com/in/martinciaran</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>As founding chief executive of the UK National Cyber Security Centre (NCSC), Ciaran Martin sits at the intersection of national security, law, and politics. In this episode, he and Joe discuss how the UK NCSC took on the challenge of understanding security concerns and best practices from the private sector and translating them into effective crisis communications and policy changes. They share stories of cyber threats and attacks on critical infrastructure, and the impact these incidents have on citizens financially, physically, and psychologically. You’ll get a look at what it took to update the UK’s cybersecurity posture, including understanding the severity of different types of cyberattacks and data breaches, incident response, and threat intelligence, to improve the country’s cyber resilience.</p><p><strong>Connect with Ciaran:</strong></p><p>Twitter: @ciaranmartinoxf</p><p>LinkedIn: https://ie.linkedin.com/in/martinciaran</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">ab29ab23-08e8-499f-a3ff-ad9a6f0287d2</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 21 Feb 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5f35f706-838e-470c-944a-ecf536c517ff/delinea-video-401-access-denied-ep100.mp3" length="71440997" type="audio/mpeg"/><itunes:duration>49:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>100</itunes:episode><podcast:episode>100</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/fdea3502-6772-4271-865e-2d6c98f58d68/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 99 | The Virtual CISO &amp; Cyber Governance Risk with Gideon Rasmussen</title><itunes:title>401 Access Denied Podcast Ep. 99 | The Virtual CISO &amp; Cyber Governance Risk with Gideon Rasmussen</itunes:title><description><![CDATA[<p>As a virtual CISO and cybersecurity consultant, Gideon Rasmussen helps new CISOs and organizations that are bringing on a CISO for the first time build a program architecture, conduct budgetary assessments, and translate cybersecurity into business impact the board understands. Gideon and Joe discuss the importance of consistent process execution, QA, and automation to help teams avoid things slipping through the cracks and experiencing “compliance jitter.” They dig into the latest update for the NIST Cybersecurity Framework, and share ways to use risk assessments and incident response exercises to improve cyber resilience. If you’ve got an upcoming board presentation and need to communicate risk to guide decisions, this episode has advice to help.</p><p><strong>Connect with Gideon:</strong></p><p>Website: <a href="https://www.gideonrasmussen.com/" rel="noopener noreferrer" target="_blank">https://www.gideonrasmussen.com/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/gideonrasmussen/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/gideonrasmussen/</a></p><p>Twitter: <a href="https://twitter.com/gideonras" rel="noopener noreferrer" target="_blank">https://twitter.com/gideonras</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>As a virtual CISO and cybersecurity consultant, Gideon Rasmussen helps new CISOs and organizations that are bringing on a CISO for the first time build a program architecture, conduct budgetary assessments, and translate cybersecurity into business impact the board understands. Gideon and Joe discuss the importance of consistent process execution, QA, and automation to help teams avoid things slipping through the cracks and experiencing “compliance jitter.” They dig into the latest update for the NIST Cybersecurity Framework, and share ways to use risk assessments and incident response exercises to improve cyber resilience. If you’ve got an upcoming board presentation and need to communicate risk to guide decisions, this episode has advice to help.</p><p><strong>Connect with Gideon:</strong></p><p>Website: <a href="https://www.gideonrasmussen.com/" rel="noopener noreferrer" target="_blank">https://www.gideonrasmussen.com/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/gideonrasmussen/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/gideonrasmussen/</a></p><p>Twitter: <a href="https://twitter.com/gideonras" rel="noopener noreferrer" target="_blank">https://twitter.com/gideonras</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">84997b31-df85-4983-a792-f6ecd684f663</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 07 Feb 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5b66e7f5-5f05-4377-845d-39a53efb66d5/401-access-denied-ep99-spotify.mp3" length="65219884" type="audio/mpeg"/><itunes:duration>45:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>99</itunes:episode><podcast:episode>99</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/83333803-ac34-4ed7-b596-d801563f5f73/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 98 | Estonia at the Forefront of Digitization &amp; Cybersecurity with Tanel Sepp</title><itunes:title>401 Access Denied Podcast Ep. 98 | Estonia at the Forefront of Digitization &amp; Cybersecurity with Tanel Sepp</itunes:title><description><![CDATA[<p>Meet Tanel Sepp, Ambassador at Large for Cyber Diplomacy at Ministry of Foreign Affairs of Estonia. He talks with Joe about navigating Estonia’s security strategy as the country emerged from 2007 cyberattacks to become an international leader for digital governance, banking, and media. Learn about the latest advancements in cyber law, public-private partnerships, and multi-national bodies that are coordinating cybersecurity thought leadership and response activities.</p><p>Tanel on X(Twitter): @tanel_sepp</p><p>Tanel on LinkedIn: <a href="http://linkedin.com/in/tanel-sepp-79b89226b" rel="noopener noreferrer" target="_blank">linkedin.com/in/tanel-sepp-79b89226b</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Meet Tanel Sepp, Ambassador at Large for Cyber Diplomacy at Ministry of Foreign Affairs of Estonia. He talks with Joe about navigating Estonia’s security strategy as the country emerged from 2007 cyberattacks to become an international leader for digital governance, banking, and media. Learn about the latest advancements in cyber law, public-private partnerships, and multi-national bodies that are coordinating cybersecurity thought leadership and response activities.</p><p>Tanel on X(Twitter): @tanel_sepp</p><p>Tanel on LinkedIn: <a href="http://linkedin.com/in/tanel-sepp-79b89226b" rel="noopener noreferrer" target="_blank">linkedin.com/in/tanel-sepp-79b89226b</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">d5bf73ef-f7cb-407c-ad45-9a85f5c941fa</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 24 Jan 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7c828611-8fa7-4dcc-8310-551f263475d4/401-access-denied-ep98-spotify.mp3" length="70041043" type="audio/mpeg"/><itunes:duration>48:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>98</itunes:episode><podcast:episode>98</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/bbc7e3f3-c510-49b1-98ea-cf202bd0b9e5/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 97 | Securing the Human in a Digital World with James McQuiggan</title><itunes:title>401 Access Denied Podcast Ep. 97 | Securing the Human in a Digital World with James McQuiggan</itunes:title><description><![CDATA[<p>Cyber criminals love to take advantage of human behavior, which is why social engineering remains a top attack vector. Hear how James McQuiggan, Security Awareness Advocate for KnowBe4, helps people make smarter security decisions, with training for all levels, phishing assessments, and mitigating controls. In this episode, James and Joe discuss emerging techniques driven by sophisticated, generative AI, and strategies you can employ to educate users and reduce risk of cyberattacks both at work and at home.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Cyber criminals love to take advantage of human behavior, which is why social engineering remains a top attack vector. Hear how James McQuiggan, Security Awareness Advocate for KnowBe4, helps people make smarter security decisions, with training for all levels, phishing assessments, and mitigating controls. In this episode, James and Joe discuss emerging techniques driven by sophisticated, generative AI, and strategies you can employ to educate users and reduce risk of cyberattacks both at work and at home.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">0f614de9-c3a8-49f9-84ec-bc30f954a478</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 10 Jan 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/40afc598-d84f-43fa-a40b-2fdc77ce444d/401-access-denied-ep97-spotify.mp3" length="72150065" type="audio/mpeg"/><itunes:duration>50:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>97</itunes:episode><podcast:episode>97</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/1c92c0bc-00b9-48d3-b29c-a6b0d5c99e4e/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 96 | Year in Review &amp; Future Trends with Mikko Hypponen</title><itunes:title>401 Access Denied Podcast Ep. 96 | Year in Review &amp; Future Trends with Mikko Hypponen</itunes:title><description><![CDATA[<p>In this episode, Joseph Carson interviews Mikko Hypponen, a renowned cybersecurity expert, about notable cybersecurity events of 2023, including the rise of ransomware attacks and the success of cybercrime unicorns. They discuss specific cases such as the MGM Grand and Caesar's Palace attacks, as well as the Vastaamo incident in Finland. The conversation also touches on the growing threat of supply chain attacks and recommendations for combatting the coming surge of AI-driven attacks. They explore the potential battle between good AI and bad AI, with the rise of deep fake scams and the automation of malware campaigns.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, Joseph Carson interviews Mikko Hypponen, a renowned cybersecurity expert, about notable cybersecurity events of 2023, including the rise of ransomware attacks and the success of cybercrime unicorns. They discuss specific cases such as the MGM Grand and Caesar's Palace attacks, as well as the Vastaamo incident in Finland. The conversation also touches on the growing threat of supply chain attacks and recommendations for combatting the coming surge of AI-driven attacks. They explore the potential battle between good AI and bad AI, with the rise of deep fake scams and the automation of malware campaigns.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">947f083c-39f8-4f21-bcae-6df17deeb6c1</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 27 Dec 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6bf580a1-ed6a-4590-b16f-28ed311d866b/401-access-denied-ep96-spotify.mp3" length="62131583" type="audio/mpeg"/><itunes:duration>43:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>96</itunes:episode><podcast:episode>96</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/f35ba89a-6166-444e-9150-833429f2b1d9/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 95 | Living with ADHD in InfoSec with Klaus Agnoletti</title><itunes:title>401 Access Denied Podcast Ep. 95 | Living with ADHD in InfoSec with Klaus Agnoletti</itunes:title><description><![CDATA[<p>Join the candid conversation between Joseph Carson and cybersecurity advisor Klaus Agnoletti on living and working with ADHD. Klaus shares his personal story of being diagnosed later in life and the strategies he uses to succeed, including adapting his work style and environment to match his needs. This thought-provoking discussion emphasizes the importance of embracing neurodiversity in the workplace and the benefits of bringing your whole self to your career.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Join the candid conversation between Joseph Carson and cybersecurity advisor Klaus Agnoletti on living and working with ADHD. Klaus shares his personal story of being diagnosed later in life and the strategies he uses to succeed, including adapting his work style and environment to match his needs. This thought-provoking discussion emphasizes the importance of embracing neurodiversity in the workplace and the benefits of bringing your whole self to your career.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">f37be8c0-a55f-4f3d-b979-f48937f5bd42</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 13 Dec 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b202fdf5-2460-4b59-8976-898359cb0ff1/401-access-denied-ep95-spotify.mp3" length="60068233" type="audio/mpeg"/><itunes:duration>41:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>95</itunes:episode><podcast:episode>95</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/5d5af68e-077d-4d62-b10f-baaf605798be/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 94 | Crowdsourced Security &amp; Vulnerability Disclosure with Casey Ellis</title><itunes:title>401 Access Denied Podcast Ep. 94 | Crowdsourced Security &amp; Vulnerability Disclosure with Casey Ellis</itunes:title><description><![CDATA[<p>Join host Joseph Carson for a compelling discussion with Bugcrowd founder Casey Ellis on the evolution of coordinated vulnerability disclosure. Ellis’ pioneering work connects ethical hackers with organizations to enhance their cyber resilience. He shares his experiences and unique insights into disclosure trends, including how changing regulations and emerging AI considerations are having an impact. Don't miss this engaging dialogue to learn how the next generation of builders and breakers can take the lead and collaborate for better security.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Join host Joseph Carson for a compelling discussion with Bugcrowd founder Casey Ellis on the evolution of coordinated vulnerability disclosure. Ellis’ pioneering work connects ethical hackers with organizations to enhance their cyber resilience. He shares his experiences and unique insights into disclosure trends, including how changing regulations and emerging AI considerations are having an impact. Don't miss this engaging dialogue to learn how the next generation of builders and breakers can take the lead and collaborate for better security.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">a0d9ec59-7393-451b-a6b2-ea6373427b44</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 29 Nov 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/74882a55-237f-47dd-8faf-b9c1bb6f616b/401-access-denied-ep94-spotify.mp3" length="87827977" type="audio/mpeg"/><itunes:duration>01:00:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>94</itunes:episode><podcast:episode>94</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/28169b5e-d8aa-4c29-9e31-9bdc6fc23947/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 93 | Securing Compliance: Expert Insights with Steven Ursillo</title><itunes:title>401 Access Denied Podcast Ep. 93 | Securing Compliance: Expert Insights with Steven Ursillo</itunes:title><description><![CDATA[<p>Steven Ursillo, Partner in the Risk &amp; Accounting Advisory Services Practice and Leader of the Cybersecurity Group at Cherry Bekaert, joins Joe Carson to talk about meeting the challenges of costly, time-consuming compliance requirements. They discuss the nuances of cybersecurity frameworks like NIST CSF and ISO 27001, industry regulations like PCI, HIPAA, and SOX, and the differences between SOC1 and SOC2 examinations. Steven shares recommendations for scoping compliance programs and preparing for audits without breaking the bank or burning out your team. He offers advice on navigating the complexity of compliance based on your risk tolerance and strategies for using technology to make evidence collection and report building more efficient. Looking to the future, Steven and Joe dive into evolving compliance requirements for third-party risk and emerging concerns like Artificial Intelligence. If you’re preparing for an audit or looking to improve your compliance program, you’ll want to tune in.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Steven Ursillo, Partner in the Risk &amp; Accounting Advisory Services Practice and Leader of the Cybersecurity Group at Cherry Bekaert, joins Joe Carson to talk about meeting the challenges of costly, time-consuming compliance requirements. They discuss the nuances of cybersecurity frameworks like NIST CSF and ISO 27001, industry regulations like PCI, HIPAA, and SOX, and the differences between SOC1 and SOC2 examinations. Steven shares recommendations for scoping compliance programs and preparing for audits without breaking the bank or burning out your team. He offers advice on navigating the complexity of compliance based on your risk tolerance and strategies for using technology to make evidence collection and report building more efficient. Looking to the future, Steven and Joe dive into evolving compliance requirements for third-party risk and emerging concerns like Artificial Intelligence. If you’re preparing for an audit or looking to improve your compliance program, you’ll want to tune in.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">2f01ed1f-c486-4074-8c31-8916e1e9b8d7</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 15 Nov 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee851a61-6622-44dd-bee2-7b03f57bf67d/401-access-denied-ep93-spotify.mp3" length="71230973" type="audio/mpeg"/><itunes:duration>49:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>93</itunes:episode><podcast:episode>93</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/f11a973e-9fc2-4625-96dc-29b5d2f76495/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 92 | Going from Hacker to CISO with Jason Haddix</title><itunes:title>401 Access Denied Podcast Ep. 92 | Going from Hacker to CISO with Jason Haddix</itunes:title><description><![CDATA[<p>Jason Haddix, CISO and Hacker in Charge at BuddoBot, joins Joe to discuss his journey from hacking to penetration testing and ultimately taking on cybersecurity leadership roles. You’ll see how starting as an offensive practitioner provides valuable exposure, and hones your abilities to report and present results and provide defensive and remediation advice. They share tips for leadership, including prioritization, communicating the business impact of security, and developing a strategy to align with business goals. Whether you're just starting out in cybersecurity or looking to advance your career, you’ll learn practical guidance you can put into action right away.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Jason Haddix, CISO and Hacker in Charge at BuddoBot, joins Joe to discuss his journey from hacking to penetration testing and ultimately taking on cybersecurity leadership roles. You’ll see how starting as an offensive practitioner provides valuable exposure, and hones your abilities to report and present results and provide defensive and remediation advice. They share tips for leadership, including prioritization, communicating the business impact of security, and developing a strategy to align with business goals. Whether you're just starting out in cybersecurity or looking to advance your career, you’ll learn practical guidance you can put into action right away.</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn:<strong> </strong><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter:<strong> </strong><a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook:<strong> </strong><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">5ec6a129-5033-4a59-ba33-0d551cc3e5eb</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 01 Nov 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1508c908-aa11-48ad-a036-910eb19d92d3/401-access-denied-ep92-spotify.mp3" length="45169046" type="audio/mpeg"/><itunes:duration>47:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>92</itunes:episode><podcast:episode>92</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/b1097ef7-533b-4b67-99e0-38799c170811/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 91 | Hacking Hardware &amp; the Right to Repair with Sick.Codes</title><itunes:title>401 Access Denied Podcast Ep. 91 | Hacking Hardware &amp; the Right to Repair with Sick.Codes</itunes:title><description><![CDATA[<p>Dive into the fascinating world of hacking. Sick.Codes gives you a glimpse into hacker culture, including the importance of collaboration and knowledge sharing. You’ll also learn how hackers identifying vulnerabilities impacts the growing “right-to-repair” legislative movement that seeks to make it easier and cheaper for consumers to fix products by requiring manufacturers to share information. This episode is packed with advice on tools and strategies for IT and security pros looking to uncover vulnerabilities, reverse engineer threats, and try their hand at ethical hacking. Will you heed the call to get involved with the hacker community?</p><p><strong>More from Sick.Codes:</strong></p><p>Website: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://t.co/KWPQPyNuYa</a>  </p><p>Github: <a href="https://github.com/sickcodes" rel="noopener noreferrer" target="_blank">https://github.com/sickcodes</a>&nbsp;</p><p>X: <a href="https://twitter.com/sickcodes" rel="noopener noreferrer" target="_blank">https://twitter.com/sickcodes</a>&nbsp;</p><p>LinkedIn: <a href="https://linkedin.com/in/sickcodes/" rel="noopener noreferrer" target="_blank">https://linkedin.com/in/sickcodes/</a>&nbsp;</p><p>Mastodon: <a href="https://sick.social/" rel="noopener noreferrer" target="_blank">https://sick.social</a>&nbsp;</p><p>YouTube: <a href="https://youtube.com/c/sickcodes" rel="noopener noreferrer" target="_blank">https://youtube.com/c/sickcodes</a>&nbsp;</p><p>HackerOne: <a href="https://hackerone.com/sickcodes" rel="noopener noreferrer" target="_blank">https://hackerone.com/sickcodes</a></p><p>BugCrowd: <a href="https://bugcrowd.com/sickcodes" rel="noopener noreferrer" target="_blank">https://bugcrowd.com/sickcodes</a></p><p>Docker Hub: <a href="https://hub.docker.com/r/sickcodes" rel="noopener noreferrer" target="_blank">https://hub.docker.com/r/sickcodes</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn: <a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook: <a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></description><content:encoded><![CDATA[<p>Dive into the fascinating world of hacking. Sick.Codes gives you a glimpse into hacker culture, including the importance of collaboration and knowledge sharing. You’ll also learn how hackers identifying vulnerabilities impacts the growing “right-to-repair” legislative movement that seeks to make it easier and cheaper for consumers to fix products by requiring manufacturers to share information. This episode is packed with advice on tools and strategies for IT and security pros looking to uncover vulnerabilities, reverse engineer threats, and try their hand at ethical hacking. Will you heed the call to get involved with the hacker community?</p><p><strong>More from Sick.Codes:</strong></p><p>Website: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://t.co/KWPQPyNuYa</a>  </p><p>Github: <a href="https://github.com/sickcodes" rel="noopener noreferrer" target="_blank">https://github.com/sickcodes</a>&nbsp;</p><p>X: <a href="https://twitter.com/sickcodes" rel="noopener noreferrer" target="_blank">https://twitter.com/sickcodes</a>&nbsp;</p><p>LinkedIn: <a href="https://linkedin.com/in/sickcodes/" rel="noopener noreferrer" target="_blank">https://linkedin.com/in/sickcodes/</a>&nbsp;</p><p>Mastodon: <a href="https://sick.social/" rel="noopener noreferrer" target="_blank">https://sick.social</a>&nbsp;</p><p>YouTube: <a href="https://youtube.com/c/sickcodes" rel="noopener noreferrer" target="_blank">https://youtube.com/c/sickcodes</a>&nbsp;</p><p>HackerOne: <a href="https://hackerone.com/sickcodes" rel="noopener noreferrer" target="_blank">https://hackerone.com/sickcodes</a></p><p>BugCrowd: <a href="https://bugcrowd.com/sickcodes" rel="noopener noreferrer" target="_blank">https://bugcrowd.com/sickcodes</a></p><p>Docker Hub: <a href="https://hub.docker.com/r/sickcodes" rel="noopener noreferrer" target="_blank">https://hub.docker.com/r/sickcodes</a></p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: <a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">https://delinea.com/</a></p><p>Delinea LinkedIn: <a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/delinea/</a></p><p>Delinea Twitter: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://twitter.com/delineainc</a></p><p>Delinea Facebook: <a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">https://www.facebook.com/delineainc</a></p><p>Delinea YouTube: <a href="https://t.co/KWPQPyNuYa" rel="noopener noreferrer" target="_blank">https://www.youtube.com/c/delinea</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">edce8b77-d31f-4066-8d4b-e80cbdfcb1b9</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 18 Oct 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8b181428-450f-4465-850b-c5189168327d/401-access-denied-ep91-spotify.mp3" length="30345532" type="audio/mpeg"/><itunes:duration>31:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>91</itunes:episode><podcast:episode>91</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/e713d4e2-3984-4959-be23-13e16afe5fef/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 90 | Cyber Insurance Trends for Risk Management with Dara Gibson</title><itunes:title>401 Access Denied Podcast Ep. 90 | Cyber Insurance Trends for Risk Management with Dara Gibson</itunes:title><description><![CDATA[<p>Cybersecurity experts Joe Carson and Dara Gibson discuss the importance of viewing cybersecurity as a cross-functional problem rather than solely an IT issue. Boards are now requiring organizations to have cyber insurance in place, making it crucial for businesses to be prepared for these conversations. For those who are new to the topic or need a refresher, listen in to get Dara's recommendations on making sure your cyber insurance is protecting you and Joe's recommendations for having an offline response plan in case of an attack. </p><p>ABOUT DARA GIBSON </p><p>Dara Gibson is the Senior Manager for Cyber Insurability Services at Optiv, the cyber advisory and solutions leader. By blending innovative technologies, unique skill sets, and proven cyber strategies, she has created lasting partnerships with clients to protect shareholder value and corporate reputations. As a nationally recognized information security leader, she is responsible for designing cybersecurity awareness programs to foster expertise in relationship management with industry leading cyber insurance and legal providers for proactive and reactive cybersecurity capabilities.&nbsp; Prior to joining Optiv, Dara was an Alliance Manager having expertise in business development and marketing operations for cyber law firms and cyber insurance companies with specific attention to MSSP Services, Pre-Breach Consultation Services, Digital Forensics and Incident Response (DFIR) Services, and Post-Breach Consultation Services. </p><p>Dara on LinkedIn: https://www.linkedin.com/in/dara-gibson/</p><p>Twitter: DaraIsagenix</p><p>Optiv on LinkedIn: https://www.linkedin.com/company/optiv-inc/</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: https://delinea.com/</p><p>Delinea LinkedIn: https://www.linkedin.com/company/delinea/</p><p>Delinea Twitter: https://twitter.com/delineainc</p><p>Delinea Facebook: https://www.facebook.com/delineainc</p><p>Delinea YouTube: https://www.youtube.com/c/delinea</p>]]></description><content:encoded><![CDATA[<p>Cybersecurity experts Joe Carson and Dara Gibson discuss the importance of viewing cybersecurity as a cross-functional problem rather than solely an IT issue. Boards are now requiring organizations to have cyber insurance in place, making it crucial for businesses to be prepared for these conversations. For those who are new to the topic or need a refresher, listen in to get Dara's recommendations on making sure your cyber insurance is protecting you and Joe's recommendations for having an offline response plan in case of an attack. </p><p>ABOUT DARA GIBSON </p><p>Dara Gibson is the Senior Manager for Cyber Insurability Services at Optiv, the cyber advisory and solutions leader. By blending innovative technologies, unique skill sets, and proven cyber strategies, she has created lasting partnerships with clients to protect shareholder value and corporate reputations. As a nationally recognized information security leader, she is responsible for designing cybersecurity awareness programs to foster expertise in relationship management with industry leading cyber insurance and legal providers for proactive and reactive cybersecurity capabilities.&nbsp; Prior to joining Optiv, Dara was an Alliance Manager having expertise in business development and marketing operations for cyber law firms and cyber insurance companies with specific attention to MSSP Services, Pre-Breach Consultation Services, Digital Forensics and Incident Response (DFIR) Services, and Post-Breach Consultation Services. </p><p>Dara on LinkedIn: https://www.linkedin.com/in/dara-gibson/</p><p>Twitter: DaraIsagenix</p><p>Optiv on LinkedIn: https://www.linkedin.com/company/optiv-inc/</p><p><strong>Connect with Delinea:</strong></p><p>Delinea Website: https://delinea.com/</p><p>Delinea LinkedIn: https://www.linkedin.com/company/delinea/</p><p>Delinea Twitter: https://twitter.com/delineainc</p><p>Delinea Facebook: https://www.facebook.com/delineainc</p><p>Delinea YouTube: https://www.youtube.com/c/delinea</p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">d11b8fe4-e29b-46e4-966e-03b7bfaa05e0</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 04 Oct 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/85c12d54-0cd7-4db3-8b3a-7516fdfedfa2/401-access-denied-ep90-spotify.mp3" length="40219920" type="audio/mpeg"/><itunes:duration>41:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>90</itunes:episode><podcast:episode>90</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/62667c71-9314-4a0f-8a93-44f760910a77/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 89 | Smart Hacking with Ken Munro</title><itunes:title>401 Access Denied Podcast Ep. 89 | Smart Hacking with Ken Munro</itunes:title><description><![CDATA[<p>Hear how hackers target everything from airplanes to talking dolls. Pen testing expert Ken Munro discusses ways to close security gaps and protect embedded systems and connected devices.</p><p><strong>Connect with Ken Munro:</strong></p><p>Ken Munro on <a href="https://www.linkedin.com/in/ken-munro-17899b1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Twitter: <a href="https://twitter.com/TheKenMunroShow" rel="noopener noreferrer" target="_blank">@TheKenMunroShow</a></p><p><strong>﻿Connect with Delinea:</strong></p><p><a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea Website</a></p><p><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p><p><a href="https://twitter.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Facebook</a></p><p><a href="https://www.youtube.com/c/delinea" rel="noopener noreferrer" target="_blank">Delinea YouTube</a></p>]]></description><content:encoded><![CDATA[<p>Hear how hackers target everything from airplanes to talking dolls. Pen testing expert Ken Munro discusses ways to close security gaps and protect embedded systems and connected devices.</p><p><strong>Connect with Ken Munro:</strong></p><p>Ken Munro on <a href="https://www.linkedin.com/in/ken-munro-17899b1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Twitter: <a href="https://twitter.com/TheKenMunroShow" rel="noopener noreferrer" target="_blank">@TheKenMunroShow</a></p><p><strong>﻿Connect with Delinea:</strong></p><p><a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea Website</a></p><p><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p><p><a href="https://twitter.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Facebook</a></p><p><a href="https://www.youtube.com/c/delinea" rel="noopener noreferrer" target="_blank">Delinea YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">10151a1e-b61f-4984-be99-088ab0c23c6e</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 20 Sep 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d2ae3d2b-daab-45b6-a040-9013dd9768cb/401-access-denied-ep89-spotify.mp3" length="41310125" type="audio/mpeg"/><itunes:duration>43:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>89</itunes:episode><podcast:episode>89</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/791018a5-c0d4-4fb2-adf4-6ccaf72bbf91/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 88 | The RISE of the CISO with Merike Kaeo</title><itunes:title>401 Access Denied Podcast Ep. 88 | The RISE of the CISO with Merike Kaeo</itunes:title><description><![CDATA[<p>This week Joe Carson is joined by Merike Kaeo as they discuss the dynamic role of the CISO within an organization. They dive deeper into the role and how it interacts with different areas of the business, and what specific assets need protection and within what frameworks. An episode not to be missed!</p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>This week Joe Carson is joined by Merike Kaeo as they discuss the dynamic role of the CISO within an organization. They dive deeper into the role and how it interacts with different areas of the business, and what specific assets need protection and within what frameworks. An episode not to be missed!</p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">35434dd0-ce95-4dac-8a06-73921b3a7040</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 06 Sep 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7f707b87-9ef4-4ef0-9c2a-ac9aae9bd358/401-Access-Denie-Ep88-Wide-prproj-mixdown.mp3" length="50021889" type="audio/mpeg"/><itunes:duration>34:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>88</itunes:episode><podcast:episode>88</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 87 | Protecting Society and the Role of CERT with Tonu Tammer</title><itunes:title>401 Access Denied Podcast Ep. 87 | Protecting Society and the Role of CERT with Tonu Tammer</itunes:title><description><![CDATA[<p>In this episode we join host Joe Carson as he discusses state cybersecurity with Tonu Tammer of the Estonian National Cybersecurity Center. Tonu goes into the day-to-day operations of defending a country and its citizens from adversaries, as well as ransomware and DDOS attacks. Come along for an in-depth discussion with a cyber defender with years of experience in this exciting new episode!</p><p>Below are links referenced in the episode:</p><p><a href="CERT-EE RFC 2350 | RIAhttps://www.ria.ee/en/cyber-security/handling-cyber-incidents-cert-ee/rfc-2350-description-cert-ee" rel="noopener noreferrer" target="_blank"><strong>CERT-EE RFC 2350 | RIA</strong></a></p><p><a href="https://www.ria.ee/en/cyber-security/handling-cyber-incidents-cert-ee/reporting-cyber-incident" rel="noopener noreferrer" target="_blank"><strong>Reporting a cyber incident | RIA</strong></a></p><p><a href="https://www.ria.ee/en/authority-news-and-contact/news-media-contact/studies-analyses-overviews" rel="noopener noreferrer" target="_blank"><strong>Studies, analyses, overviews | RIA</strong></a></p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>In this episode we join host Joe Carson as he discusses state cybersecurity with Tonu Tammer of the Estonian National Cybersecurity Center. Tonu goes into the day-to-day operations of defending a country and its citizens from adversaries, as well as ransomware and DDOS attacks. Come along for an in-depth discussion with a cyber defender with years of experience in this exciting new episode!</p><p>Below are links referenced in the episode:</p><p><a href="CERT-EE RFC 2350 | RIAhttps://www.ria.ee/en/cyber-security/handling-cyber-incidents-cert-ee/rfc-2350-description-cert-ee" rel="noopener noreferrer" target="_blank"><strong>CERT-EE RFC 2350 | RIA</strong></a></p><p><a href="https://www.ria.ee/en/cyber-security/handling-cyber-incidents-cert-ee/reporting-cyber-incident" rel="noopener noreferrer" target="_blank"><strong>Reporting a cyber incident | RIA</strong></a></p><p><a href="https://www.ria.ee/en/authority-news-and-contact/news-media-contact/studies-analyses-overviews" rel="noopener noreferrer" target="_blank"><strong>Studies, analyses, overviews | RIA</strong></a></p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">0a92f2ea-5f83-4da0-abb4-662bef0129c9</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 23 Aug 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/eca7e416-21b6-471a-b891-b72648d9b292/401-Access-Denie-Ep87-Wide-prproj-mixdown.mp3" length="37843521" type="audio/mpeg"/><itunes:duration>26:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>87</itunes:episode><podcast:episode>87</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 86 | How to Write a Cybersecurity Book with Bill Pollock</title><itunes:title>401 Access Denied Podcast Ep. 86 | How to Write a Cybersecurity Book with Bill Pollock</itunes:title><description><![CDATA[<p>From the first editing cuts to the design of the cover, join Joe Carson in speaking with expert book publisher Bill Pollock, as they break down the details on book editing. The journey from writing a first draft to publication can be wrought with challenges, but Bill walks through the process to bringing a cybersecurity book successfully to your audience.&nbsp;</p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>From the first editing cuts to the design of the cover, join Joe Carson in speaking with expert book publisher Bill Pollock, as they break down the details on book editing. The journey from writing a first draft to publication can be wrought with challenges, but Bill walks through the process to bringing a cybersecurity book successfully to your audience.&nbsp;</p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">4da4cead-e080-4b58-aacf-49ddeed98edc</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 09 Aug 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ac4adc3f-283d-4601-aa32-a4b9cb6237c9/401-Access-Denie-Ep86-Wide-prproj-mixdown.mp3" length="80260823" type="audio/mpeg"/><itunes:duration>55:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>86</itunes:episode><podcast:episode>86</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 85 | Key Takeaways from the Verizon DBIR with Tony Goulding</title><itunes:title>401 Access Denied Podcast Ep. 85 | Key Takeaways from the Verizon DBIR with Tony Goulding</itunes:title><description><![CDATA[<p><strong>Key Takeaways from the Verizon DBIR with Tony Goulding</strong></p><p>Join host Joseph Carson and guest Tony Goulding as they break down the annual Verizon breach report. With over 16,000 incidents and more than 5,200 data breaches, there’s a lot to look at. Tony and Joe have some great takeaways from this critical annual report and share their expert insights on what’s new, what’s changed, and what we’re not doing so bad at (hint: MFA goes a long way!)</p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p><strong>Key Takeaways from the Verizon DBIR with Tony Goulding</strong></p><p>Join host Joseph Carson and guest Tony Goulding as they break down the annual Verizon breach report. With over 16,000 incidents and more than 5,200 data breaches, there’s a lot to look at. Tony and Joe have some great takeaways from this critical annual report and share their expert insights on what’s new, what’s changed, and what we’re not doing so bad at (hint: MFA goes a long way!)</p><p>Jump-start your cybersecurity career for FREE with Cybrary!&nbsp;</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">27e3532a-7491-4e36-bf46-750a488a23a0</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 26 Jul 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8563d390-54af-476d-962f-ef34bc449c61/401-Access-Denie-Ep85-Wide-prproj-mixdown.mp3" length="65740439" type="audio/mpeg"/><itunes:duration>45:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>85</itunes:episode><podcast:episode>85</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 84 | The Best of RSAC &amp; Cybersecurity Strategies with Bob Burns</title><itunes:title>401 Access Denied Podcast Ep. 84 | The Best of RSAC &amp; Cybersecurity Strategies with Bob Burns</itunes:title><description><![CDATA[<p>RSAC was the place to be for cybersecurity in 2023, and Joe Carson is joined by Bob Burns to talk all about it. From the sessions that really resonated to the incredible human connections and networking, join Joe and Bob to deconstruct this year’s most comprehensive conference. Were you at RSAC this year? Join us in the comments to let us know your favorite session!</p><p>Jump-start your cybersecurity career for FREE with<a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"> Cybrary</a>!</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>RSAC was the place to be for cybersecurity in 2023, and Joe Carson is joined by Bob Burns to talk all about it. From the sessions that really resonated to the incredible human connections and networking, join Joe and Bob to deconstruct this year’s most comprehensive conference. Were you at RSAC this year? Join us in the comments to let us know your favorite session!</p><p>Jump-start your cybersecurity career for FREE with<a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"> Cybrary</a>!</p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">e63069c5-fa63-4c88-8a62-1c3cdf632f37</guid><itunes:image href="https://artwork.captivate.fm/94441a2b-a2c3-456b-9f46-45884cc81a8a/rpi9oFeQRrP1bnUDCS19OUdi.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 12 Jul 2023 16:15:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cfa7f4dd-50b8-4fbd-ab15-a9e44d9f3a8c/401-Access-Denie-Ep84-Wide-prproj-mixdown.mp3" length="62868579" type="audio/mpeg"/><itunes:duration>43:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>84</itunes:episode><podcast:episode>84</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 83 | The AI Revolution with Diana Kelley</title><itunes:title>401 Access Denied Podcast Ep. 83 | The AI Revolution with Diana Kelley</itunes:title><description><![CDATA[<p>Everybody’s talking about it - the AI revolution is here. But given the rapid evolution in this field, it’s hard to keep up with the sweeping effects this technology is causing. Luckily, Joe Carson is joined by longtime AI expert Diana Kelley to shed light on all of these changes. She addresses the many misconceptions and media misrepresentations surrounding AI, breaks down the different forms of this technology, and emphasizes the need for a better understanding of AI's capabilities and limitations. They also discuss the ethical and legal implications that will only become more potent as AI continues to advance. Now is the best time to learn about AI, and this episode is a great place to start!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Diana!</p><p>~<a href="https://www.linkedin.com/in/dianakelleysecuritycurve/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://www.rsaconference.com/experts/diana-kelley" rel="noopener noreferrer" target="_blank">RSA</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>Everybody’s talking about it - the AI revolution is here. But given the rapid evolution in this field, it’s hard to keep up with the sweeping effects this technology is causing. Luckily, Joe Carson is joined by longtime AI expert Diana Kelley to shed light on all of these changes. She addresses the many misconceptions and media misrepresentations surrounding AI, breaks down the different forms of this technology, and emphasizes the need for a better understanding of AI's capabilities and limitations. They also discuss the ethical and legal implications that will only become more potent as AI continues to advance. Now is the best time to learn about AI, and this episode is a great place to start!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Diana!</p><p>~<a href="https://www.linkedin.com/in/dianakelleysecuritycurve/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://www.rsaconference.com/experts/diana-kelley" rel="noopener noreferrer" target="_blank">RSA</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">68547034-cbd7-4f53-9428-8ece2cb12bcb</guid><itunes:image href="https://artwork.captivate.fm/4a622ae2-873c-40b8-bd71-ca4995e51438/T7J6ZIGUTXAhppLouzETfkxe.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 28 Jun 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/535e8fdf-5a49-4e91-b794-a32f01ba63d7/Ep-83-MIXDOWN.mp3" length="64238277" type="audio/mpeg"/><itunes:duration>44:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>83</itunes:episode><podcast:episode>83</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 82 | Hacking the Government with Bryan Seely</title><itunes:title>401 Access Denied Podcast Ep. 82 | Hacking the Government with Bryan Seely</itunes:title><description><![CDATA[<p>In this eye-opening episode, dive into the captivating world of cybercrime and social engineering with our host, Joe Carson, and special guest Bryan Seely! Bryan, a keynote speaker and cybersecurity expert best known for his Secret Service exposé, discusses his journey from a young computer enthusiast to a renowned public speaker. Join them as they investigate the mindset and techniques used by hackers, such as the use of aliases to deceive and manipulate their targets, as well as the importance of responsible disclosure and changing cybersecurity laws.</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Bryan!</p><p>~<a href="https://www.linkedin.com/in/bryanthemapsguy/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/bryanthemapsguy/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode, dive into the captivating world of cybercrime and social engineering with our host, Joe Carson, and special guest Bryan Seely! Bryan, a keynote speaker and cybersecurity expert best known for his Secret Service exposé, discusses his journey from a young computer enthusiast to a renowned public speaker. Join them as they investigate the mindset and techniques used by hackers, such as the use of aliases to deceive and manipulate their targets, as well as the importance of responsible disclosure and changing cybersecurity laws.</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Bryan!</p><p>~<a href="https://www.linkedin.com/in/bryanthemapsguy/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/bryanthemapsguy/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">25aef99f-3369-4adc-90f3-fb0f4c41d93c</guid><itunes:image href="https://artwork.captivate.fm/5dd9a3fd-3b87-4386-94fa-6c909929b703/Tf2Pm8XvQsdNmyqvTf4AqhP6.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 14 Jun 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6c2f269-e65d-4c47-814b-e91ea269d3f5/Ep-82-MIXDOWN.mp3" length="74971006" type="audio/mpeg"/><itunes:duration>51:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>82</itunes:episode><podcast:episode>82</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 81 | Open Source Intelligence with The Grugq</title><itunes:title>401 Access Denied Podcast Ep. 81 | Open Source Intelligence with The Grugq</itunes:title><description><![CDATA[<p>Given the complex and evolving nature of security, how do different countries approach cyber strategy on a global scale? In this episode of 401 Access Denied, Joe Carson is joined by the one and only Thaddeus E. Grugq (“The Grugq”), who brings along decades of security research and operational security experience. They explore various countries' approaches to cyber operations, including the US, UK and EU, India, Russia, and China. The Grugq also touches on the importance of legal frameworks, cooperation between different government entities, and the dynamic relationships between intelligence groups and law enforcement agencies.</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow The Grugq!</p><p>~<a href="https://www.linkedin.com/in/grugq/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/thegrugq/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>Given the complex and evolving nature of security, how do different countries approach cyber strategy on a global scale? In this episode of 401 Access Denied, Joe Carson is joined by the one and only Thaddeus E. Grugq (“The Grugq”), who brings along decades of security research and operational security experience. They explore various countries' approaches to cyber operations, including the US, UK and EU, India, Russia, and China. The Grugq also touches on the importance of legal frameworks, cooperation between different government entities, and the dynamic relationships between intelligence groups and law enforcement agencies.</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=open-source-intelligence-with-the-grugq" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow The Grugq!</p><p>~<a href="https://www.linkedin.com/in/grugq/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/thegrugq/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">3e6e3d15-99b7-4ef7-bbe3-b297eb3b1b3b</guid><itunes:image href="https://artwork.captivate.fm/00df92ed-d503-4e6b-bdf8-0d2b552c6409/8yVNQKagZu8uAtXTbLPOaZI-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 31 May 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2de06577-5a93-4a6c-ab06-43f426a38d4e/Ep-81-MIXDOWN.mp3" length="79233042" type="audio/mpeg"/><itunes:duration>55:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>81</itunes:episode><podcast:episode>81</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 80 | Cybersecurity in the Boardroom with Art Gilliland</title><itunes:title>401 Access Denied Podcast Ep. 80 | Cybersecurity in the Boardroom with Art Gilliland</itunes:title><description><![CDATA[<p>On paper, the board of a company should serve to protect the security of their business. But what functions are actually involved in that process? In this episode of 401 Access Denied, Joe Carson is joined by Delinea’s own CEO, Art Gilliland. Hear straight from the source what exactly goes into leading a company from the security practitioner’s perspective. This inside scoop will demystify what goes on in corporate board rooms, and the big decisions that trickle down through the rest of the company. Tune in to learn more from this unique vantage point!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=cybersecurity-in-the-boardroom-with-art-gilliland" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Art!</p><p>~<a href="https://www.linkedin.com/in/artgilliland/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/artgilliland/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>On paper, the board of a company should serve to protect the security of their business. But what functions are actually involved in that process? In this episode of 401 Access Denied, Joe Carson is joined by Delinea’s own CEO, Art Gilliland. Hear straight from the source what exactly goes into leading a company from the security practitioner’s perspective. This inside scoop will demystify what goes on in corporate board rooms, and the big decisions that trickle down through the rest of the company. Tune in to learn more from this unique vantage point!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=cybersecurity-in-the-boardroom-with-art-gilliland" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Art!</p><p>~<a href="https://www.linkedin.com/in/artgilliland/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/artgilliland/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">6064cce0-9aa7-47b8-801d-a59fbff6b17a</guid><itunes:image href="https://artwork.captivate.fm/ae787884-5dff-4a9e-a2e6-113350eff6b6/QoSAnjtVkinezctfUZHZQ0LU.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 17 May 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/552e24f4-a35a-42ef-9761-8a2e3c1f3725/Ep-80-MIXDOWN.mp3" length="56489103" type="audio/mpeg"/><itunes:duration>39:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>80</itunes:episode><podcast:episode>80</podcast:episode><itunes:summary>On paper, the board of a company should serve to protect the security of their business. But what functions are actually involved in that process? In this episode of 401 Access Denied, Joe Carson is joined by Delinea’s own CEO, Art Gilliland. Hear straight from the source what exactly goes into leading a company from the security practitioner’s perspective.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 79 | The State of Passwords with Dustin Heywood (aka Evil Mog)</title><itunes:title>401 Access Denied Podcast Ep. 79 | The State of Passwords with Dustin Heywood (aka Evil Mog)</itunes:title><description><![CDATA[<p>Did you know that May 4th is World Password Day? To celebrate, we invited top hacker Dustin Heywood (aka Evil Mog) to the 401 Access Denied Podcast to discuss the state of passwords! He and Joe Carson take a close look at where passwords currently stand in our rapidly evolving cyber climate, as well as what the future holds. Together, they answer the increasingly asked question, “Are passwords really dead?” Tune in to find out!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=the-state-of-passwords-with-evil-mog" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Evil Mog!</p><p>~<a href="https://www.linkedin.com/in/evilmog/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/Evil_Mog/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>Did you know that May 4th is World Password Day? To celebrate, we invited top hacker Dustin Heywood (aka Evil Mog) to the 401 Access Denied Podcast to discuss the state of passwords! He and Joe Carson take a close look at where passwords currently stand in our rapidly evolving cyber climate, as well as what the future holds. Together, they answer the increasingly asked question, “Are passwords really dead?” Tune in to find out!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=youtube&amp;utm_medium=video&amp;utm_campaign=the-state-of-passwords-with-evil-mog" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Evil Mog!</p><p>~<a href="https://www.linkedin.com/in/evilmog/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/Evil_Mog/" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">dfa4c16b-53f1-450a-a3a1-a55b9cfb97f8</guid><itunes:image href="https://artwork.captivate.fm/e3444e91-5e62-436a-ac95-20c2d0969e8a/qsdrs9gb1MIdr_REeJOHcBdh.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 03 May 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/75972f62-6d79-49c3-aa2b-ec054f3a7653/Ep-79-MIXDOWN.mp3" length="47404179" type="audio/mpeg"/><itunes:duration>32:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>79</itunes:episode><podcast:episode>79</podcast:episode><itunes:summary>In celebration of World Password Day, we invited top hacker Dustin Heywood (aka Evil Mog) to the 401 Access Denied Podcast to discuss the state of passwords! He and Joe Carson take a close look at where passwords currently stand in our rapidly evolving cyber climate, as well as what the future holds. Together, they answer the increasingly asked question, “Are passwords really dead?”</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 78 | The Real Adversaries with Dan Card</title><itunes:title>401 Access Denied Podcast Ep. 78 | The Real Adversaries with Dan Card</itunes:title><description><![CDATA[<p>Over the years, we’ve all seen a lot of the same cybersecurity-centric messaging. But realistically, how many of these talking points are still potent and relevant? Luckily, Joe Carson is joined by CISO and security consultant Dan Card to help answer that question! This humorous yet informative discussion takes a critical look at established “truths” in security to see if they still hold up. Tune in to learn about the communication disconnect between security practitioners and the average person.</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=the-real-adversaries-with-dan-card/" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Dan!</p><p>~<a href="https://www.linkedin.com/in/dancard/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/UK_Daniel_Card" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>Over the years, we’ve all seen a lot of the same cybersecurity-centric messaging. But realistically, how many of these talking points are still potent and relevant? Luckily, Joe Carson is joined by CISO and security consultant Dan Card to help answer that question! This humorous yet informative discussion takes a critical look at established “truths” in security to see if they still hold up. Tune in to learn about the communication disconnect between security practitioners and the average person.</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=the-real-adversaries-with-dan-card/" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Dan!</p><p>~<a href="https://www.linkedin.com/in/dancard/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/UK_Daniel_Card" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">629beed3-493b-450a-aba5-9297e705bdd3</guid><itunes:image href="https://artwork.captivate.fm/c88e16ca-aaf7-46d5-8b35-0c44224083bc/4Lf5VnyvHm8fd077R48rBqHx.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 19 Apr 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/026742ea-d4f1-4cf2-afb9-5a8a7d27cca7/Ep-78-MIXDOWN.mp3" length="82366174" type="audio/mpeg"/><itunes:duration>56:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>78</itunes:episode><podcast:episode>78</podcast:episode><itunes:summary>Over the years, we’ve all seen a lot of the same cybersecurity-centric messaging. But realistically, how many of these talking points are still potent and relevant? Tune in to learn about the communication disconnect between security practitioners and the average person.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 77 | Cybersecurity Unicorns with Bryson Bort</title><itunes:title>401 Access Denied Podcast Ep. 77 | Cybersecurity Unicorns with Bryson Bort</itunes:title><description><![CDATA[<p>Does your business have the infrastructure, tools, and people to stay ahead of cyber attacks? In this episode of 401 Access Denied, Joe Carson is joined by the one and only cyber unicorn - Bryson Bort! When it comes to building a company with the necessary foundation to maximize security, Bryson has you covered.&nbsp;As the founder of organizations including SCYTHE and GRIMM Cyber, he comes with a wealth of knowledge on how to protect your business from the ground up with stronger purple teaming. Join the fun in this exciting conversation!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cybersecurity-unicorns-with-bryson-bort/" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Bryson!</p><p>~<a href="https://www.linkedin.com/in/brysonbort/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/brysonbort" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></description><content:encoded><![CDATA[<p>Does your business have the infrastructure, tools, and people to stay ahead of cyber attacks? In this episode of 401 Access Denied, Joe Carson is joined by the one and only cyber unicorn - Bryson Bort! When it comes to building a company with the necessary foundation to maximize security, Bryson has you covered.&nbsp;As the founder of organizations including SCYTHE and GRIMM Cyber, he comes with a wealth of knowledge on how to protect your business from the ground up with stronger purple teaming. Join the fun in this exciting conversation!</p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cybersecurity-unicorns-with-bryson-bort/" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Follow Bryson!</p><p>~<a href="https://www.linkedin.com/in/brysonbort/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/brysonbort" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">95ead8d9-0801-4842-b3d9-edacc0a0ebba</guid><itunes:image href="https://artwork.captivate.fm/8fc3a88f-a11e-4378-873a-8553d2ad112a/sA9_ZvPoxHRUDCRF_Yw3bxK5.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 05 Apr 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/518e6f7c-4fea-4858-87ba-d5420783a6c1/Ep-77-MIXDOWN.mp3" length="72463122" type="audio/mpeg"/><itunes:duration>50:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>77</itunes:episode><podcast:episode>77</podcast:episode><itunes:summary>When it comes to building a company with the necessary foundation to maximize security, Bryson Bort has you covered.  As the founder of organizations including SCYTHE and GRIMM Cyber, he comes with a wealth of knowledge on how to protect your business from the ground up with stronger purple teaming.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 76 | Discovering and Stealing Secrets with Mackenzie Jackson</title><itunes:title>401 Access Denied Podcast Ep. 76 | Discovering and Stealing Secrets with Mackenzie Jackson</itunes:title><description><![CDATA[<p>How can programmers prevent breaches and bolster security from the root of their code? Joe Carson is joined by Mackenzie Jackson, a developer advocate for GitGuardian, who are leaders in helping keep secrets and credentials out of source code. Mackenzie explains the primary ways attackers are able to exploit these secrets, and how developers can defend against their attacks. These lessons are vital for overall security in all sectors, so don’t miss out on this episode!</p><p>Follow Mackenzie!</p><p>~<a href="https://www.linkedin.com/in/advocatemack/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/advocatemack" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=discovering-and-stealing-secrets" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>How can programmers prevent breaches and bolster security from the root of their code? Joe Carson is joined by Mackenzie Jackson, a developer advocate for GitGuardian, who are leaders in helping keep secrets and credentials out of source code. Mackenzie explains the primary ways attackers are able to exploit these secrets, and how developers can defend against their attacks. These lessons are vital for overall security in all sectors, so don’t miss out on this episode!</p><p>Follow Mackenzie!</p><p>~<a href="https://www.linkedin.com/in/advocatemack/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/advocatemack" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=discovering-and-stealing-secrets" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">454a67c2-edbb-4fb0-978c-6ac8a27334ef</guid><itunes:image href="https://artwork.captivate.fm/e74966e1-d326-4085-b7b0-44a5cfe36a7b/tYm723N-Pq8hJO47YuO6FHYN.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 22 Mar 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ce10134f-98d7-4fb2-be23-ae09469692ae/Ep-76-MIXDOWN.mp3" length="47415258" type="audio/mpeg"/><itunes:duration>32:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>76</itunes:episode><podcast:episode>76</podcast:episode><itunes:summary>Joe Carson is joined by Mackenzie Jackson, a developer advocate for GitGuardian, who are leaders in helping keep secrets and credentials out of source code. Mackenzie explains the primary ways attackers are able to exploit these secrets, and how developers can defend against their attacks.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Real-World Quantum Security with Patero | Cybrary Podcast Ep. 105</title><itunes:title>Real-World Quantum Security with Patero | Cybrary Podcast Ep. 105</itunes:title><description><![CDATA[<p>Through the first three episodes of our podcast mini-series with Patero, we’ve learned all about the opportunities and risks involved with quantum computing. In this fourth and final installment, Ron Lewis wraps up the discussion by answering the big question - what now? With a lot of uncertainty over our future with quantum, Ron takes a methodical and logical approach as to how we can best prepare ourselves for the inevitable shift that this technology will bring.</p><p>Discover <a href="https://app.sounder.fm/shows/13106/episodes/~https%3A//patero.io/" rel="noopener noreferrer" target="_blank">Patero</a>!</p><p>Learn more about <a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank">the quantum threat</a>!</p><p>See the research from NIST:</p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a></p><p>Follow us on Social!!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Jump-start your cybersecurity career today with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=real-world-quantum-security-with-patero" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Through the first three episodes of our podcast mini-series with Patero, we’ve learned all about the opportunities and risks involved with quantum computing. In this fourth and final installment, Ron Lewis wraps up the discussion by answering the big question - what now? With a lot of uncertainty over our future with quantum, Ron takes a methodical and logical approach as to how we can best prepare ourselves for the inevitable shift that this technology will bring.</p><p>Discover <a href="https://app.sounder.fm/shows/13106/episodes/~https%3A//patero.io/" rel="noopener noreferrer" target="_blank">Patero</a>!</p><p>Learn more about <a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank">the quantum threat</a>!</p><p>See the research from NIST:</p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a></p><p>Follow us on Social!!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Jump-start your cybersecurity career today with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=real-world-quantum-security-with-patero" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">dc63931b-a25f-4b0f-914f-26829dd6a0c5</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 15 Mar 2023 16:15:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/96544ea6-c578-499f-8325-d431d4dd6844/Cybrary-Ep105-Revised-prproj-mixdown.mp3" length="63217473" type="audio/mpeg"/><itunes:duration>43:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ron Lewis joins us again to wrap up our quantum computing podcast mini-series by answering the big question - what now? With a lot of uncertainty over our future with quantum, Ron takes a methodical and logical approach as to how we can best prepare ourselves for the inevitable shift that this technology will bring.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 75 | Security &amp; Trust in Voting Systems with Christian Folini</title><itunes:title>401 Access Denied Podcast Ep. 75 | Security &amp; Trust in Voting Systems with Christian Folini</itunes:title><description><![CDATA[<p>As technology advances, how can governments and organizations keep up in order to maintain, secure, and legitimize elections? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with security engineer Christian Folini to discuss how diversifying tech is democratizing elections. Gain insight into the rise and impact of online voting, including the recent Estonian Prime Minister election where the predominant voting method was over the internet. You won’t want to miss this pertinent conversation!</p><p>Follow Christian!</p><p>~<a href="https://www.linkedin.com/in/christian-folini-588ba278" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://www.twitter.com/ChrFolini" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.youtube.com/@ChristianFolini" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=security-and-trust-in-voting-systems" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>As technology advances, how can governments and organizations keep up in order to maintain, secure, and legitimize elections? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with security engineer Christian Folini to discuss how diversifying tech is democratizing elections. Gain insight into the rise and impact of online voting, including the recent Estonian Prime Minister election where the predominant voting method was over the internet. You won’t want to miss this pertinent conversation!</p><p>Follow Christian!</p><p>~<a href="https://www.linkedin.com/in/christian-folini-588ba278" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://www.twitter.com/ChrFolini" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.youtube.com/@ChristianFolini" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=security-and-trust-in-voting-systems" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">9e7f11be-3860-4950-97ae-425d381fe7c3</guid><itunes:image href="https://artwork.captivate.fm/e642e5e2-c3e8-4e65-97fa-d250884c5910/kBW7bRIeHatBT2b_an6cWPUy.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 08 Mar 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/30ccfa93-884e-4142-b32f-c62c507fee77/Ep-75-MIXDOWN.mp3" length="52141280" type="audio/mpeg"/><itunes:duration>36:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>75</itunes:episode><podcast:episode>75</podcast:episode><itunes:summary>Tune into this episode of 401 Access Denied, where Joe Carson speaks with security engineer Christian Folini to discuss how diversifying tech is democratizing elections. Gain insight into the rise and impact of online voting, including the recent Estonian Prime Minister election where the predominant voting method was electronic.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Empowering Women in Tech with Mari Galloway | Cybrary Podcast Ep. 104</title><itunes:title>Empowering Women in Tech with Mari Galloway | Cybrary Podcast Ep. 104</itunes:title><description><![CDATA[<p>The fields of technology and cybersecurity can be intimidating to jump into, especially for women and minorities. That didn’t stop Mari Galloway from carving out her own path full of successes. As the founder and CEO of Women’s Society of Cyberjutsu, Mari’s story is inspiring and a great example of how to overcome the odds in this domain.</p><p>Follow Mari!</p><p>~<a href="https://www.linkedin.com/in/themarigalloway/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/marigalloway" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow the Women's Society of Cyberjutsu!</p><p>~<a href="https://www.linkedin.com/company/women's-society-of-cyberjutsu/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/WomenCyberjutsu" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=empowering-women-in-tech" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>The fields of technology and cybersecurity can be intimidating to jump into, especially for women and minorities. That didn’t stop Mari Galloway from carving out her own path full of successes. As the founder and CEO of Women’s Society of Cyberjutsu, Mari’s story is inspiring and a great example of how to overcome the odds in this domain.</p><p>Follow Mari!</p><p>~<a href="https://www.linkedin.com/in/themarigalloway/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/marigalloway" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow the Women's Society of Cyberjutsu!</p><p>~<a href="https://www.linkedin.com/company/women's-society-of-cyberjutsu/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/WomenCyberjutsu" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=empowering-women-in-tech" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">f0fb451e-aa68-4c0f-b33f-575591864c38</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 01 Mar 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/887d2a2d-ae5a-4acf-b351-5bf3fbbf73b5/Cybrary-Ep104-Revised-prproj-mixdown.mp3" length="68824833" type="audio/mpeg"/><itunes:duration>47:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mari Galloway carved out her own path full of successes. As the founder and CEO of Women’s Society of Cyberjutsu, Mari’s story is inspiring and a great example of how to overcome the odds in this domain.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 74 | Decentralized Centralization with Brian Honan</title><itunes:title>401 Access Denied Podcast Ep. 74 | Decentralized Centralization with Brian Honan</itunes:title><description><![CDATA[<p>How have businesses adapted to the ever-evolving field of cybersecurity over the years? Join Joe Carson as he catches up with long-time friend Brian Honan for an entertaining and informative conversation. Brian’s decades of experience in IT, cybersecurity, consulting, and executive leadership offers a unique perspective full of wisdom and anecdotes. Newcomers and cyber experts alike won’t want to miss this engaging discussion!</p><p>Follow Brian!</p><p>~<a href="https://www.linkedin.com/in/brianhonan" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://www.twitter.com/brianhonan" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>Jump-start your cybersecurity career for FREE at <a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=decentralized-centralization-with-brian-honan" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p>]]></description><content:encoded><![CDATA[<p>How have businesses adapted to the ever-evolving field of cybersecurity over the years? Join Joe Carson as he catches up with long-time friend Brian Honan for an entertaining and informative conversation. Brian’s decades of experience in IT, cybersecurity, consulting, and executive leadership offers a unique perspective full of wisdom and anecdotes. Newcomers and cyber experts alike won’t want to miss this engaging discussion!</p><p>Follow Brian!</p><p>~<a href="https://www.linkedin.com/in/brianhonan" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://www.twitter.com/brianhonan" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>Jump-start your cybersecurity career for FREE at <a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=decentralized-centralization-with-brian-honan" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">2a30b28b-bac5-4a56-bb1a-1d1164ff957f</guid><itunes:image href="https://artwork.captivate.fm/47643a0f-a676-42fd-be94-022769fbd111/7BbbUGsp74CT1js0RKQTz38D.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 22 Feb 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2c691937-3826-480e-ae5a-dee2b8a71b76/Ep-74-MIXDOWN.mp3" length="59666720" type="audio/mpeg"/><itunes:duration>41:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>74</itunes:episode><podcast:episode>74</podcast:episode><itunes:summary>Join Joe Carson as he catches up with long-time friend Brian Honan for an entertaining and informative conversation. Brian’s decades of experience in IT, cybersecurity, consulting, and executive leadership offers a unique perspective full of wisdom and anecdotes.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>No More NO From Your CISO with Patero | Cybrary Podcast Ep. 103</title><itunes:title>No More NO From Your CISO with Patero | Cybrary Podcast Ep. 103</itunes:title><description><![CDATA[<p>In the third episode of our fascinating podcast miniseries on quantum computing, we are joined again by Ron Lewis, VP of Customer Success and Innovation at Patero, for an in-depth discussion on the intersection of quantum and cybersecurity! Ron applies everything we've learned about quantum thus far to recent breaches and security news. How can quantum technology bolster your defense-in-depth strategy, help mitigate cyber threats, and protect the integrity of your network? Tune in to start utilizing quantum to revolutionize your organization's security solutions!</p><p>Discover <a href="https://app.sounder.fm/shows/13106/episodes/~https%3A//patero.io/" rel="noopener noreferrer" target="_blank">Patero</a>!</p><p>Learn more about <a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank">the quantum threat</a>!</p><p>See the research from NIST:</p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a></p><p>Follow us on Social!!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Jump-start your cybersecurity career for FREE at <a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=no-more-no-from-your-ciso-with-patero" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p>]]></description><content:encoded><![CDATA[<p>In the third episode of our fascinating podcast miniseries on quantum computing, we are joined again by Ron Lewis, VP of Customer Success and Innovation at Patero, for an in-depth discussion on the intersection of quantum and cybersecurity! Ron applies everything we've learned about quantum thus far to recent breaches and security news. How can quantum technology bolster your defense-in-depth strategy, help mitigate cyber threats, and protect the integrity of your network? Tune in to start utilizing quantum to revolutionize your organization's security solutions!</p><p>Discover <a href="https://app.sounder.fm/shows/13106/episodes/~https%3A//patero.io/" rel="noopener noreferrer" target="_blank">Patero</a>!</p><p>Learn more about <a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank">the quantum threat</a>!</p><p>See the research from NIST:</p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a></p><p>Follow us on Social!!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Jump-start your cybersecurity career for FREE at <a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=no-more-no-from-your-ciso-with-patero" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">a6eb1e19-70c2-4cc9-b10a-9f3b0ccb5d30</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 15 Feb 2023 19:45:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1125c3ce-5050-4281-9a2d-137601dcdb17/Cybrary-Ep103-Revised-prproj-mixdown.mp3" length="73313601" type="audio/mpeg"/><itunes:duration>50:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ron Lewis from Patero joins the Cybrary Podcast for the 3rd episode of our quantum miniseries to discuss how quantum technology can revolutionize your organization&apos;s security solutions!</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 73 | Cybersecurity Government Task Force with Jen Ellis</title><itunes:title>401 Access Denied Podcast Ep. 73 | Cybersecurity Government Task Force with Jen Ellis</itunes:title><description><![CDATA[<p>Have you ever wondered how cybersecurity policy gets created, updated, and enforced? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with Jen Ellis, founder of NextJenSecurity and board member of several major cybersecurity institutions including the UK Government, to discuss the ins and outs of cyber policy. Learn how entities, including governments, corporations, and individuals, interact with and are impacted by these policies. Jen is a leader in this space, so tune in and gain a lot of insight on this important topic!</p><p>Follow Jen!</p><p>~<a href="https://www.linkedin.com/in/infosecjen/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="www.twitter.com/infosecjen" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>Jump-start your cybersecurity career for FREE at <a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cybersecurity-government-task-force-with-jen-ellis" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p>]]></description><content:encoded><![CDATA[<p>Have you ever wondered how cybersecurity policy gets created, updated, and enforced? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with Jen Ellis, founder of NextJenSecurity and board member of several major cybersecurity institutions including the UK Government, to discuss the ins and outs of cyber policy. Learn how entities, including governments, corporations, and individuals, interact with and are impacted by these policies. Jen is a leader in this space, so tune in and gain a lot of insight on this important topic!</p><p>Follow Jen!</p><p>~<a href="https://www.linkedin.com/in/infosecjen/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="www.twitter.com/infosecjen" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Follow us on Social!</p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>Jump-start your cybersecurity career for FREE at <a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cybersecurity-government-task-force-with-jen-ellis" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">73cb3edd-958c-4bd4-bf00-8118fb7bdec6</guid><itunes:image href="https://artwork.captivate.fm/953d3b13-524e-467e-a3b4-f42d6cc18a33/5JpqR6Iwb1MsFalkCcBN8xXe.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 08 Feb 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/719b9edd-6ead-4e5b-b25e-38080a7d5f72/401-Ep-73-MIXDOWN.mp3" length="83767971" type="audio/mpeg"/><itunes:duration>57:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>73</itunes:episode><podcast:episode>73</podcast:episode><itunes:summary>In this episode of the 401 Access Denied Podcast, Joe Carson speaks with Jen Ellis, founder of NextJenSecurity and board member of several major cybersecurity institutions including the UK Government, to discuss the ins and outs out cyber policy.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>The Power of Diversity in Cybersecurity with Blacks in Cyber | The Cybrary Podcast Ep. 102</title><itunes:title>The Power of Diversity in Cybersecurity with Blacks in Cyber | The Cybrary Podcast Ep. 102</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we dive into the mission, vision, and future of Blacks in Cybersecurity (BIC) and how they're making waves in the industry. From the challenges they've faced to the opportunities they see, Michaela Barnett, CEO, and Arthur Pryor, Director of Operations, share their expertise and insights to help you navigate the cyber landscape. Plus, get the inside scoop on what to look out for and what advice to follow for anyone looking to break into the field by 2023. Tune in now for an electrifying episode you won't want to miss!</p><p><strong>Discover </strong><a href="https://www.blacksincyberconf.com/" rel="noopener noreferrer" target="_blank"><strong>Blacks in Cybersecurity</strong></a><strong>!</strong></p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-power-of-diversity-in-cybersecurity" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we dive into the mission, vision, and future of Blacks in Cybersecurity (BIC) and how they're making waves in the industry. From the challenges they've faced to the opportunities they see, Michaela Barnett, CEO, and Arthur Pryor, Director of Operations, share their expertise and insights to help you navigate the cyber landscape. Plus, get the inside scoop on what to look out for and what advice to follow for anyone looking to break into the field by 2023. Tune in now for an electrifying episode you won't want to miss!</p><p><strong>Discover </strong><a href="https://www.blacksincyberconf.com/" rel="noopener noreferrer" target="_blank"><strong>Blacks in Cybersecurity</strong></a><strong>!</strong></p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-power-of-diversity-in-cybersecurity" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">5d568223-fdf7-4393-af6e-c92f9beb0563</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 01 Feb 2023 11:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/626ea83a-6fd5-43ee-8087-bab71995f631/Ep-102-BIC-FINAL-Audio.mp3" length="28315010" type="audio/mpeg"/><itunes:duration>29:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we dive into the mission, vision, and future of Blacks in Cybersecurity (BIC) and how they&apos;re making waves in the industry.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 72 | Mistaken Identities with Paul Simmonds</title><itunes:title>401 Access Denied Podcast Ep. 72 | Mistaken Identities with Paul Simmonds</itunes:title><description><![CDATA[<p>How can you establish a better security culture for your business and life? In this episode of the 401 Access Denied Podcast, Joe Carson sits down with “Serial CISO” (Motorola, AstraZeneca) and Security Analyst Paul Simmonds, CEO of the Global Identity Foundation, to discuss why Zero-Trust has only intensified at the height of an ever-evolving digital age. You won’t want to miss Paul’s philosophy on securing your identity and assets against any given entity, risk, or persona!</p><p><strong>Follow Paul!!</strong></p><p>~<a href="https://www.linkedin.com/in/psimmonds/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/simmonds_paul" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p><strong>Check out the Global Identity Foundation!</strong></p><p><br></p><p>~<a href="https://www.globalidentityfoundation.org/" rel="noopener noreferrer" target="_blank">https://www.globalidentityfoundation.org/</a></p><p><br></p><p><strong>Check out these blogs from the Global Identity Foundation!</strong></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2022/11/mistaken-identity-part1.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 1</a></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2022/11/mistaken-identity-part2.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 2</a></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2022/12/mistaken-identity-part3.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 3</a></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2023/01/mistaken-identity-part4.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 4</a>&nbsp;</p><p><br></p><p>~<a href="https://www.globalidentity.blog/2023/01/mistaken-identity-part5.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 5</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=mistaken-identities-with-paul-simmonds" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>How can you establish a better security culture for your business and life? In this episode of the 401 Access Denied Podcast, Joe Carson sits down with “Serial CISO” (Motorola, AstraZeneca) and Security Analyst Paul Simmonds, CEO of the Global Identity Foundation, to discuss why Zero-Trust has only intensified at the height of an ever-evolving digital age. You won’t want to miss Paul’s philosophy on securing your identity and assets against any given entity, risk, or persona!</p><p><strong>Follow Paul!!</strong></p><p>~<a href="https://www.linkedin.com/in/psimmonds/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>~<a href="https://twitter.com/simmonds_paul" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p><strong>Check out the Global Identity Foundation!</strong></p><p><br></p><p>~<a href="https://www.globalidentityfoundation.org/" rel="noopener noreferrer" target="_blank">https://www.globalidentityfoundation.org/</a></p><p><br></p><p><strong>Check out these blogs from the Global Identity Foundation!</strong></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2022/11/mistaken-identity-part1.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 1</a></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2022/11/mistaken-identity-part2.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 2</a></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2022/12/mistaken-identity-part3.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 3</a></p><p><br></p><p>~<a href="https://www.globalidentity.blog/2023/01/mistaken-identity-part4.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 4</a>&nbsp;</p><p><br></p><p>~<a href="https://www.globalidentity.blog/2023/01/mistaken-identity-part5.html" rel="noopener noreferrer" target="_blank">Mistaken Identity Part 5</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=mistaken-identities-with-paul-simmonds" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-podcast-ep-72-mistaken-identiti]]></link><guid isPermaLink="false">714f946e-9470-40f2-9eae-79f6d1ff9774</guid><itunes:image href="https://artwork.captivate.fm/6a914dc1-4693-4f34-b209-32a805a8df11/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Tue, 24 Jan 2023 22:24:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/958bd914-7f16-4d4e-a78a-fcc554975046/audio-498954-13106-29857-47b8d496-34ec-4266-8fa5-743a44f0a9a0.mp3" length="54485307" type="audio/mpeg"/><itunes:duration>56:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>72</itunes:episode><podcast:episode>72</podcast:episode><itunes:summary>In this episode of the 401 Access Denied Podcast, Joe Carson sits down with “Serial CISO” (Motorola, AstraZeneca) and Security Analyst Paul Simmonds, CEO of the Global Identity Foundation, to discuss why Zero-Trust has only intensified at the height of an ever-evolving digital age.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>The Q&apos;s of Quantum with Ron Lewis of Patero | The Cybrary Podcast Ep. 101</title><itunes:title>The Q&apos;s of Quantum with Ron Lewis of Patero | The Cybrary Podcast Ep. 101</itunes:title><description><![CDATA[<p>In part 2 of our Quantum-focused series, the Cybrary Podcast welcomes back Ron Lewis, VP of Customer Success and Innovation at Patero. We've explored how quantum computing impacts cybersecurity professionals as both a threat to encryption and as a machine learning tool. In this episode, Ron shares his deep wealth of knowledge on the "Q's of Quantum" and the history of the field of study around Quantum Random Number Generation (QRNG).</p><p><strong>Discover </strong><a href="https://app.sounder.fm/shows/13106/episodes/~https%3A//patero.io/" rel="noopener noreferrer" target="_blank"><strong>Patero</strong></a><strong>!</strong></p><p><strong>Learn more about </strong><a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank"><strong>the quantum threat</strong></a><strong>!</strong></p><p><strong>See the research from NIST:</strong></p><p><br></p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-qs-of-quantum-with-ron-lewis-of-patero" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>In part 2 of our Quantum-focused series, the Cybrary Podcast welcomes back Ron Lewis, VP of Customer Success and Innovation at Patero. We've explored how quantum computing impacts cybersecurity professionals as both a threat to encryption and as a machine learning tool. In this episode, Ron shares his deep wealth of knowledge on the "Q's of Quantum" and the history of the field of study around Quantum Random Number Generation (QRNG).</p><p><strong>Discover </strong><a href="https://app.sounder.fm/shows/13106/episodes/~https%3A//patero.io/" rel="noopener noreferrer" target="_blank"><strong>Patero</strong></a><strong>!</strong></p><p><strong>Learn more about </strong><a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank"><strong>the quantum threat</strong></a><strong>!</strong></p><p><strong>See the research from NIST:</strong></p><p><br></p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-qs-of-quantum-with-ron-lewis-of-patero" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-101]]></link><guid isPermaLink="false">531b5847-8a5a-4b4f-af8c-ffdc78234354</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Thu, 19 Jan 2023 00:10:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c58190d3-116e-4331-9697-89ec3ce179c1/Cybrary-Ep101-Revised-prproj-mixdown.mp3" length="61136385" type="audio/mpeg"/><itunes:duration>42:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In part 2 of our Quantum-focused series, we welcome back Ron Lewis, VP of Customer Success and Innovation at Patero. In this episode, Ron shares his knowledge on the &quot;Q&apos;s of Quantum&quot; and the history of the field of study around Quantum Random Number Generation (QRNG).</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 71 | Hacking It Live with NahamSec</title><itunes:title>401 Access Denied Podcast Ep. 71 | Hacking It Live with NahamSec</itunes:title><description><![CDATA[<p>Who knew that casual livestream ethical hacking could lead to a full-time content creation career? The one-and-only Ben Sadeghipour aka NahamSec takes us down memory lane from the time he studied computer science and digital marketing in college to the moment he saw a promising future in bug bounty hunting. Get into the livestream hacker's mindset in this fun conversation about mentorship and community building in the cybersecurity space!</p><p><strong>Follow NahamSec!</strong></p><p>~<a href="https://twitter.com/nahamsec" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p>~<a href="https://www.youtube.com/c/nahamsec" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.twitch.tv/nahamsec" rel="noopener noreferrer" target="_blank">Twitch</a>&nbsp;</p><p><strong>Consider Donating to the </strong><a href="https://www.lls.org/office/sacramento-ca" rel="noopener noreferrer" target="_blank"><strong>The Leukemia &amp; Lymphoma Society® (LLS)</strong></a></p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=hacking-it-live-with-nahamsec" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Who knew that casual livestream ethical hacking could lead to a full-time content creation career? The one-and-only Ben Sadeghipour aka NahamSec takes us down memory lane from the time he studied computer science and digital marketing in college to the moment he saw a promising future in bug bounty hunting. Get into the livestream hacker's mindset in this fun conversation about mentorship and community building in the cybersecurity space!</p><p><strong>Follow NahamSec!</strong></p><p>~<a href="https://twitter.com/nahamsec" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p>~<a href="https://www.youtube.com/c/nahamsec" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.twitch.tv/nahamsec" rel="noopener noreferrer" target="_blank">Twitch</a>&nbsp;</p><p><strong>Consider Donating to the </strong><a href="https://www.lls.org/office/sacramento-ca" rel="noopener noreferrer" target="_blank"><strong>The Leukemia &amp; Lymphoma Society® (LLS)</strong></a></p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=hacking-it-live-with-nahamsec" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/ep-71-hacking-it-live-with-nahamsec]]></link><guid isPermaLink="false">02fe382d-4ed1-43c6-94e0-01672477cc01</guid><itunes:image href="https://artwork.captivate.fm/f7426dfe-4172-4f64-b2a3-6d19a10abeb2/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 11 Jan 2023 15:52:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cbd3f27c-3e94-4cec-917e-9df38b806383/audio-498364-13106-29857-a91254ea-0c32-4527-bef8-3febd33fac10.mp3" length="44025878" type="audio/mpeg"/><itunes:duration>45:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>71</itunes:episode><podcast:episode>71</podcast:episode><itunes:summary>The one-and-only Ben Sadeghipour aka NahamSec takes us down memory lane from the time he studied computer science and digital marketing in college to the moment he saw a promising future in bug bounty hunting. Get into the livestream hacker&apos;s mindset in this fun conversation about mentorship and community building in the cybersecurity space!</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 70 | Cybersecurity Year in Review and 2023 Predictions with Dan Lohrmann</title><itunes:title>401 Access Denied Podcast Ep. 70 | Cybersecurity Year in Review and 2023 Predictions with Dan Lohrmann</itunes:title><description><![CDATA[<p>What were the biggest cybersecurity trends of 2022, and which types of threats do experts predict we should prepare for in 2023? Dan Lohrmann, Field CISO with Presidio, returns to the 401 Access Denied Podcast to provide a consolidated perspective on all the trends from an eventful year. From the war in Ukraine to the rise in cyber mercenary attacks, hacktivism, cloud hacks, and deepfakes, we're welcoming 2023 with a careful review of all the most memorable topics!</p><p><strong>Read Dan's article on "The Top 23 Security Predictions for 2023"  </strong></p><p>~<a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-1" rel="noopener noreferrer" target="_blank">The Top 23 Security Predictions for 2023 Part 1</a>&nbsp;</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cybersecurity-year-in-review-and-2023-predictions" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>What were the biggest cybersecurity trends of 2022, and which types of threats do experts predict we should prepare for in 2023? Dan Lohrmann, Field CISO with Presidio, returns to the 401 Access Denied Podcast to provide a consolidated perspective on all the trends from an eventful year. From the war in Ukraine to the rise in cyber mercenary attacks, hacktivism, cloud hacks, and deepfakes, we're welcoming 2023 with a careful review of all the most memorable topics!</p><p><strong>Read Dan's article on "The Top 23 Security Predictions for 2023"  </strong></p><p>~<a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-23-security-predictions-for-2023-part-1" rel="noopener noreferrer" target="_blank">The Top 23 Security Predictions for 2023 Part 1</a>&nbsp;</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cybersecurity-year-in-review-and-2023-predictions" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-podcast-ep-70]]></link><guid isPermaLink="false">17aed24b-4119-47ca-b996-694de272e739</guid><itunes:image href="https://artwork.captivate.fm/f3082b8e-e1a0-4d55-ac93-388c3da78d13/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 28 Dec 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8dc6247e-4f23-437f-8e4c-401975f5bb0e/audio-497181-13106-29857-cabe6a7c-61b6-409d-8124-6fe55b17cbbb.mp3" length="36555694" type="audio/mpeg"/><itunes:duration>38:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>70</itunes:episode><podcast:episode>70</podcast:episode><itunes:summary>Dan Lohrmann, Field CISO with Presidio, returns to the 401 Access Denied Podcast to provide a consolidated perspective on all the trends from an eventful year.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Going Phishing with ChatGPT | The Cybrary Podcast Ep. 100</title><itunes:title>Going Phishing with ChatGPT | The Cybrary Podcast Ep. 100</itunes:title><description><![CDATA[<p>Could an AI chatbot like ChatGPT help you co-author the next great cyberpunk novel? Or craft a phishing email and generate sock puppets - for ethical hacking research, of course! Join our security research team - incident responder Marc Balingit and adversary emulator Matt Mullins - as we wade into the fun (and sometimes ethically ambiguous) areas of AI tech in cybersecurity. Keep the conversation going as we explore how AI tools can impact productivity, learning, skill shortages, and more.</p><p>Check out the podcast on <a href="https://www.youtube.com/watch?v=gbJ4r-Rw-wM" rel="noopener noreferrer" target="_blank">Youtube</a> to watch Will, Matt, and Marc demo ChatGPT.</p><p><strong>Explore ChatGPT in Cybrary's </strong><a href="https://www.cybrary.it/course/cybrary-challenge-chatting-with-chatgpt/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=going-phishing-with-chatgpt" rel="noopener noreferrer" target="_blank"><strong>FREE challenge activity</strong></a><strong>! </strong>&nbsp;</p><p><strong>Read all about </strong><a href="https://www.cybrary.it/blog/chat-gpt-challenge/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=going-phishing-with-chatgpt" rel="noopener noreferrer" target="_blank"><strong>the potential impact of A.I. chatbots on the cybersecurity world</strong></a><strong>!  </strong>&nbsp;</p><p><strong>Learn more about OpenAI on their </strong><a href="https://openai.com/" rel="noopener noreferrer" target="_blank"><strong>website</strong></a><strong>! </strong></p><p><br></p><p><strong>See</strong> <a href="https://twitter.com/StephaneMaarek/status/1600864604220964871" rel="noopener noreferrer" target="_blank"><strong>How OpenAI became an AWS Certified Cloud Practitioner</strong></a><strong>!</strong></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=going-phishing-with-chatgpt" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Could an AI chatbot like ChatGPT help you co-author the next great cyberpunk novel? Or craft a phishing email and generate sock puppets - for ethical hacking research, of course! Join our security research team - incident responder Marc Balingit and adversary emulator Matt Mullins - as we wade into the fun (and sometimes ethically ambiguous) areas of AI tech in cybersecurity. Keep the conversation going as we explore how AI tools can impact productivity, learning, skill shortages, and more.</p><p>Check out the podcast on <a href="https://www.youtube.com/watch?v=gbJ4r-Rw-wM" rel="noopener noreferrer" target="_blank">Youtube</a> to watch Will, Matt, and Marc demo ChatGPT.</p><p><strong>Explore ChatGPT in Cybrary's </strong><a href="https://www.cybrary.it/course/cybrary-challenge-chatting-with-chatgpt/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=going-phishing-with-chatgpt" rel="noopener noreferrer" target="_blank"><strong>FREE challenge activity</strong></a><strong>! </strong>&nbsp;</p><p><strong>Read all about </strong><a href="https://www.cybrary.it/blog/chat-gpt-challenge/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=going-phishing-with-chatgpt" rel="noopener noreferrer" target="_blank"><strong>the potential impact of A.I. chatbots on the cybersecurity world</strong></a><strong>!  </strong>&nbsp;</p><p><strong>Learn more about OpenAI on their </strong><a href="https://openai.com/" rel="noopener noreferrer" target="_blank"><strong>website</strong></a><strong>! </strong></p><p><br></p><p><strong>See</strong> <a href="https://twitter.com/StephaneMaarek/status/1600864604220964871" rel="noopener noreferrer" target="_blank"><strong>How OpenAI became an AWS Certified Cloud Practitioner</strong></a><strong>!</strong></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=going-phishing-with-chatgpt" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-100]]></link><guid isPermaLink="false">1ef8ddd0-6a81-4100-911e-50e4083bd341</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 21 Dec 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d2899ed1-1e29-45c5-802c-80530ce5449d/Cybrary-Ep100-Revised-prproj-mixdown.mp3" length="100561857" type="audio/mpeg"/><itunes:duration>01:09:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Join our security research team - incident responder Marc Balingit and adversary emulator Matt Mullins - as we wade into the fun (and sometimes ethically ambiguous) areas of AI tech in cybersecurity.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 69 | Cloud Hacks with Carlos Polop</title><itunes:title>401 Access Denied Ep. 69 | Cloud Hacks with Carlos Polop</itunes:title><description><![CDATA[<p>Cloud services have made it easier for users to stay connected and access resources from anywhere. But how can we reduce the security risks resulting from on-premises-to-cloud infrastructure migration? Security researcher Carlos Polop returns to the 401 Access Denied Podcast to expose the most unexpected cloud security flaws commonly leveraged by adversaries. From tackling misconfigurations to enhancing security controls, we cover top risk mitigation strategies recommended by cloud penetration testers!</p><p><strong>Follow Carlos! (and join his </strong><a href="https://discord.gg/hRep4RUj7f" rel="noopener noreferrer" target="_blank"><strong>Discord</strong></a><strong> community!)</strong></p><p>~<a href="https://github.com/carlospolop" rel="noopener noreferrer" target="_blank">Github</a></p><p>~<a href="https://twitter.com/carlospolopm" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><strong>Check out Carlos' latest book on cloud hack tricks</strong></p><p><br></p><p>~<a href="https://cloud.hacktricks.xyz/welcome/readme" rel="noopener noreferrer" target="_blank">Hacktricks Cloud</a></p><p><br></p><p><strong>Learn more about Carlos's priviledge escalation tool</strong></p><p><br></p><p>~<a href="https://github.com/carlospolop/PurplePanda" rel="noopener noreferrer" target="_blank">Purple Panda</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cloud-hacks-with-carlos-polop" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Cloud services have made it easier for users to stay connected and access resources from anywhere. But how can we reduce the security risks resulting from on-premises-to-cloud infrastructure migration? Security researcher Carlos Polop returns to the 401 Access Denied Podcast to expose the most unexpected cloud security flaws commonly leveraged by adversaries. From tackling misconfigurations to enhancing security controls, we cover top risk mitigation strategies recommended by cloud penetration testers!</p><p><strong>Follow Carlos! (and join his </strong><a href="https://discord.gg/hRep4RUj7f" rel="noopener noreferrer" target="_blank"><strong>Discord</strong></a><strong> community!)</strong></p><p>~<a href="https://github.com/carlospolop" rel="noopener noreferrer" target="_blank">Github</a></p><p>~<a href="https://twitter.com/carlospolopm" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><strong>Check out Carlos' latest book on cloud hack tricks</strong></p><p><br></p><p>~<a href="https://cloud.hacktricks.xyz/welcome/readme" rel="noopener noreferrer" target="_blank">Hacktricks Cloud</a></p><p><br></p><p><strong>Learn more about Carlos's priviledge escalation tool</strong></p><p><br></p><p>~<a href="https://github.com/carlospolop/PurplePanda" rel="noopener noreferrer" target="_blank">Purple Panda</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cloud-hacks-with-carlos-polop" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-69]]></link><guid isPermaLink="false">b3dd10a9-2ecc-4e5b-ac0c-9f3e2d973f68</guid><itunes:image href="https://artwork.captivate.fm/6d574e5f-72fb-41f5-8f12-49ecdd0c00d5/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 14 Dec 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9b4642c1-2cd7-471e-9a2c-86b4309ae798/audio-495975-13106-29857-e460ebdb-5d06-42a9-bd8a-cf853e8a343d.mp3" length="49296761" type="audio/mpeg"/><itunes:duration>51:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>69</itunes:episode><podcast:episode>69</podcast:episode><itunes:summary>Security researcher Carlos Polop returns to the 401 Access Denied Podcast to expose the most unexpected cloud security flaws commonly leveraged by adversaries. From tackling misconfigurations to enhancing security controls, we cover top risk mitigation strategies recommended by cloud penetration testers!</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Creating a Neurodiverse Cybersecurity Workforce with Melwood | The Cybrary Podcast Ep. 99</title><itunes:title>Creating a Neurodiverse Cybersecurity Workforce with Melwood | The Cybrary Podcast Ep. 99</itunes:title><description><![CDATA[<p>Cybersecurity needs dynamic minds to keep up with ever-evolving threats. How can managers foster an inclusive workforce that celebrates diversity of thought? Scott Gibson, Chief Strategy Officer at Melwood, discusses how a "double empathetic" approach can help security leaders improve sourcing best practices and meet their employees where they're at. Hear more about the steps that neurodivergent people can take to build their career-ready skills and succeed in cybersecurity.</p><p><strong>Learn more about Melwood and the </strong><a href="~https%3A//melwood.org/abilit/" rel="noopener noreferrer" target="_blank"><strong>abilIT</strong></a><strong> program! </strong></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=creating-a-neurodiverse-cybersecurity-workforce" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Cybersecurity needs dynamic minds to keep up with ever-evolving threats. How can managers foster an inclusive workforce that celebrates diversity of thought? Scott Gibson, Chief Strategy Officer at Melwood, discusses how a "double empathetic" approach can help security leaders improve sourcing best practices and meet their employees where they're at. Hear more about the steps that neurodivergent people can take to build their career-ready skills and succeed in cybersecurity.</p><p><strong>Learn more about Melwood and the </strong><a href="~https%3A//melwood.org/abilit/" rel="noopener noreferrer" target="_blank"><strong>abilIT</strong></a><strong> program! </strong></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=creating-a-neurodiverse-cybersecurity-workforce" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-99]]></link><guid isPermaLink="false">b32d75fe-e6e9-4818-8531-e25100389095</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 07 Dec 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0ffad7a6-a88e-4798-aaab-76582f674307/audio-494886-13106-29857-7fcf74f0-995c-4d99-89f5-aca77ac7fe06.mp3" length="45214432" type="audio/mpeg"/><itunes:duration>47:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Scott Gibson, Chief Strategy Officer at Melwood, discusses how a &quot;double empathetic&quot; approach can help security leaders improve sourcing best practices. Hear how neurodivergent people can take to build their skills and succeed in cybersecurity.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 68 | Know Your Hackers&apos; Rights with Chloé Messdaghi</title><itunes:title>401 Access Denied Ep. 68 | Know Your Hackers&apos; Rights with Chloé Messdaghi</itunes:title><description><![CDATA[<p>Ethical hackers are motivated to make society safer, but how can they ensure that they are following the law? This episode of the 401 Access Denied Podcast explores all the gray areas of vulnerability disclosure policies, copyright laws, and end-user license agreements. Learn essential hacker safety tips from our hosts, Joe Carson and Chloé Messdaghi!</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=know-your-hackers-rights-with-chloe-messdaghi" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Ethical hackers are motivated to make society safer, but how can they ensure that they are following the law? This episode of the 401 Access Denied Podcast explores all the gray areas of vulnerability disclosure policies, copyright laws, and end-user license agreements. Learn essential hacker safety tips from our hosts, Joe Carson and Chloé Messdaghi!</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=know-your-hackers-rights-with-chloe-messdaghi" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-68]]></link><guid isPermaLink="false">c9ff5fcf-3ca3-4642-aaaf-82fe51f85596</guid><itunes:image href="https://artwork.captivate.fm/088984f6-cb0b-4c1a-b019-5411e8c11228/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 30 Nov 2022 16:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1618d779-e8a9-44c9-8940-0eea4882c69c/audio-493724-13106-29857-432722bd-3460-4b51-be39-edf8ff963efc.mp3" length="51068490" type="audio/mpeg"/><itunes:duration>53:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>68</itunes:episode><podcast:episode>68</podcast:episode><itunes:summary>This episode of the 401 Access Denied Podcast explores all the gray areas of vulnerability disclosure policies, copyright laws, and end-user license agreements. Learn essential hacker safety tips from our hosts, Joe Carson and Chloé Messdaghi!</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Unpacking Quantum Risks with Ron Lewis of Patero | Cybrary Podcast Ep. 98</title><itunes:title>Unpacking Quantum Risks with Ron Lewis of Patero | Cybrary Podcast Ep. 98</itunes:title><description><![CDATA[<p>The quantum computing revolution is a hot topic in the technology world, but how exactly does it impact cybersecurity professionals? To what extent does quantum computing pose a threat to encryption, and how long do we have to prepare for it? Ron Lewis, VP of Customer Success and Innovation at Patero, helps us find a pragmatic approach to post-quantum resiliency. In the first episode of our Quantum and Cyber podcast series with Patero, you'll learn all about how to differentiate Shor's algorithm from Grover's, navigate the cryptographic saga of Bob and Alice, and realistically quantify post-quantum risks.</p><p><strong>Discover </strong><a href="~https%3A//patero.io/" rel="noopener noreferrer" target="_blank"><strong>Patero</strong></a><strong>! </strong></p><p><strong>Learn more about </strong><a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank"><strong>the quantum threat</strong></a><strong>! </strong></p><p><br></p><p><strong>See the research from NIST:</strong></p><p><br></p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=unpacking-quantum-risks-with-ron-lewis" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>The quantum computing revolution is a hot topic in the technology world, but how exactly does it impact cybersecurity professionals? To what extent does quantum computing pose a threat to encryption, and how long do we have to prepare for it? Ron Lewis, VP of Customer Success and Innovation at Patero, helps us find a pragmatic approach to post-quantum resiliency. In the first episode of our Quantum and Cyber podcast series with Patero, you'll learn all about how to differentiate Shor's algorithm from Grover's, navigate the cryptographic saga of Bob and Alice, and realistically quantify post-quantum risks.</p><p><strong>Discover </strong><a href="~https%3A//patero.io/" rel="noopener noreferrer" target="_blank"><strong>Patero</strong></a><strong>! </strong></p><p><strong>Learn more about </strong><a href="https://riskgroupllc.com/the-quantum-threat/" rel="noopener noreferrer" target="_blank"><strong>the quantum threat</strong></a><strong>! </strong></p><p><br></p><p><strong>See the research from NIST:</strong></p><p><br></p><p>~<a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms" rel="noopener noreferrer" target="_blank">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=unpacking-quantum-risks-with-ron-lewis" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/cybrary-podcast-ep-98]]></link><guid isPermaLink="false">1f52e922-422b-498e-bdfc-d978723d1f78</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 23 Nov 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc1641dc-c9dc-484c-9cc5-2e7f261e3e25/Cybrary-Ep98-Revised-prproj-mixdown.mp3" length="71855745" type="audio/mpeg"/><itunes:duration>49:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In the first episode of our Quantum and Cyber podcast series with Patero, you&apos;ll learn all about how to differentiate Shor&apos;s algorithm from Grover&apos;s, navigate the cryptographic saga of Bob and Alice, and realistically quantify post-quantum risks.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 67 | Hack the Community with Phil Wylie</title><itunes:title>401 Access Denied Podcast Ep. 67 | Hack the Community with Phil Wylie</itunes:title><description><![CDATA[<p>The art of hacking is often synonymous with high-profile cybercrime. But how can the cybersecurity and penetration testing community help more crafty hackers go from breaking bad to breaking good? Phil Wylie, author of "The Pentester Blueprint," joins Joe Carson and Chloé Messdaghi to discuss innovative ways of fostering a safe, supportive, and rewarding culture among ethical hackers. We explore how effective mentorship, gamified bug bounty challenges, and free training opportunities can positively impact cybersecurity job recruitment and satisfaction.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=hack-the-community-with-phil-wylie" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>The art of hacking is often synonymous with high-profile cybercrime. But how can the cybersecurity and penetration testing community help more crafty hackers go from breaking bad to breaking good? Phil Wylie, author of "The Pentester Blueprint," joins Joe Carson and Chloé Messdaghi to discuss innovative ways of fostering a safe, supportive, and rewarding culture among ethical hackers. We explore how effective mentorship, gamified bug bounty challenges, and free training opportunities can positively impact cybersecurity job recruitment and satisfaction.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=hack-the-community-with-phil-wylie" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-67]]></link><guid isPermaLink="false">42fbccb6-ef77-4e6f-951c-d340e4d78350</guid><itunes:image href="https://artwork.captivate.fm/97725e79-20f8-48b3-9ad9-4cf4ce3a0457/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 16 Nov 2022 15:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/25841367-14f6-445b-a7ba-21139e0353e4/audio-491998-13106-29857-593c9a91-a738-4494-8b0f-1e694dfdfc14.mp3" length="58331785" type="audio/mpeg"/><itunes:duration>01:00:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>67</itunes:episode><podcast:episode>67</podcast:episode><itunes:summary>Phil Wylie, author of &quot;The Pentester Blueprint,&quot; joins Joe Carson and Chloé Messdaghi to discuss innovative ways of fostering a safe, supportive, and rewarding culture among ethical hackers.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Double Trouble with Double Dragon feat. Chris Daywalt and Matt Mullins | The Cybrary Podcast Ep. 97</title><itunes:title>Double Trouble with Double Dragon feat. Chris Daywalt and Matt Mullins | The Cybrary Podcast Ep. 97</itunes:title><description><![CDATA[<p>Some threat actor groups pursue state-sponsored espionage, and others conduct financially-motivated cyberattacks. APT41, also known as Double Dragon, happens to do both! Our adversary emulator and self-described Chief Thief, Matt Mullins, teams up with defensive security freelancer, Chris Daywalt, to discuss their latest threat actor campaign emulating APT41. Get caught up in the cat-and-mouse game between red and blue teamers in this conversation on reducing risk, enhancing alerts, and exploring realistic simulations!</p><p>Start the <a href="https://www.cybrary.it/catalog/double-trouble-with-double-dragon/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=double-trouble-with-double-dragon" rel="noopener noreferrer" target="_blank">Double Trouble with Double Dragon Threat Actor Campaign</a>  to detect TTPs leveraged by real-world threat actor group, APT41!</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=double-trouble-with-double-dragon" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Some threat actor groups pursue state-sponsored espionage, and others conduct financially-motivated cyberattacks. APT41, also known as Double Dragon, happens to do both! Our adversary emulator and self-described Chief Thief, Matt Mullins, teams up with defensive security freelancer, Chris Daywalt, to discuss their latest threat actor campaign emulating APT41. Get caught up in the cat-and-mouse game between red and blue teamers in this conversation on reducing risk, enhancing alerts, and exploring realistic simulations!</p><p>Start the <a href="https://www.cybrary.it/catalog/double-trouble-with-double-dragon/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=double-trouble-with-double-dragon" rel="noopener noreferrer" target="_blank">Double Trouble with Double Dragon Threat Actor Campaign</a>  to detect TTPs leveraged by real-world threat actor group, APT41!</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=double-trouble-with-double-dragon" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-97]]></link><guid isPermaLink="false">daf0e0ed-411b-4218-a91f-f74167bfd647</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 09 Nov 2022 16:36:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/eef9b007-3860-4338-8bd9-d1b65db6b41b/audio-491126-13106-29857-1ee9a0dd-a5eb-45fe-abf0-a238941057ea.mp3" length="40721075" type="audio/mpeg"/><itunes:duration>42:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Our adversary emulator and self-described Chief Thief, Matt Mullins, teams up with defensive security freelancer, Chris Daywalt, to discuss their latest threat actor campaign emulating APT41. Get caught up in the cat-and-mouse game between red and blue teamers in this conversation on reducing risk, enhancing alerts, and exploring realistic simulations!</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 66 | Cultivating Critical Infrastructure Resilience with George Eapen</title><itunes:title>401 Access Denied Podcast Ep. 66 | Cultivating Critical Infrastructure Resilience with George Eapen</itunes:title><description><![CDATA[<p>When threat actors target enterprise security environments, they often seek to compromise the accounts with the most privileged access. How can organizations minimize security risks in a world where remote account access is growing? George Eapen, Group Chief Information Officer at Petrofac, discusses important strategies for reducing risk and increasing resilience in the face of threats like ransomware attacks. Learn more about how layered security controls, privileged access management, and employee training can foster a positive organizational security culture.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cultivating-critical-infrastructure-resilience-with-george-eapen" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>When threat actors target enterprise security environments, they often seek to compromise the accounts with the most privileged access. How can organizations minimize security risks in a world where remote account access is growing? George Eapen, Group Chief Information Officer at Petrofac, discusses important strategies for reducing risk and increasing resilience in the face of threats like ransomware attacks. Learn more about how layered security controls, privileged access management, and employee training can foster a positive organizational security culture.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=cultivating-critical-infrastructure-resilience-with-george-eapen" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-podcast-ep-66]]></link><guid isPermaLink="false">c93f347c-38b0-43b8-b305-4e56dc3e41e8</guid><itunes:image href="https://artwork.captivate.fm/70cac16c-3d40-42a9-bb7f-39163dd75dd3/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 02 Nov 2022 04:15:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fcd7471b-f851-4d42-bfe9-892ecd262e3c/audio-490143-13106-29857-f5515916-cf07-4690-88e5-e5bc1bed65ed.mp3" length="49249262" type="audio/mpeg"/><itunes:duration>51:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>66</itunes:episode><podcast:episode>66</podcast:episode><itunes:summary>George Eapen, Group Chief Information Officer at Petrofac, discusses important strategies for reducing risk and increasing resilience in the face of threats like ransomware attacks. Learn more about how layered security controls, privileged access management, and employee training can foster a positive organizational security culture.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Kickstarting Your Cybersecurity Career with Jenn Barnabee | The Cybrary Podcast Ep. 96</title><itunes:title>Kickstarting Your Cybersecurity Career with Jenn Barnabee | The Cybrary Podcast Ep. 96</itunes:title><description><![CDATA[<p>Interested in switching your career to cybersecurity, but don't know where to start? Need to brush up on your cyber basics? In this episode of the Cybrary Podcast, we are joined by our very own course managers Sara Faradji and Jenn Barnabee. Jenn goes into detail on the making of her new Entry-Level Cybersecurity Training (ELCT) course that is intended for absolute beginners with no prior knowledge of the industry! Get the inside scoop on how <em>you </em>can gain the foundational knowledge to take the next step towards your cybersecurity career or goals.</p><p>Check out Jenn's <a href="https://www.cybrary.it/course/entry-level-cybersecurity-training/" rel="noopener noreferrer" target="_blank">Entry-Level Cybersecurity Training</a>  course at <a href="https://Cybrary.it" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=kickstarting-your-cybersecurity-career-with-jenn-barnabee" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Interested in switching your career to cybersecurity, but don't know where to start? Need to brush up on your cyber basics? In this episode of the Cybrary Podcast, we are joined by our very own course managers Sara Faradji and Jenn Barnabee. Jenn goes into detail on the making of her new Entry-Level Cybersecurity Training (ELCT) course that is intended for absolute beginners with no prior knowledge of the industry! Get the inside scoop on how <em>you </em>can gain the foundational knowledge to take the next step towards your cybersecurity career or goals.</p><p>Check out Jenn's <a href="https://www.cybrary.it/course/entry-level-cybersecurity-training/" rel="noopener noreferrer" target="_blank">Entry-Level Cybersecurity Training</a>  course at <a href="https://Cybrary.it" rel="noopener noreferrer" target="_blank">Cybrary</a>!</p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=kickstarting-your-cybersecurity-career-with-jenn-barnabee" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-96]]></link><guid isPermaLink="false">496beb41-adb4-40da-88b2-9be794ef93f8</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 26 Oct 2022 03:42:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4d9c7f96-8f3f-4d7f-af58-10cbbefbd77c/Cybrary-Ep96-Revised-prproj-mixdown.mp3" length="83187969" type="audio/mpeg"/><itunes:duration>57:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode, our very own course manager, Jenn Barnabee, goes into detail on the making of her new Entry-Level Cybersecurity Training (ELCT) course, intended for absolute beginners with no prior knowledge of the industry!</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 65 | Bringing the Fun Back to Cybersecurity with Ian Murphy</title><itunes:title>401 Access Denied Ep. 65 | Bringing the Fun Back to Cybersecurity with Ian Murphy</itunes:title><description><![CDATA[<p><a href="https://www.cybrary.it/podcasts/401-access-denied/ep-65-bringing-the-fun-back-to-cybersecurity-with-ian-murphy/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=bringing-the-fun-back-to-cybersecurity-with-ian-murphy" rel="noopener noreferrer" target="_blank">Learn more about Cybrary!</a>&nbsp;</p><p>Feeling fatigued from all the fear and uncertainty surrounding cybersecurity news? Take a breather in this engaging podcast conversation with Ian Murphy, founder of CyberOff and affectionately known as "The Monty Python of Cyber"! Join in the fun as Ian breaks down the complexities of cybersecurity to focus on the value of human impact, bravery, and connectedness in this dynamic field.</p><p><strong>Check out </strong><a href="https://cyberoff.com/" rel="noopener noreferrer" target="_blank"><strong>CyberOff</strong></a><strong>!  </strong></p><p><strong>Connect with Ian!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/ianmurphy/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=bringing-the-fun-back-to-cybersecurity-with-ian-murphy" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.cybrary.it/podcasts/401-access-denied/ep-65-bringing-the-fun-back-to-cybersecurity-with-ian-murphy/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=bringing-the-fun-back-to-cybersecurity-with-ian-murphy" rel="noopener noreferrer" target="_blank">Learn more about Cybrary!</a>&nbsp;</p><p>Feeling fatigued from all the fear and uncertainty surrounding cybersecurity news? Take a breather in this engaging podcast conversation with Ian Murphy, founder of CyberOff and affectionately known as "The Monty Python of Cyber"! Join in the fun as Ian breaks down the complexities of cybersecurity to focus on the value of human impact, bravery, and connectedness in this dynamic field.</p><p><strong>Check out </strong><a href="https://cyberoff.com/" rel="noopener noreferrer" target="_blank"><strong>CyberOff</strong></a><strong>!  </strong></p><p><strong>Connect with Ian!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/ianmurphy/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=bringing-the-fun-back-to-cybersecurity-with-ian-murphy" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-65]]></link><guid isPermaLink="false">24d0cf85-a787-4a71-a838-ad4f5b56f449</guid><itunes:image href="https://artwork.captivate.fm/c9534b6c-dcd3-4933-9399-a346f42b8edd/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 19 Oct 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e39d2c4f-6f36-44c2-b127-bf2e0cec68aa/audio-484137-13106-29857-2e93b349-2d0a-4b83-b43e-30fe830433b0.mp3" length="51729595" type="audio/mpeg"/><itunes:duration>53:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>65</itunes:episode><podcast:episode>65</podcast:episode><itunes:summary>Take a breather in this engaging podcast conversation with Ian Murphy, founder of CyberOff and affectionately known as &quot;The Monty Python of Cyber&quot;! Join in the fun as Ian breaks down the complexities of cybersecurity to focus on the value of human impact, bravery, and connectedness in this dynamic field.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Breaking Barriers in Cyber with Black Girls Hack Founder Tennisha Martin | The Cybrary Podcast Ep. 95</title><itunes:title>Breaking Barriers in Cyber with Black Girls Hack Founder Tennisha Martin | The Cybrary Podcast Ep. 95</itunes:title><description><![CDATA[<p>Have you ever thought about pursuing a cybersecurity career, but you don't imagine yourself as a "tech person"? Tennisha Martin, founder and Executive Director of Black Girls Hack, discusses strategies for both front and backdoor entrances into the dynamic world of cybersecurity. Learn how to take advantage of networking, resume review, and hands-on training opportunities so that you can see yourself in cyber!</p><p><strong>Join Black Girls Hack!</strong>&nbsp;</p><p><br></p><p>~<a href="https://blackgirlshack.org/" rel="noopener noreferrer" target="_blank">Black Girls Hack Website</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=breaking-barriers-in-cyber-with-black-girls-hack" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Have you ever thought about pursuing a cybersecurity career, but you don't imagine yourself as a "tech person"? Tennisha Martin, founder and Executive Director of Black Girls Hack, discusses strategies for both front and backdoor entrances into the dynamic world of cybersecurity. Learn how to take advantage of networking, resume review, and hands-on training opportunities so that you can see yourself in cyber!</p><p><strong>Join Black Girls Hack!</strong>&nbsp;</p><p><br></p><p>~<a href="https://blackgirlshack.org/" rel="noopener noreferrer" target="_blank">Black Girls Hack Website</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=breaking-barriers-in-cyber-with-black-girls-hack" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-95]]></link><guid isPermaLink="false">d68e1dc8-5f0d-4d0b-bcab-3378d2143f4d</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 12 Oct 2022 04:45:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c90d585b-6cfd-4bbd-a3ad-f68ba6636d54/audio-482915-13106-29857-52c7faa3-ba54-44a1-992e-2275ef8209d2.mp3" length="46575417" type="audio/mpeg"/><itunes:duration>48:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Tennisha Martin, founder and Executive Director of Black Girls Hack, discusses strategies for both front and backdoor entrances into the dynamic world of cybersecurity. Learn how to take advantage of networking, resume review, and hands-on training opportunities so that you can see yourself in cyber!</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 64 | The Future State of Cybersecurity with Rik Ferguson</title><itunes:title>401 Access Denied Ep. 64 | The Future State of Cybersecurity with Rik Ferguson</itunes:title><description><![CDATA[<p>With the state of cybersecurity in constant flux, how can security teams better prepare both their organizations and society for the challenges ahead? Rik Ferguson, VP of Security Intelligence at Fourscout Technologies, shares best practices for tackling issues of trust, authenticity, communication, and problem-solving in the security world.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=the-future-state-of-cybersecurity-with-rik-ferguson" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>With the state of cybersecurity in constant flux, how can security teams better prepare both their organizations and society for the challenges ahead? Rik Ferguson, VP of Security Intelligence at Fourscout Technologies, shares best practices for tackling issues of trust, authenticity, communication, and problem-solving in the security world.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><strong>Jump-start your cybersecurity career for FREE at </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=the-future-state-of-cybersecurity-with-rik-ferguson" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-64]]></link><guid isPermaLink="false">764b9491-95af-4a51-aad3-13be5f9265e5</guid><itunes:image href="https://artwork.captivate.fm/d9027a6c-75bf-4922-b62d-05b9addd7192/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 05 Oct 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/abccf0b3-bd36-4cb1-b4f5-91a3c6e6aa7a/audio-480274-13106-29857-db79025d-d3b3-43f6-a5a6-f60d36ce7d0a.mp3" length="43301519" type="audio/mpeg"/><itunes:duration>45:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>64</itunes:episode><podcast:episode>64</podcast:episode><itunes:summary>Rik Ferguson, VP of Security Intelligence at Fourscout Technologies, shares best practices for tackling issues of trust, authenticity, communication, and problem-solving in the security world.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>How to Build a Cybersecurity Career with Dave Kennedy | The Cybrary Podcast Ep. 94</title><itunes:title>How to Build a Cybersecurity Career with Dave Kennedy | The Cybrary Podcast Ep. 94</itunes:title><description><![CDATA[<p>A skill shortage is pervading the cybersecurity industry. But what is the root cause of the problem, and how can employers fill more job roles? Dave Kennedy, CEO and founder of TrustedSec, and Chloé Messdaghi, Chief Impact Officer at Cybrary, discuss hiring and training best practices in the security world. Learn how you can break into the cybersecurity field from any educational or technical background!</p><p><strong>Follow Dave Kennedy!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/davidkennedy4/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career today at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=how-to-build-a-cybersecurity-career-with-dave-kennedy" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>A skill shortage is pervading the cybersecurity industry. But what is the root cause of the problem, and how can employers fill more job roles? Dave Kennedy, CEO and founder of TrustedSec, and Chloé Messdaghi, Chief Impact Officer at Cybrary, discuss hiring and training best practices in the security world. Learn how you can break into the cybersecurity field from any educational or technical background!</p><p><strong>Follow Dave Kennedy!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/davidkennedy4/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career today at </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=how-to-build-a-cybersecurity-career-with-dave-kennedy" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-94]]></link><guid isPermaLink="false">3801dba8-b0c3-407e-8c04-d432982a13cf</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 28 Sep 2022 18:45:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/de0b84c2-aa2c-4f37-8be9-b6001a215746/audio-478746-13106-29857-dce00310-bc8d-49a3-b99b-787c91a7ae73.mp3" length="55747335" type="audio/mpeg"/><itunes:duration>58:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Dave Kennedy, CEO and founder of TrustedSec, and Chloé Messdaghi, Chief Impact Officer at Cybrary, discuss hiring and training best practices in the security world. Learn how you can break into the cybersecurity field from any educational or technical background!</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 63 | Building a Safer Cyberspace with Philipp Amann</title><itunes:title>Building a Safer Cyberspace with Philipp Amann | 401 Access Denied Podcast Ep. 63</itunes:title><description><![CDATA[<p>With ransomware, supply-chain attacks, and other organized cybercrime incidents on the rise, what can we do to better protect society? Philipp Amann, Head of Strategy at the European Cybercrime Centre (EC3), invites us to his world of cyber law enforcement and analysis. Learn more about the evolution of cyberattacks and cybercriminal investigations. Hear how you can join government agencies in the fight against new and pervasive threats.</p><p><strong>Follow Philipp!</strong></p><p>~<a href="https://www.linkedin.com/in/philippamann/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p>~<a href="https://twitter.com/fipman" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=building-a-safer-cyberspace-with-philipp-amann" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>With ransomware, supply-chain attacks, and other organized cybercrime incidents on the rise, what can we do to better protect society? Philipp Amann, Head of Strategy at the European Cybercrime Centre (EC3), invites us to his world of cyber law enforcement and analysis. Learn more about the evolution of cyberattacks and cybercriminal investigations. Hear how you can join government agencies in the fight against new and pervasive threats.</p><p><strong>Follow Philipp!</strong></p><p>~<a href="https://www.linkedin.com/in/philippamann/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p>~<a href="https://twitter.com/fipman" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=building-a-safer-cyberspace-with-philipp-amann" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-podcast-ep-63]]></link><guid isPermaLink="false">79c183ae-4d6f-4ee8-b487-5217dfc73097</guid><itunes:image href="https://artwork.captivate.fm/9db66785-a580-46b4-82eb-23313ea0aa12/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 21 Sep 2022 14:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b5075dbc-7fb1-43d9-9f34-d1cc500b0b74/audio-475474-13106-29857-f0a52943-b1c7-4eb8-afaf-364527f4e55f.mp3" length="46700975" type="audio/mpeg"/><itunes:duration>48:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>63</itunes:episode><podcast:episode>63</podcast:episode><itunes:summary>Philipp Amann, Head of Strategy at the European Cybercrime Centre (EC3), invites us to his world of cyber law enforcement and analysis.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Responsible Vulnerability Disclosure with Casey Ellis | The Cybrary Podcast Ep. 93</title><itunes:title>Responsible Vulnerability Disclosure with Casey Ellis | The Cybrary Podcast Ep. 93</itunes:title><description><![CDATA[<p>When it comes to vulnerability disclosure, there can be a lot of unknowns. What is the first step in safely reporting? How can global bug bounty hunters better understand the specialized legalese in disclosure policies? Casey Ellis, founder and CTO of Bugcrowd and Co-founder of Disclose.io, addresses the importance of standardizing vulnerability disclosure policy language. Join in the de-villainization of ethical hackers with Casey and the Cybrary team at Black Hat!</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=responsible-vulnerability-disclosure-with-casey-ellis" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>When it comes to vulnerability disclosure, there can be a lot of unknowns. What is the first step in safely reporting? How can global bug bounty hunters better understand the specialized legalese in disclosure policies? Casey Ellis, founder and CTO of Bugcrowd and Co-founder of Disclose.io, addresses the importance of standardizing vulnerability disclosure policy language. Join in the de-villainization of ethical hackers with Casey and the Cybrary team at Black Hat!</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=responsible-vulnerability-disclosure-with-casey-ellis" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-93]]></link><guid isPermaLink="false">9e7c058b-4bf3-4b4c-b003-603911cb91a5</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 14 Sep 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8523b84c-7e40-42b9-bb71-a834b1c8c61a/audio-472515-13106-29857-58c003e1-24e0-4341-84f7-69e9f29c301a.mp3" length="19582010" type="audio/mpeg"/><itunes:duration>20:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Listen to the conversation on the de-villainization of ethical hackers and bug bounty hunters with Casey Ellis, Founder and CTO of Bugcrowd and Co-founder of Disclose.io, and the Cybrary team at Black Hat!</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 62 | Warfare and Welfare in Ukraine with Chris Kubecka</title><itunes:title>401 Access Denied Ep. 62 | Warfare and Welfare in Ukraine with Chris Kubecka</itunes:title><description><![CDATA[<p>At the onset of the 2022 war in Ukraine, how did the wiper malware attacks deployed by Russia impact civilians? To what extent does cyberwarfare coincide with information warfare in the context of the Russo-Ukrainian War? In part 2 of our conversation with Chris Kubecka, CEO of HypaSec, we discuss the importance of open-source intelligence and community support amidst global conflict.</p><p><strong>Connect with Chris Kubecka!</strong></p><p>~<a href="https://twitter.com/SecEvangelism" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=warfare-and-welfare-in-ukraine-with-chris-kubecka" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>At the onset of the 2022 war in Ukraine, how did the wiper malware attacks deployed by Russia impact civilians? To what extent does cyberwarfare coincide with information warfare in the context of the Russo-Ukrainian War? In part 2 of our conversation with Chris Kubecka, CEO of HypaSec, we discuss the importance of open-source intelligence and community support amidst global conflict.</p><p><strong>Connect with Chris Kubecka!</strong></p><p>~<a href="https://twitter.com/SecEvangelism" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=warfare-and-welfare-in-ukraine-with-chris-kubecka" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-62]]></link><guid isPermaLink="false">17513005-501e-4bec-ba7f-c1be4cdd585c</guid><itunes:image href="https://artwork.captivate.fm/7e15a3ae-8cc5-44d0-8015-f859674c29e8/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 07 Sep 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/511aabd1-9970-4e73-87c5-5feeb8d14ee6/audio-466617-13106-29857-6baed5e8-e411-44a8-ba05-1371504c104d.mp3" length="32574608" type="audio/mpeg"/><itunes:duration>33:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode><itunes:summary>In part 2 of our conversation with Chris Kubecka, CEO of HypaSec, we discuss the importance of open-source intelligence and community support amidst global conflict.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Finding the Humanities in Information Security with Tracy Z. Maleeff | The Cybrary Podcast Ep. 92</title><itunes:title>Finding the Humanities in Information Security with Tracy Z. Maleeff | The Cybrary Podcast Ep. 92</itunes:title><description><![CDATA[<p>How did Tracy Z. Maleeff (aka InfoSecSherpa) pivot from a library science job into a cybersecurity research career? What first steps can other liberal arts majors take on their potential path toward the information security field? Find your niche in the security world with Tracy's tips on leveraging diverse skill sets to help solve complex security problems.</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=finding-the-humanities-in-information-security" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>How did Tracy Z. Maleeff (aka InfoSecSherpa) pivot from a library science job into a cybersecurity research career? What first steps can other liberal arts majors take on their potential path toward the information security field? Find your niche in the security world with Tracy's tips on leveraging diverse skill sets to help solve complex security problems.</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=finding-the-humanities-in-information-security" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-92]]></link><guid isPermaLink="false">5ef41191-5605-49cb-b424-849b64a4ddf6</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 31 Aug 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5c50f9a3-30ce-486b-b80d-f276ec4201b1/audio-463075-13106-29857-84bd0caa-f584-4849-9087-ef29aa743e18.mp3" length="38059637" type="audio/mpeg"/><itunes:duration>39:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>How did Tracy Z. Maleeff (aka InfoSecSherpa) pivot from a library science job into a cybersecurity research career? Find your niche in the security world with Tracy&apos;s tips on leveraging diverse skill sets to help solve complex security problems.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Upskilling Your Security Team with Lance James | The Cybrary Podcast Ep. 91</title><itunes:title>Upskilling Your Security Team with Lance James | The Cybrary Podcast Ep. 91</itunes:title><description><![CDATA[<p>With the Great Resignation looming, what can security leaders do to empower their teams?  How does effective training help shatter glass ceilings? Lance James, CEO of Unit 221B, shares his methodology for boosting team confidence and capability.</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=upskilling-your-security-team-with-lance-james" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>With the Great Resignation looming, what can security leaders do to empower their teams?  How does effective training help shatter glass ceilings? Lance James, CEO of Unit 221B, shares his methodology for boosting team confidence and capability.</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=upskilling-your-security-team-with-lance-james" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-91]]></link><guid isPermaLink="false">ae6f42a9-b701-4274-9d9d-d8de3238e6b7</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 26 Aug 2022 15:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3f8b5a2e-85a1-46db-992e-faa1f71bdadc/audio-461033-13106-29857-2593ebb2-9e9e-4c84-a72c-62dd92a91f96.mp3" length="26046528" type="audio/mpeg"/><itunes:duration>27:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lance James, CEO of Unit 221B, shares his methodology for boosting team confidence and capability during the Great Resignation.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 61 | Escaping Ukraine with Chris Kubecka</title><itunes:title>401 Access Denied Ep. 61 | Escaping Ukraine with Chris Kubecka</itunes:title><description><![CDATA[<p>A distressing escape from a nation at the outbreak of war. A race to the border filled with sharp turns, sleepless nights, and evasion from mercenary groups. This is the true story of cyberwarfare expert Chris Kubecka's exodus from Ukraine in early 2022. Follow Chris down the winding Ukrainian backroads in part 1 of her perilous story.</p><p><strong>Connect with Chris Kubecka!</strong></p><p>~<a href="https://twitter.com/SecEvangelism" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=escaping-ukraine-with-chris-kubecka" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>A distressing escape from a nation at the outbreak of war. A race to the border filled with sharp turns, sleepless nights, and evasion from mercenary groups. This is the true story of cyberwarfare expert Chris Kubecka's exodus from Ukraine in early 2022. Follow Chris down the winding Ukrainian backroads in part 1 of her perilous story.</p><p><strong>Connect with Chris Kubecka!</strong></p><p>~<a href="https://twitter.com/SecEvangelism" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=escaping-ukraine-with-chris-kubecka" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-61]]></link><guid isPermaLink="false">6d719fe3-49ec-44d2-9249-b7a9e62319fa</guid><itunes:image href="https://artwork.captivate.fm/19180568-1848-4b1e-9b22-21223198910a/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 24 Aug 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/17cf2033-aaa1-417e-9c58-92e7e6b27bb6/audio-460329-13106-29857-033a55b0-cb1a-4565-8d28-6e10dfe21427.mp3" length="23263170" type="audio/mpeg"/><itunes:duration>24:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode><itunes:summary>This is the true story of cyberwarfare expert Chris Kubecka&apos;s exodus from Ukraine in early 2022. Follow Chris down the winding Ukrainian backroads in part 1 of her perilous story.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Debuting the Cybrary SOC Analyst Assessment with Ned Hinman | The Cybrary Podcast Ep. 90</title><itunes:title>Debuting the Cybrary SOC Analyst Assessment with Ned Hinman | The Cybrary Podcast Ep. 90</itunes:title><description><![CDATA[<p>Cybrary has been hard at work building a custom lab experience designed to prepare your security teams to succeed. Get the inside scoop on Cybrary's SOC Analyst Assessment from Senior Product Manager Ned Hinman. Learn how you evaluate your team's skill development with a high-fidelity, immersive assessment.</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=debuting-the-cybrary-soc-analyst-assessment" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Cybrary has been hard at work building a custom lab experience designed to prepare your security teams to succeed. Get the inside scoop on Cybrary's SOC Analyst Assessment from Senior Product Manager Ned Hinman. Learn how you evaluate your team's skill development with a high-fidelity, immersive assessment.</p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=debuting-the-cybrary-soc-analyst-assessment" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-90]]></link><guid isPermaLink="false">3482bd2f-64fe-4d0c-916a-4374f59a1c78</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 17 Aug 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0b24e1e5-4bb0-4370-a839-08564a99df6f/audio-458024-13106-29857-84b5944f-509e-4d89-b0b5-c9a7e5ae875f.mp3" length="31272514" type="audio/mpeg"/><itunes:duration>32:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Get the inside scoop on Cybrary&apos;s SOC Analyst Assessment from Senior Product Manager Ned Hinman.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 60 | Ethically Exploiting Vulnerabilities with John Hammond</title><itunes:title>401 Access Denied Podcast Ep. 60 | Ethically Exploiting Vulnerabilities with John Hammond</itunes:title><description><![CDATA[<p>With thousands of new vulnerabilities discovered each year, how can security teams prioritize which ones to mitigate? John Hammond, acclaimed content creator and Senior Security Researcher at Huntress, explains key factors determining a vulnerability's potential impact. Join John behind the scenes at the RSA conference as he discusses threat actor mindsets, community engagement, and the ethics of hacking.</p><p><strong>Connect with John!</strong></p><p>~<a href="https://www.linkedin.com/in/johnhammond010/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=ethically-exploiting-vulnerabilities-with-john-hammond" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>With thousands of new vulnerabilities discovered each year, how can security teams prioritize which ones to mitigate? John Hammond, acclaimed content creator and Senior Security Researcher at Huntress, explains key factors determining a vulnerability's potential impact. Join John behind the scenes at the RSA conference as he discusses threat actor mindsets, community engagement, and the ethics of hacking.</p><p><strong>Connect with John!</strong></p><p>~<a href="https://www.linkedin.com/in/johnhammond010/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=ethically-exploiting-vulnerabilities-with-john-hammond" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-60]]></link><guid isPermaLink="false">36eb179e-0f43-4c65-ad6a-3b2fb679ff62</guid><itunes:image href="https://artwork.captivate.fm/36e9bcad-7f46-4409-8517-b53b6aeaea4c/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 10 Aug 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f8d64936-93a9-4735-8dda-849f46e04dff/audio-454544-13106-29857-39e5e1b6-f11e-48a3-ab10-e79b5a30bb97.mp3" length="27338758" type="audio/mpeg"/><itunes:duration>28:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode><itunes:summary>With thousands of new vulnerabilities discovered each year, how can security teams prioritize which ones to mitigate? John Hammond, acclaimed content creator and Senior Security Researcher at Huntress, explains key factors determining a vulnerability&apos;s potential impact.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 59 | Unlocking Identity Management with Pamela Dingle</title><itunes:title>401 Access Denied Podcast Ep. 59 | Unlocking Identity Management with Pamela Dingle</itunes:title><description><![CDATA[<p>What is your ideal password management experience? Pamela Dingle, Director of Identity Standards at Microsoft, chats with us during the 2022 RSA conference about forward-thinking identity management strategies from the perspectives of consumers, businesses, and government entities. Hear Pamela's take on how authentication, standardization, and decentralization efforts are changing the way that we think about digital identity.</p><p><strong>Connect with Pamela!</strong></p><p><a href="http://linkedin.com/in/pameladingle" rel="noopener noreferrer" target="_blank">~Linkedin</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=unlocking-identity-management-with-pamela-dingle" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>What is your ideal password management experience? Pamela Dingle, Director of Identity Standards at Microsoft, chats with us during the 2022 RSA conference about forward-thinking identity management strategies from the perspectives of consumers, businesses, and government entities. Hear Pamela's take on how authentication, standardization, and decentralization efforts are changing the way that we think about digital identity.</p><p><strong>Connect with Pamela!</strong></p><p><a href="http://linkedin.com/in/pameladingle" rel="noopener noreferrer" target="_blank">~Linkedin</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=unlocking-identity-management-with-pamela-dingle" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-59]]></link><guid isPermaLink="false">1216fabc-a27a-4a2b-b4c7-68f3af4b0202</guid><itunes:image href="https://artwork.captivate.fm/598b6d64-2e00-4390-833d-0bf954d7f52e/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 27 Jul 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fdfc1464-a4ff-4974-bbc8-8a8ac8b93d99/audio-436417-13106-29857-87ba45c6-24af-4a76-a948-6f46459c9847.mp3" length="36188342" type="audio/mpeg"/><itunes:duration>37:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode><itunes:summary>Pamela Dingle, Director of Identity Standards at Microsoft, chats with us during the 2022 RSA conference about forward-thinking identity management strategies from the perspectives of consumers, businesses, and government entities.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Strengthening AWS Cloud Security with Tenacity | The Cybrary Podcast Ep. 89</title><itunes:title>Strengthening AWS Cloud Security with Tenacity | The Cybrary Podcast Ep. 89</itunes:title><description><![CDATA[<p>With companies migrating to cloud environments amidst a continued influx of remote and hybrid workspaces, it's essential to keep your data secure. Nick Lumsden, co-founder and CTO of Tenacity Cloud, helps organizations to improve their foundational AWS cloud security. In a world where you can quickly make software changes, how can you maintain asset visibility and ensure compliance? Listen to Nick's insights on cost-effective cloud security management best practices.</p><p><strong>Connect with Nick!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/nicklumsden/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Check out Tenacity Cloud</strong></p><p><br></p><p><a href="https://www.tenacitycloud.com/" rel="noopener noreferrer" target="_blank">~Company Website</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=strengthening-aws-cloud-security-with-tenacity" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>With companies migrating to cloud environments amidst a continued influx of remote and hybrid workspaces, it's essential to keep your data secure. Nick Lumsden, co-founder and CTO of Tenacity Cloud, helps organizations to improve their foundational AWS cloud security. In a world where you can quickly make software changes, how can you maintain asset visibility and ensure compliance? Listen to Nick's insights on cost-effective cloud security management best practices.</p><p><strong>Connect with Nick!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/nicklumsden/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Check out Tenacity Cloud</strong></p><p><br></p><p><a href="https://www.tenacitycloud.com/" rel="noopener noreferrer" target="_blank">~Company Website</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=strengthening-aws-cloud-security-with-tenacity" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-89]]></link><guid isPermaLink="false">ad5b403a-5cf6-443c-bab4-2ec0b51fae16</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 20 Jul 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8c23382c-0ebe-4d8b-9d3a-1151ab43916c/audio-406533-13106-29857-cf9bf576-5ecd-4290-bc52-9de84e185db6.mp3" length="38911561" type="audio/mpeg"/><itunes:duration>40:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, find out how Nick Lumsden, co-founder and CTO of Tenacity Cloud, helps organizations to improve their foundational AWS cloud security.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Detecting the Follina Vulnerability and Initial Access Brokers | The Cybrary Podcast Ep. 88</title><itunes:title>Detecting the Follina Vulnerability and Initial Access Brokers | The Cybrary Podcast Ep. 88</itunes:title><description><![CDATA[<p>When the next zero-day vulnerability hits, how can your security team prepare to detect and respond to the latest threats? In what ways can your organization reduce risk in a dynamic threat landscape? Our Cybrary Threat Intelligence Group (CTIG) is here to jumpstart the conversation on grounding your security training and decision-making on actionable research. Hear our CTIG experts, Ryan English and Matt Mullins, discuss the latest intel on the Follina vulnerability (CVE-2022-30190), the ZuoRAT report from Black Lotus Labs, and evolving tactics from initial access brokers like Prophet Spider.&nbsp;&nbsp;</p><p>Take Matt’s training course on the Follina vulnerability:  ~<a href="https://www.cybrary.it/course/cve-series-follina-cve-2022-30190/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank">https://www.cybrary.it/course/cve-series-follina-cve-2022-30190/</a>&nbsp;</p><p><br></p><p>Enroll in our Spinning a Web Shell for Initial Access course to detect behaviors of real-world initial access brokers:  ~<a href="https://www.cybrary.it/catalog/spinning-a-web-shell-for-initial-access/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank">https://www.cybrary.it/catalog/spinning-a-web-shell-for-initial-access/</a>&nbsp;</p><p><br></p><p>Check out the report on ZuoRat from the Cybray Threat Intelligence Group (CTIG): ~<a href="https://www.cybrary.it/blog/ctig-coverage-of-black-lotus-labs-zuorat-report/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank">https://www.cybrary.it/blog/ctig-coverage-of-black-lotus-labs-zuorat-report/</a></p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>When the next zero-day vulnerability hits, how can your security team prepare to detect and respond to the latest threats? In what ways can your organization reduce risk in a dynamic threat landscape? Our Cybrary Threat Intelligence Group (CTIG) is here to jumpstart the conversation on grounding your security training and decision-making on actionable research. Hear our CTIG experts, Ryan English and Matt Mullins, discuss the latest intel on the Follina vulnerability (CVE-2022-30190), the ZuoRAT report from Black Lotus Labs, and evolving tactics from initial access brokers like Prophet Spider.&nbsp;&nbsp;</p><p>Take Matt’s training course on the Follina vulnerability:  ~<a href="https://www.cybrary.it/course/cve-series-follina-cve-2022-30190/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank">https://www.cybrary.it/course/cve-series-follina-cve-2022-30190/</a>&nbsp;</p><p><br></p><p>Enroll in our Spinning a Web Shell for Initial Access course to detect behaviors of real-world initial access brokers:  ~<a href="https://www.cybrary.it/catalog/spinning-a-web-shell-for-initial-access/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank">https://www.cybrary.it/catalog/spinning-a-web-shell-for-initial-access/</a>&nbsp;</p><p><br></p><p>Check out the report on ZuoRat from the Cybray Threat Intelligence Group (CTIG): ~<a href="https://www.cybrary.it/blog/ctig-coverage-of-black-lotus-labs-zuorat-report/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank">https://www.cybrary.it/blog/ctig-coverage-of-black-lotus-labs-zuorat-report/</a></p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=detecting-the-follina-vulnerability-and-initial-access-brokers" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-88]]></link><guid isPermaLink="false">275869fd-75b9-4721-989a-64d8aa692d9c</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 15 Jul 2022 19:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2eabf99f-ddce-4df1-826a-fc054c52c3ce/audio-426072-13106-29857-98e66297-8dac-42bf-b12a-053235718329.mp3" length="59293027" type="audio/mpeg"/><itunes:duration>01:01:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Hear our Cybrary Threat Intelligence Group experts, Ryan English and Matt Mullins, discuss the latest intel on the Follina vulnerability (CVE-2022-30190), the ZuoRAT report from Black Lotus Labs, and evolving tactics from initial access brokers like Prophet Spider.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 58 | Creating a Human-Centered Cyber Strategy with Robert Burns</title><itunes:title>401 Access Denied Ep. 58 | Creating a Human-Centered Cyber Strategy with Robert Burns</itunes:title><description><![CDATA[<p>As our threat landscape evolves and remote work opportunities continue to grow in popularity, it's important that security leaders enhance their future-proofing strategies. How can organizations cultivate human-centered approaches to prioritizing risks and developing proactive incident response plans? Robert Burns, Chief Security Officer of the Thales Cloud Protection and Licensing division, sits down with the 401 Access Denied team to discuss these strategies and other key takeaways from the June 2022 BSIDES and RSA conferences.</p><p><strong>Connect with Bob!</strong></p><p>~<a href="https://www.linkedin.com/in/robertlburns/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p>~<a href="https://twitter.com/SecurityHodor" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=creating-a-human-centered-cyber-strategy-with-robert-burns" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>As our threat landscape evolves and remote work opportunities continue to grow in popularity, it's important that security leaders enhance their future-proofing strategies. How can organizations cultivate human-centered approaches to prioritizing risks and developing proactive incident response plans? Robert Burns, Chief Security Officer of the Thales Cloud Protection and Licensing division, sits down with the 401 Access Denied team to discuss these strategies and other key takeaways from the June 2022 BSIDES and RSA conferences.</p><p><strong>Connect with Bob!</strong></p><p>~<a href="https://www.linkedin.com/in/robertlburns/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p>~<a href="https://twitter.com/SecurityHodor" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=creating-a-human-centered-cyber-strategy-with-robert-burns" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-58]]></link><guid isPermaLink="false">f9d6b30a-2678-447c-8a62-d171b3694b92</guid><itunes:image href="https://artwork.captivate.fm/7458ef90-e84c-48f9-ba5d-14de36e09484/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 13 Jul 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9a1326d4-5a72-41c1-aaa1-61794219c9f8/audio-423236-13106-29857-ff37ab41-6a6c-4ca1-9ad2-453d1b54b6c0.mp3" length="18248726" type="audio/mpeg"/><itunes:duration>19:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode><itunes:summary>How can organizations cultivate human-centered approaches to prioritizing risks and developing proactive incident response plans? Robert Burns, Chief Security Officer of the Thales Cloud Protection and Licensing division, sits down with the 401 Access Denied team to discuss these strategies and other key takeaways from the June 2022 BSIDES and RSA conferences.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Reflections on the Infosecurity Europe Conference 2022 | The Cybrary Podcast Ep. 87</title><itunes:title>Reflections on the Infosecurity Europe Conference 2022 | The Cybrary Podcast Ep. 87</itunes:title><description><![CDATA[<p>Security conference season is back in full swing, and Cybrary is here to bring you all the highlights! Our Senior Product Manager, Ned Hinman, shares key takeaways from the Infosecurity Europe Conference in June of 2022. Hear what security leaders organizations like ISC2 are saying about strategies for bridging skills gaps, attracting new talent, and approaching cybersecurity as a psychological challenge.&nbsp;&nbsp;</p><p>Read the <a href="https://www.ialeia.org/docs/Psychology_of_Intelligence_Analysis.pdf" rel="noopener noreferrer" target="_blank">Psychology of Intelligence Analysis</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=reflections-on-the-infosecurity-europe-conference-2022" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Security conference season is back in full swing, and Cybrary is here to bring you all the highlights! Our Senior Product Manager, Ned Hinman, shares key takeaways from the Infosecurity Europe Conference in June of 2022. Hear what security leaders organizations like ISC2 are saying about strategies for bridging skills gaps, attracting new talent, and approaching cybersecurity as a psychological challenge.&nbsp;&nbsp;</p><p>Read the <a href="https://www.ialeia.org/docs/Psychology_of_Intelligence_Analysis.pdf" rel="noopener noreferrer" target="_blank">Psychology of Intelligence Analysis</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=reflections-on-the-infosecurity-europe-conference-2022" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-87]]></link><guid isPermaLink="false">4a817426-457e-4f98-b7c1-965e99a9c878</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 06 Jul 2022 15:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5fea1691-fd54-4c04-a131-8e47d64d1f45/audio-419139-13106-29857-a37ea5e1-c52b-4642-8ff1-07b72de77b7a.mp3" length="37359337" type="audio/mpeg"/><itunes:duration>38:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Our Senior Product Manager, Ned Hinman, shares key takeaways from the Infosecurity Europe Conference in June of 2022.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 57 | Tackling Trauma in Cybersecurity with Chloé Messdaghi</title><itunes:title>401 Access Denied Podcast Ep. 57 | Tackling Trauma in Cybersecurity with Chloé Messdaghi</itunes:title><description><![CDATA[<p>Living in the Information Age means that we have a wide world of knowledge and networks at our fingertips, but where do we find that balance between enlightenment and exhaustion? If you're weary from doomscrolling and tired of putting bandaids on burnout, you'll want to hear what Chloé Messdaghi has to say about maintaining sanity in the security industry. Join Chloé as she kicks off her latest gig as the co-host of the 401 Access Denied podcast, where she will share insights on prioritizing mental health support and positive leadership in cybersecurity.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=tackling-trauma-in-cybersecurity-with-chloe-messdaghi" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Living in the Information Age means that we have a wide world of knowledge and networks at our fingertips, but where do we find that balance between enlightenment and exhaustion? If you're weary from doomscrolling and tired of putting bandaids on burnout, you'll want to hear what Chloé Messdaghi has to say about maintaining sanity in the security industry. Join Chloé as she kicks off her latest gig as the co-host of the 401 Access Denied podcast, where she will share insights on prioritizing mental health support and positive leadership in cybersecurity.</p><p><strong>Follow us on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=tackling-trauma-in-cybersecurity-with-chloe-messdaghi" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-57]]></link><guid isPermaLink="false">1e2a2616-8f68-41ed-a0ed-d5df42f92980</guid><itunes:image href="https://artwork.captivate.fm/8f2f73b0-a4d2-4aad-848c-2128fee6db09/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 29 Jun 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7059f7ad-8475-4f07-8671-d6fdd9043203/audio-411409-13106-29857-1883e3e3-b290-4576-b247-24f5cefa4831.mp3" length="32145829" type="audio/mpeg"/><itunes:duration>33:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode><itunes:summary>Join Joe and Chloé Messdaghi as she kicks off her latest gig as the co-host of the 401 Access Denied podcast, where she will share insights on prioritizing mental health support and positive leadership in cybersecurity.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Preventing Data Exfiltration and Extortion Attacks | Cybrary Podcast Ep 86</title><itunes:title>Preventing Data Exfiltration and Extortion Attacks | Cybrary Podcast Ep 86</itunes:title><description><![CDATA[<p>As cybersecurity teams become more advanced, adversaries get craftier. That's why Cybrary's blue teamer Owen Dubiel and red teamer Matt Mullins joined forces to develop purple team training campaigns based on real-world threats. Their latest campaign explores how threat actors like FIN10 extort organizations by threatening to expose their stolen data publicly. Hear all about how Owen and Matt created training exercises to help you improve your situational awareness and detection strategies.</p><p>Think you have what it takes to enhance your detections to pinpoint each step in FIN10's attack kill chain? Enroll now in our Exfiltration and Extortion campaign, where you'll gain expert insights on real-world threat actor behavior and detect the malicious activity yourself in a virtual lab.</p><p><br></p><p>Enroll now in our new <a href="https://www.cybrary.it/catalog/exfiltration-and-extortion/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=preventing-data-exfiltration-and-extortion-attacks" rel="noopener noreferrer" target="_blank">Exfiltration and Extortion</a> Campaign!</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=preventing-data-exfiltration-and-extortion-attacks" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>As cybersecurity teams become more advanced, adversaries get craftier. That's why Cybrary's blue teamer Owen Dubiel and red teamer Matt Mullins joined forces to develop purple team training campaigns based on real-world threats. Their latest campaign explores how threat actors like FIN10 extort organizations by threatening to expose their stolen data publicly. Hear all about how Owen and Matt created training exercises to help you improve your situational awareness and detection strategies.</p><p>Think you have what it takes to enhance your detections to pinpoint each step in FIN10's attack kill chain? Enroll now in our Exfiltration and Extortion campaign, where you'll gain expert insights on real-world threat actor behavior and detect the malicious activity yourself in a virtual lab.</p><p><br></p><p>Enroll now in our new <a href="https://www.cybrary.it/catalog/exfiltration-and-extortion/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=preventing-data-exfiltration-and-extortion-attacks" rel="noopener noreferrer" target="_blank">Exfiltration and Extortion</a> Campaign!</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=preventing-data-exfiltration-and-extortion-attacks" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-86]]></link><guid isPermaLink="false">e385e6f2-167b-4fc9-a3e9-7c5356fdf15f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 24 Jun 2022 16:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e562f42a-0ca1-48d4-aa2a-10d4a8dfebaf/audio-407297-13106-29857-7dd91b56-b1b4-4d7f-8e60-36f3b625eb96.mp3" length="42367203" type="audio/mpeg"/><itunes:duration>44:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cybrary&apos;s blue teamer Owen Dubiel and red teamer Matt Mullins joined forces to develop purple team training campaigns based on real-world threats. In this episode, hear all about how Owen and Matt created training exercises to help you improve your situational awareness and detection strategies.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 56 | Highlights from Verizon&apos;s 2022 Data Breach Investigations Report</title><itunes:title>401 Access Denied Podcast Ep. 56 | Highlights from Verizon&apos;s 2022 Data Breach Investigations Report</itunes:title><description><![CDATA[<p>Verizon's 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! Delinea CISO Stan Black and Cybersecurity Evangelist, Tony Goulding, discuss which findings are most surprising, actionable, and trending upward in this year's report. Get the experts' advice on how we all can develop smart, data-driven security solutions based on evolving threat actor behavior and incident analysis.</p><p><strong>Read all about it in </strong><a href="https://www.verizon.com/business/resources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf" rel="noopener noreferrer" target="_blank"><strong>Verizon's 2022 Data Breach Investigations Report</strong></a><strong>!</strong>&nbsp;&nbsp;</p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=highlights-from-verizons-2022-data-breach-investigations-report" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Verizon's 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! Delinea CISO Stan Black and Cybersecurity Evangelist, Tony Goulding, discuss which findings are most surprising, actionable, and trending upward in this year's report. Get the experts' advice on how we all can develop smart, data-driven security solutions based on evolving threat actor behavior and incident analysis.</p><p><strong>Read all about it in </strong><a href="https://www.verizon.com/business/resources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf" rel="noopener noreferrer" target="_blank"><strong>Verizon's 2022 Data Breach Investigations Report</strong></a><strong>!</strong>&nbsp;&nbsp;</p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=highlights-from-verizons-2022-data-breach-investigations-report" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-56]]></link><guid isPermaLink="false">d44d9657-ad0a-4e44-b0ce-83f283873b77</guid><itunes:image href="https://artwork.captivate.fm/bbf49883-8205-4093-b940-3a777f3935bb/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 15 Jun 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f89563b2-d6ab-49ba-98c8-a03be3f3a8f2/audio-395371-13106-29857-0e0e06a9-35c3-4751-8cae-bc400e6e336b.mp3" length="49835179" type="audio/mpeg"/><itunes:duration>51:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode><itunes:summary>Verizon&apos;s 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! Delinea CISO Stan Black and Cybersecurity Evangelist, Tony Goulding, discuss which findings are most surprising, actionable, and trending upward in this year&apos;s report</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Prioritizing Diversity in Cybersecurity with Chloé Messdaghi | The Cybrary Podcast Ep. 85</title><itunes:title>Prioritizing Diversity in Cybersecurity with Chloé Messdaghi | The Cybrary Podcast Ep. 85</itunes:title><description><![CDATA[<p>Acclaimed cybersecurity power player Chloé Messdaghi is making big moves in her new role as Cybrary's Head of Impact. In this episode of the Cybrary podcast, she discusses commonsense approaches to minimizing bias and cultivating inclusivity in the security industry. How can organizations mitigate not only dynamic cyber risks, but also the revolving door of employee turnover? What can effective leaders do to prioritize the value of security teams and invest in their continued growth? Listen to Chloé's advice on developing a human-centered perspective in security management and workplace culture.</p><p><strong>Follow Cybrary on Social!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=prioritizing-diversity-in-cybersecurity-with-chloe-messdaghi" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></description><content:encoded><![CDATA[<p>Acclaimed cybersecurity power player Chloé Messdaghi is making big moves in her new role as Cybrary's Head of Impact. In this episode of the Cybrary podcast, she discusses commonsense approaches to minimizing bias and cultivating inclusivity in the security industry. How can organizations mitigate not only dynamic cyber risks, but also the revolving door of employee turnover? What can effective leaders do to prioritize the value of security teams and invest in their continued growth? Listen to Chloé's advice on developing a human-centered perspective in security management and workplace culture.</p><p><strong>Follow Cybrary on Social!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p><strong>Jump-start your cybersecurity career with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=prioritizing-diversity-in-cybersecurity-with-chloe-messdaghi" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-85]]></link><guid isPermaLink="false">aefaf4b1-519f-4060-a143-197a48767ffa</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 08 Jun 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a9dd2ba4-a8c7-43f6-971c-56ef7f155225/audio-386868-13106-29857-7d9da527-51bb-4b0f-9ba8-c77e26d688c3.mp3" length="41812118" type="audio/mpeg"/><itunes:duration>43:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this episode of the Cybrary podcast, Chloé Messdaghi, Cybrary&apos;s new Head of Impact, discusses commonsense approaches to minimizing bias and cultivating inclusivity in the security industry.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 55 | Investing in People and Reducing Skills Gaps with Kevin Hanes</title><itunes:title>401 Access Denied Podcast Ep. 55 | Investing in People and Reducing Skills Gaps with Kevin Hanes</itunes:title><description><![CDATA[<p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=investing-in-people-and-reducing-skills-gaps-with-kevin-hanes" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Where can organizations find specialized candidates for millions of unfilled security jobs? How can the right approach to training help increase employee retention and close the notorious cybersecurity skills gap? Kevin Hanes, CEO of Cybrary, shares why investing in people is a vital part of reducing risk. Learn how you can effectively prioritize diversity in the hiring process and support the growth of people who value the continuous educational journey that is cybersecurity.</p><p><strong>Follow us on Social!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=401-podcast&amp;utm_medium=description&amp;utm_campaign=investing-in-people-and-reducing-skills-gaps-with-kevin-hanes" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>Where can organizations find specialized candidates for millions of unfilled security jobs? How can the right approach to training help increase employee retention and close the notorious cybersecurity skills gap? Kevin Hanes, CEO of Cybrary, shares why investing in people is a vital part of reducing risk. Learn how you can effectively prioritize diversity in the hiring process and support the growth of people who value the continuous educational journey that is cybersecurity.</p><p><strong>Follow us on Social!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-55]]></link><guid isPermaLink="false">5cd1a7e0-e222-49ed-86af-ed727069b79f</guid><itunes:image href="https://artwork.captivate.fm/524633bb-db1b-4f2d-9c4c-45458003a669/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 01 Jun 2022 04:45:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/00aa29a1-9d32-483d-a7f5-18b9cc8cc60b/audio-375654-13106-29857-236aa776-a85a-449c-8aa8-415e57e2bba7.mp3" length="44479715" type="audio/mpeg"/><itunes:duration>46:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>55</itunes:episode><podcast:episode>55</podcast:episode><itunes:summary>Kevin Hanes, CEO of Cybrary, shares why investing in people is a vital part of reducing risk. Learn how you can effectively prioritize diversity in the hiring process and support the growth of people who value the continuous educational journey that is cybersecurity.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>The Power of Purple Teaming with Owen Dubiel and Matt Mullins | The Cybrary Podcast Ep. 84</title><itunes:title>The Power of Purple Teaming with Owen Dubiel and Matt Mullins | The Cybrary Podcast Ep. 84</itunes:title><description><![CDATA[<p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-power-of-purple-teaming-with-owen-dubiel-and-matt-mullins" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>How can purple teaming benefit your organization? When red teamers like Matt Mullins collaborate with blue teamers like Owen Dubiel, you know you'll get a thorough and cost-effective assessment of your security environment. Listen to Matt and Owen share their strategies for successful purple teaming design and implementation. Plus, hear about their new Cybrary course campaign where you'll learn real-world adversary techniques before enhancing detections.</p><p><br></p><p><strong>Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries!</strong></p><p>~<a href="https://www.cybrary.it/catalog/threat-actor-campaigns/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-power-of-purple-teaming-with-owen-dubiel-and-matt-mullins" rel="noopener noreferrer" target="_blank">Threat Actor Campaigns</a></p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-power-of-purple-teaming-with-owen-dubiel-and-matt-mullins" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>How can purple teaming benefit your organization? When red teamers like Matt Mullins collaborate with blue teamers like Owen Dubiel, you know you'll get a thorough and cost-effective assessment of your security environment. Listen to Matt and Owen share their strategies for successful purple teaming design and implementation. Plus, hear about their new Cybrary course campaign where you'll learn real-world adversary techniques before enhancing detections.</p><p><br></p><p><strong>Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries!</strong></p><p>~<a href="https://www.cybrary.it/catalog/threat-actor-campaigns/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=the-power-of-purple-teaming-with-owen-dubiel-and-matt-mullins" rel="noopener noreferrer" target="_blank">Threat Actor Campaigns</a></p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-84]]></link><guid isPermaLink="false">d1527521-1e21-4fd1-9459-f4fd7cbb4618</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Thu, 26 May 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5440d569-c50e-4780-9082-346aa7c031d6/audio-367760-13106-29857-e7e5f835-1258-46ea-939b-7c42dbaf26ed.mp3" length="48054749" type="audio/mpeg"/><itunes:duration>50:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, listen to Matt and Owen share their strategies for successful purple teaming design and implementation. Plus, hear about their new Cybrary course campaign where you&apos;ll learn real-world adversary techniques before enhancing detections.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 54 | Creativity, Community, and Bug Bounties with STÖK</title><itunes:title>401 Access Denied Podcast Ep. 54 | Creativity, Community, and Bug Bounties with STÖK</itunes:title><description><![CDATA[<p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=creativity-community-and-bug-bounties-with-stok" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>How does the hacker of all trades, Fredrik Alexandersson (aka STÖK), take the time to learn new things, design sustainable fashion, and connect with a growing social media community? Hear how you can satisfy your curiosity with the ultimate work-life balance. Follow STÖK down the bug bounty career path that influenced his cybersecurity career journey and inspired his creative pursuits.</p><p><strong>Follow STÖK on all platforms! </strong></p><p>~<a href="https://www.stokfredrik.com/" rel="noopener noreferrer" target="_blank">Website</a>&nbsp;</p><p>~<a href="https://www.youtube.com/c/STOKfredrik/" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://twitter.com/stokfredrik" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;&nbsp;</p><p><br></p><p><strong>Follow us on Social!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p><strong>Jump-start your cybersecurity career for FREE with </strong><a href="https://www.cybrary.it/?utm_source=cybrary-podcast&amp;utm_medium=description&amp;utm_campaign=creativity-community-and-bug-bounties-with-stok" rel="noopener noreferrer" target="_blank"><strong>Cybrary</strong></a><strong>!</strong></p><p>How does the hacker of all trades, Fredrik Alexandersson (aka STÖK), take the time to learn new things, design sustainable fashion, and connect with a growing social media community? Hear how you can satisfy your curiosity with the ultimate work-life balance. Follow STÖK down the bug bounty career path that influenced his cybersecurity career journey and inspired his creative pursuits.</p><p><strong>Follow STÖK on all platforms! </strong></p><p>~<a href="https://www.stokfredrik.com/" rel="noopener noreferrer" target="_blank">Website</a>&nbsp;</p><p>~<a href="https://www.youtube.com/c/STOKfredrik/" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://twitter.com/stokfredrik" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;&nbsp;</p><p><br></p><p><strong>Follow us on Social!</strong></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-54]]></link><guid isPermaLink="false">c56f028e-08a2-41d3-b36b-52e67081b3d1</guid><itunes:image href="https://artwork.captivate.fm/831da064-0326-4c66-82d7-ea86e87a5cbe/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 18 May 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/eae3b1a1-7b02-4cd3-8b55-db8f21328b87/audio-358026-13106-29857-697755c0-d7af-4083-acb3-a98c363158b2.mp3" length="55497145" type="audio/mpeg"/><itunes:duration>57:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode><itunes:summary>How does the hacker of all trades, Fredrik Alexandersson (aka STÖK), take the time to learn new things, design sustainable fashion, and connect with a growing social media community? Hear how you can satisfy your curiosity with the ultimate work-life balance.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>How to Checkmate Ransomware Threat Actors with Red/Blue Team Training | The Cybrary Podcast Ep. 83</title><itunes:title>How to Checkmate Ransomware Threat Actors with Red/Blue Team Training | The Cybrary Podcast Ep. 83</itunes:title><description><![CDATA[<p>Ransomware attacks impacted 66% of organizations in 2021. As threat actor groups like FIN7 take advantage of expanded networks, security weaknesses, and human trust, it's more important than ever to keep up with their level of prowess. Cybrary's "enterprise defender," Owen Dubiel, and "chief thief," Matt Mullins, discuss how their cybersecurity work experiences informed their Ransomware for Financial Gain course series modeled after FIN7's techniques. Follow each part of their attack scenario that lets you emulate adversaries before enhancing your detections to reduce your risk of being the next ransomware victim.  </p>
<p>Why choose between the red and blue teams when you can do both?</p>
<p><strong>Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries! </strong></p>
<p>~<a href="https://www.cybrary.it/catalog/threat-actor-campaigns/">Threat Actor Campaigns</a> </p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Ransomware attacks impacted 66% of organizations in 2021. As threat actor groups like FIN7 take advantage of expanded networks, security weaknesses, and human trust, it's more important than ever to keep up with their level of prowess. Cybrary's "enterprise defender," Owen Dubiel, and "chief thief," Matt Mullins, discuss how their cybersecurity work experiences informed their Ransomware for Financial Gain course series modeled after FIN7's techniques. Follow each part of their attack scenario that lets you emulate adversaries before enhancing your detections to reduce your risk of being the next ransomware victim.  </p>
<p>Why choose between the red and blue teams when you can do both?</p>
<p><strong>Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries! </strong></p>
<p>~<a href="https://www.cybrary.it/catalog/threat-actor-campaigns/">Threat Actor Campaigns</a> </p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-83]]></link><guid isPermaLink="false">b216bb3a-7131-425a-8b63-af9114d914ad</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Fri, 13 May 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9fc8c7a8-b0d1-4c57-8818-994679d9a530/audio-352392-13106-29857-83be44e9-5b6c-4001-9412-a03bfbf4e753.mp3" length="50739851" type="audio/mpeg"/><itunes:duration>52:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, Cybrary&apos;s &quot;enterprise defender,&quot; Owen Dubiel, and &quot;chief thief,&quot; Matt Mullins, discuss how their cybersecurity work experiences informed their Ransomware for Financial Gain course series modeled after FIN7&apos;s techniques.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 53 | Password Security Secrets with Dustin Heywood (aka EvilMog)</title><itunes:title>401 Access Denied Ep. 53 | Password Security Secrets with Dustin Heywood (aka EvilMog)</itunes:title><description><![CDATA[<p>Just in time for World Password Day, this podcast episode is all about password cracking and the solutions to securing your secrets. Four-time DEF CON Black Badge winner and Chief Architect of IBM X-Force, Dustin Heywood, shares essential tips for easy password management. And if you're into ethical hacking, listen to Dustin's advice on which tools, hardware baselines, technique variations, and intellectual abilities will give you the advantage you need to start cracking.</p><p>Follow Dustin on Social!&nbsp;</p><p>~<a href="https://twitter.com/Evil_Mog" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.linkedin.com/in/evilmog/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Just in time for World Password Day, this podcast episode is all about password cracking and the solutions to securing your secrets. Four-time DEF CON Black Badge winner and Chief Architect of IBM X-Force, Dustin Heywood, shares essential tips for easy password management. And if you're into ethical hacking, listen to Dustin's advice on which tools, hardware baselines, technique variations, and intellectual abilities will give you the advantage you need to start cracking.</p><p>Follow Dustin on Social!&nbsp;</p><p>~<a href="https://twitter.com/Evil_Mog" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>~<a href="https://www.linkedin.com/in/evilmog/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-53]]></link><guid isPermaLink="false">2961b056-8886-4ad0-a19f-c3ae1adf742d</guid><itunes:image href="https://artwork.captivate.fm/21b7e1cb-ef04-465c-ab10-aabdd3b0be39/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 04 May 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/af843e19-d235-491b-8d89-d030e0e8d1ba/audio-342314-13106-29857-cd029da9-f535-4fc7-9ba1-0e7bd03442bb.mp3" length="48926340" type="audio/mpeg"/><itunes:duration>50:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode><itunes:summary>Four-time DEF CON Black Badge winner and Chief Architect of IBM X-Force, Dustin Heywood, shares essential tips for easy password management. And if you&apos;re into ethical hacking, listen to Dustin&apos;s advice on which tools, hardware baselines, technique variations, and intellectual abilities will give you the advantage you need to start cracking.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Counting Down the OWASP Top 10 List with Clint Kehr | The Cybrary Podcast Ep. 82</title><itunes:title>Counting Down the OWASP Top 10 List with Clint Kehr | The Cybrary Podcast Ep. 82</itunes:title><description><![CDATA[<p>Ready to get hands-on with Cybrary's ten bite-sized OWASP Top 10 courses? Legendary instructor and penetration tester, Clint Kehr, shares what you can expect in his scenario-based training courses that prepare you to exploit real-world web application vulnerabilities. Hear what's new in the 2021 OWASP Top Ten List, including category revisions, position ranking adjustments, and a whole lot of freshly-mapped CWEs. Plus, learn how Clint and the CyDefe team worked to bring you custom lab exercises that challenge you to think like a pen tester.  </p>
<p><strong>Enroll in all of Clint's phenomenal OWASP Top 10: 2021 courses!  </strong></p>
<p>~<a href="https://www.cybrary.it/course/owasp-top-10-a01-2021-broken-access-control/">A01:2021 - Broken Access Control</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-cryptographic-failures">A02:2021 - Cryptographic Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-top-10-a03-2021-injection">A03:2021 - Injection</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-insecure-design/">A04:2021 - Insecure Design </a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-security-misconfiguration/">A05:2021 - Security Misconfiguration</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-vulnerable-and-outdated-components/">A06:2021 - Vulnerable and Outdated Components</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-identification-and-authentication-failures/">A07:2021 - Identification and Authentication Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-software-and-data-integrity-failures/">A08:2021 - Software and Data Integrity Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-security-logging-and-monitoring-failures/">A09:2021 - Security Logging and Monitoring Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-server-side-request-forgery/">A10:2021 - Server-Side Request Forgery (SSRF)</a> </p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Ready to get hands-on with Cybrary's ten bite-sized OWASP Top 10 courses? Legendary instructor and penetration tester, Clint Kehr, shares what you can expect in his scenario-based training courses that prepare you to exploit real-world web application vulnerabilities. Hear what's new in the 2021 OWASP Top Ten List, including category revisions, position ranking adjustments, and a whole lot of freshly-mapped CWEs. Plus, learn how Clint and the CyDefe team worked to bring you custom lab exercises that challenge you to think like a pen tester.  </p>
<p><strong>Enroll in all of Clint's phenomenal OWASP Top 10: 2021 courses!  </strong></p>
<p>~<a href="https://www.cybrary.it/course/owasp-top-10-a01-2021-broken-access-control/">A01:2021 - Broken Access Control</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-cryptographic-failures">A02:2021 - Cryptographic Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-top-10-a03-2021-injection">A03:2021 - Injection</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-insecure-design/">A04:2021 - Insecure Design </a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-security-misconfiguration/">A05:2021 - Security Misconfiguration</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-vulnerable-and-outdated-components/">A06:2021 - Vulnerable and Outdated Components</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-identification-and-authentication-failures/">A07:2021 - Identification and Authentication Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-software-and-data-integrity-failures/">A08:2021 - Software and Data Integrity Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-security-logging-and-monitoring-failures/">A09:2021 - Security Logging and Monitoring Failures</a> </p>
<p>~<a href="https://www.cybrary.it/course/owasp-server-side-request-forgery/">A10:2021 - Server-Side Request Forgery (SSRF)</a> </p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-82]]></link><guid isPermaLink="false">5625b639-52ff-4281-b140-01f158e5c490</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 27 Apr 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0fcf8936-ec8a-4c7f-887a-97875d083e2e/audio-334305-13106-29857-f0e6f3d1-5719-41e1-8b9a-47f3b3e3efc1.mp3" length="45675195" type="audio/mpeg"/><itunes:duration>47:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Legendary instructor and penetration tester, Clint Kehr, shares what you can expect in his scenario-based training courses that prepare you to exploit real-world web application vulnerabilities. Hear what&apos;s new in the 2021 OWASP Top Ten List, including category revisions, position ranking adjustments, and a whole lot of freshly-mapped CWEs.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 52 | Hacking the Penetration Test with FC (aka Freaky Clown)</title><itunes:title>401 Access Denied Ep. 52 | Hacking the Penetration Test with FC (aka Freaky Clown)</itunes:title><description><![CDATA[<p>In a world where cybersecurity is no longer just an IT issue, it is more important than ever to assess the human, technical, and physical security aspects of any organization. Bringing responsible awareness to this triad, FC (aka Freaky Clown) and his team at Cygenta are reimagining the role of penetration testing in fostering sustainable cyber resilience. Hear the tricks that FC has learned on the job while (ethically!) robbing banks to identify physical security weaknesses, enhancing the comprehensive value of pen tests, and developing cybersecurity training exercises for people of all ages.</p><p><strong>Learn more about FC's company!</strong></p><p>&nbsp;~<a href="https://www.cygenta.co.uk/" rel="noopener noreferrer" target="_blank">Cygenta</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>In a world where cybersecurity is no longer just an IT issue, it is more important than ever to assess the human, technical, and physical security aspects of any organization. Bringing responsible awareness to this triad, FC (aka Freaky Clown) and his team at Cygenta are reimagining the role of penetration testing in fostering sustainable cyber resilience. Hear the tricks that FC has learned on the job while (ethically!) robbing banks to identify physical security weaknesses, enhancing the comprehensive value of pen tests, and developing cybersecurity training exercises for people of all ages.</p><p><strong>Learn more about FC's company!</strong></p><p>&nbsp;~<a href="https://www.cygenta.co.uk/" rel="noopener noreferrer" target="_blank">Cygenta</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-52]]></link><guid isPermaLink="false">dc94ebc5-5e85-4030-823b-99004154bc64</guid><itunes:image href="https://artwork.captivate.fm/899b8386-fe07-4bd3-a9e5-12e8b430362f/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 20 Apr 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3d8424e9-2955-4180-890e-6db24558b062/audio-325347-13106-29857-236c430c-2b8b-455c-9fb8-bcb1a46f04fa.mp3" length="45649837" type="audio/mpeg"/><itunes:duration>47:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode><itunes:summary>FC (aka Freaky Clown) and his team at Cygenta are reimagining the role of penetration testing in fostering sustainable cyber resilience. Hear the tricks that FC has learned on the job while (ethically!) robbing banks to identify physical security weaknesses, enhancing the comprehensive value of pen tests, and developing cybersecurity training exercises for people of all ages.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>The Okta Breach and Cyber Risk Management with Cybrary CEO Kevin Hanes | The Cybrary Podcast Ep. 81</title><itunes:title>The Okta Breach and Cyber Risk Management with Cybrary CEO Kevin Hanes | The Cybrary Podcast Ep. 81</itunes:title><description><![CDATA[<p>The Okta security breach has gained considerable attention since the company's public disclosure of the attack on March 22nd, 2022. As debates continue on the timeliness and effectiveness of the organization's response, we at Cybrary want to elevate the discourse on how to foster smart, sustainable, and empathetic approaches to cybersecurity risk management. On this episode of the Cybrary Podcast, listen to the thoughtful advice of Cybrary's CEO, Kevin Hanes, and Senior Director of Content, Will Carlson, as they discuss how all organizational stakeholders can align on incident response strategies.</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>The Okta security breach has gained considerable attention since the company's public disclosure of the attack on March 22nd, 2022. As debates continue on the timeliness and effectiveness of the organization's response, we at Cybrary want to elevate the discourse on how to foster smart, sustainable, and empathetic approaches to cybersecurity risk management. On this episode of the Cybrary Podcast, listen to the thoughtful advice of Cybrary's CEO, Kevin Hanes, and Senior Director of Content, Will Carlson, as they discuss how all organizational stakeholders can align on incident response strategies.</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-81]]></link><guid isPermaLink="false">a1858dc1-e01c-4182-afbb-edfb311ad747</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Thu, 31 Mar 2022 19:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/21154f31-f846-476d-ad9b-fd3be8142113/audio-302742-13106-29857-b1939550-73e4-4ef5-b024-3ab528207e70.mp3" length="54483951" type="audio/mpeg"/><itunes:duration>56:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this episode of the Cybrary Podcast, Listen to the thoughtful advice of Cybrary&apos;s CEO, Kevin Hanes, and Senior Director of Content, Will Carlson, as they discuss how all organizational stakeholders can align on incident response strategies.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 51 | Privilege Escalation Using HackTricks with Carlos Polop</title><itunes:title>401 Access Denied Podcast Ep. 51 | Privilege Escalation Using HackTricks with Carlos Polop</itunes:title><description><![CDATA[<p>In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS).  Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws.  Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.</p><p>Check out Carlos' book: <a href="https://book.hacktricks.xyz/" rel="noopener noreferrer" target="_blank">https://book.hacktricks.xyz/</a>&nbsp;</p><p>Follow Carlos on GitHub &amp; submit pull requests: <a href="https://github.com/carlospolop" rel="noopener noreferrer" target="_blank">https://github.com/carlospolop</a>&nbsp;</p><p>Join Carlos' Discord community: <a href="https://discord.gg/hRep4RUj7f" rel="noopener noreferrer" target="_blank">https://discord.gg/hRep4RUj7f</a>&nbsp;</p><p>Follow Carlos on Twitter: <a href="https://twitter.com/carlospolopm" rel="noopener noreferrer" target="_blank">https://twitter.com/carlospolopm</a>&nbsp;</p><p><strong>Connect with Delinea:</strong></p><p><a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea Website</a></p><p><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea</a></p><p><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://twitter.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Facebook</a></p><p><a href="https://www.youtube.com/c/delinea" rel="noopener noreferrer" target="_blank">Delinea YouTube</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of 401 Access Denied, we're joined by Carlos Polop, security researcher and creator of Privilege Escalation Awesome Script Suite (PEASS).  Seen recently with the Linux "Dirty Pipe" vulnerability exploitation, it's become critical to learn how attackers exploit privilege escalation flaws.  Carlos shares how pen testers can use LinPEAS and WinPEAS to expose vulnerabilities in CTF environments. Additionally, learn how you can contribute to his research in the penetration testing community.</p><p>Check out Carlos' book: <a href="https://book.hacktricks.xyz/" rel="noopener noreferrer" target="_blank">https://book.hacktricks.xyz/</a>&nbsp;</p><p>Follow Carlos on GitHub &amp; submit pull requests: <a href="https://github.com/carlospolop" rel="noopener noreferrer" target="_blank">https://github.com/carlospolop</a>&nbsp;</p><p>Join Carlos' Discord community: <a href="https://discord.gg/hRep4RUj7f" rel="noopener noreferrer" target="_blank">https://discord.gg/hRep4RUj7f</a>&nbsp;</p><p>Follow Carlos on Twitter: <a href="https://twitter.com/carlospolopm" rel="noopener noreferrer" target="_blank">https://twitter.com/carlospolopm</a>&nbsp;</p><p><strong>Connect with Delinea:</strong></p><p><a href="https://delinea.com/" rel="noopener noreferrer" target="_blank">Delinea Website</a></p><p><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea</a></p><p><a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><a href="https://twitter.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><a href="https://www.facebook.com/delineainc" rel="noopener noreferrer" target="_blank">Delinea Facebook</a></p><p><a href="https://www.youtube.com/c/delinea" rel="noopener noreferrer" target="_blank">Delinea YouTube</a></p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">6321d8f9-5a3c-47e6-a2f1-ac322ee9c99b</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Thu, 24 Mar 2022 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a5b1c8db-2207-4d1a-86e7-9039ba9f8f68/401-Access-Denied-Ep-51-Carlos-Polop-FINAL-Video-converted.mp3" length="47950511" type="audio/mpeg"/><itunes:duration>49:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode><itunes:author>Delinea</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/4a165f01-e398-4e5e-9180-5b2e0143d5c6/index.html" type="text/html"/></item><item><title>401 Access Denied Podcast Ep. 50 | The State of Global Information Wars with Dan Lohrmann</title><itunes:title>401 Access Denied Ep. 50 | The State of Global Information Wars with Dan Lohrmann</itunes:title><description><![CDATA[<p>As cybersecurity teams seek to enhance their defenses in the wake of worldwide ransomware attacks and the spread of wiper malware in Ukraine, what predictions can we make about the evolution of global information wars? Acclaimed security leader and Field CISO at Presidio, Dan Lohrmann, discusses emerging trends in cyber insurance, cyber incident reporting, and incident response planning. Learn more about the potential impact of the Shields Up advisory published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Amidst growing risk and uncertainty, hear Dan's advice on how you can develop best practices for training and preparing your security team.</p><p><strong>Connect with Dan!</strong></p><p>~ <a href="https://www.linkedin.com/in/danlohrmann/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~ <a href="https://twitter.com/govcso" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Check out Dan's Book:</strong>&nbsp;</p><p><br></p><p>~<a href="https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305" rel="noopener noreferrer" target="_blank">Cyber Mayday and the Day After</a>&nbsp;</p><p><br></p><p><strong>Read Dan's Blog Post on Cyber Insurance:</strong>&nbsp;</p><p><br></p><p>~<a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/where-next-for-government-in-the-cyber-insurance-market" rel="noopener noreferrer" target="_blank">Where Next for Government in the Cyber Insurance Market?</a>&nbsp;</p><p><br></p><p><strong>Read More on Cybersecurity and the Invasion of Ukraine:</strong></p><p><br></p><p>~<a href="https://www.darkreading.com/attacks-breaches/new-cyber-incident-law-not-a-national-breach-law-but-a-major-first-step" rel="noopener noreferrer" target="_blank">What the Newly Signed US Cyber-Incident Law Means for Security</a>&nbsp;</p><p><br></p><p>~<a href="https://www.cnbc.com/2022/03/14/volunteers-sign-up-to-help-in-cyberwars-between-russia-and-ukraine-.html" rel="noopener noreferrer" target="_blank">‘For the first time in history anyone can join a war’: Volunteers join Russia-Ukraine cyber fight</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>As cybersecurity teams seek to enhance their defenses in the wake of worldwide ransomware attacks and the spread of wiper malware in Ukraine, what predictions can we make about the evolution of global information wars? Acclaimed security leader and Field CISO at Presidio, Dan Lohrmann, discusses emerging trends in cyber insurance, cyber incident reporting, and incident response planning. Learn more about the potential impact of the Shields Up advisory published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Amidst growing risk and uncertainty, hear Dan's advice on how you can develop best practices for training and preparing your security team.</p><p><strong>Connect with Dan!</strong></p><p>~ <a href="https://www.linkedin.com/in/danlohrmann/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~ <a href="https://twitter.com/govcso" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Check out Dan's Book:</strong>&nbsp;</p><p><br></p><p>~<a href="https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305" rel="noopener noreferrer" target="_blank">Cyber Mayday and the Day After</a>&nbsp;</p><p><br></p><p><strong>Read Dan's Blog Post on Cyber Insurance:</strong>&nbsp;</p><p><br></p><p>~<a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/where-next-for-government-in-the-cyber-insurance-market" rel="noopener noreferrer" target="_blank">Where Next for Government in the Cyber Insurance Market?</a>&nbsp;</p><p><br></p><p><strong>Read More on Cybersecurity and the Invasion of Ukraine:</strong></p><p><br></p><p>~<a href="https://www.darkreading.com/attacks-breaches/new-cyber-incident-law-not-a-national-breach-law-but-a-major-first-step" rel="noopener noreferrer" target="_blank">What the Newly Signed US Cyber-Incident Law Means for Security</a>&nbsp;</p><p><br></p><p>~<a href="https://www.cnbc.com/2022/03/14/volunteers-sign-up-to-help-in-cyberwars-between-russia-and-ukraine-.html" rel="noopener noreferrer" target="_blank">‘For the first time in history anyone can join a war’: Volunteers join Russia-Ukraine cyber fight</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-50]]></link><guid isPermaLink="false">3f695875-48b7-4567-9344-ef18e62df7d6</guid><itunes:image href="https://artwork.captivate.fm/9a88fd34-9d2f-4863-944d-4ab647d50898/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Tue, 22 Mar 2022 22:11:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8ae77f2d-c1cc-489f-a553-1965ee06c27a/audio-290604-13106-29857-19d677a6-160d-4faf-b8e6-48a010525aac.mp3" length="44484166" type="audio/mpeg"/><itunes:duration>46:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode><itunes:summary>As cybersecurity teams seek to enhance their defenses in the wake of worldwide ransomware attacks and the spread of wiper malware in Ukraine, what predictions can we make about the evolution of global information wars? Acclaimed security leader and Field CISO at Presidio, Dan Lohrmann, discusses emerging trends in cyber insurance, cyber incident reporting, and incident response planning.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Analyzing Cyberattacks in Ukraine with Secureworks | The Cybrary Podcast Ep. 80</title><itunes:title>Analyzing Cyberattacks in Ukraine with Secureworks | The Cybrary Podcast Ep. 80</itunes:title><description><![CDATA[<p>During unprecedented times when cyber and kinetic military actions coalesce, what can we learn about the evolving nature of warfare? Mike McLellan and Rafe Pilling join us from the Counter Threat Unit at Secureworks to discuss the latest cyberattacks in Ukraine. What is distinctive about these emergent types of wiper malware, and how can we better discern the objectives of threat actors? Get advice from the security research experts about how your organization can enhance defenses and incident response planning in the face of new threats.</p>
<p><strong>Read more about this subject in our blog post:</strong></p>
<p>~<a href="https://www.cybrary.it/blog/cyberwarfare-evolution-and-impact-on-the-russia-ukraine-conflict/">Cyberwarfare: Evolution and Impact on the Russia-Ukraine Conflict</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>During unprecedented times when cyber and kinetic military actions coalesce, what can we learn about the evolving nature of warfare? Mike McLellan and Rafe Pilling join us from the Counter Threat Unit at Secureworks to discuss the latest cyberattacks in Ukraine. What is distinctive about these emergent types of wiper malware, and how can we better discern the objectives of threat actors? Get advice from the security research experts about how your organization can enhance defenses and incident response planning in the face of new threats.</p>
<p><strong>Read more about this subject in our blog post:</strong></p>
<p>~<a href="https://www.cybrary.it/blog/cyberwarfare-evolution-and-impact-on-the-russia-ukraine-conflict/">Cyberwarfare: Evolution and Impact on the Russia-Ukraine Conflict</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-80]]></link><guid isPermaLink="false">e853291c-2484-44be-a1ff-0db6522e4bb4</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 16 Mar 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f07fdc0a-702e-4d8f-9a61-d313de077eb5/audio-279271-13106-29857-488dbb64-8dad-4827-9cc7-da90c9e97d7e.mp3" length="42471765" type="audio/mpeg"/><itunes:duration>44:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, Mike McLellan and Rafe Pilling join us from the Counter Threat Unit at Secureworks to discuss the latest cyberattacks in Ukraine. Get advice from the security research experts about how your organization can enhance defenses and incident response planning in the face of new threats.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 49 | Getting Smart About Security Awareness Training with Paula Januszkiewicz</title><itunes:title>401 Access Denied Ep. 49 | Getting Smart About Security Awareness Training with Paula Januszkiewicz</itunes:title><description><![CDATA[<p>In just the first half of 2021, the financial industry saw a 1,318% in ransomware attacks. How can knowledge of ransomware gangs' encryption strategies help employees at every level of an organization to develop stronger incident response plans? Paula Januszkiewicz, acclaimed security leader, pen tester, and CQURE CEO, offers practical guidance on inclusive approaches to security awareness training. As the threat landscape evolves alongside new technological innovations, questions emerge about how we need to rethink password protection, privilege access, and at-home security. Enjoy this thought-provoking conversation about the value of curiosity and teamwork in forward-thinking security strategy development.</p><p><strong>Connect with Paula!</strong></p><p>~ <a href="https://www.linkedin.com/in/paulajanuszkiewicz/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p>~ <a href="https://twitter.com/paulacqure" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>In just the first half of 2021, the financial industry saw a 1,318% in ransomware attacks. How can knowledge of ransomware gangs' encryption strategies help employees at every level of an organization to develop stronger incident response plans? Paula Januszkiewicz, acclaimed security leader, pen tester, and CQURE CEO, offers practical guidance on inclusive approaches to security awareness training. As the threat landscape evolves alongside new technological innovations, questions emerge about how we need to rethink password protection, privilege access, and at-home security. Enjoy this thought-provoking conversation about the value of curiosity and teamwork in forward-thinking security strategy development.</p><p><strong>Connect with Paula!</strong></p><p>~ <a href="https://www.linkedin.com/in/paulajanuszkiewicz/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p>~ <a href="https://twitter.com/paulacqure" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-49]]></link><guid isPermaLink="false">20ec53d5-56b7-43de-adbf-d5b59248b485</guid><itunes:image href="https://artwork.captivate.fm/4c984fc6-fec7-417a-9f05-81e4936e4a14/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 09 Mar 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/77d8effd-97c0-4218-b00d-3f52ed6ca452/audio-269305-13106-29857-5c7ab225-b9da-4e4a-a6af-1e7f6975e98d.mp3" length="53265967" type="audio/mpeg"/><itunes:duration>55:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode><itunes:summary>Paula Januszkiewicz, acclaimed security leader, pen tester, and CQURE CEO, offers practical guidance on inclusive approaches to security awareness training. Enjoy this thought-provoking conversation about the value of curiosity and teamwork in forward-thinking security strategy development.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Adventures in Red Teaming with Matt Mullins | The Cybrary Podcast Ep. 79</title><itunes:title>Adventures in Red Teaming with Matt Mullins | The Cybrary Podcast Ep. 79</itunes:title><description><![CDATA[<p>Come on over to the dark side with Matt Mullins, the red teamer and penetration tester who is here to help you think like an adversary. Cybrary Course Manager Jenn Barnabee talks with Matt about his Cybrary courses that teach you how to exploit and mitigate the latest critical vulnerabilities, including Log4j, HiveNightmare, and more. Considering a path forward in offensive security? Then you'll love hearing about how Matt's career aspirations evolved from Buddhism studies to the "Help Desk Farm" to penetration testing. From zen to ZAP, he has a lot to share about taking risks and learning new tools!</p>
<p><strong>Enroll now in Matt's Cybrary courses! </strong> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-log4j-cve-2021-44228/">CVE Series: Log4j (CVE-2021-44228)</a> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-hivenightmare-cve-2021-36934/">CVE Series: HiveNightmare (CVE-2021-36934)</a> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-installerfiletakeover-cve-2021-41379/">CVE Series: InstallerFileTakeOver (CVE-2021-41379)</a> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-mshtml-vulnerability-cve-2021-40444/">CVE Series: MSHTML Vulnerability (CVE-2021-40444)</a> </p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-account-manipulation-ssh-authorized-keys-detection/">Cybrary's MITRE ATT&amp;CK TTP Course: SSH Authorized Keys</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Come on over to the dark side with Matt Mullins, the red teamer and penetration tester who is here to help you think like an adversary. Cybrary Course Manager Jenn Barnabee talks with Matt about his Cybrary courses that teach you how to exploit and mitigate the latest critical vulnerabilities, including Log4j, HiveNightmare, and more. Considering a path forward in offensive security? Then you'll love hearing about how Matt's career aspirations evolved from Buddhism studies to the "Help Desk Farm" to penetration testing. From zen to ZAP, he has a lot to share about taking risks and learning new tools!</p>
<p><strong>Enroll now in Matt's Cybrary courses! </strong> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-log4j-cve-2021-44228/">CVE Series: Log4j (CVE-2021-44228)</a> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-hivenightmare-cve-2021-36934/">CVE Series: HiveNightmare (CVE-2021-36934)</a> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-installerfiletakeover-cve-2021-41379/">CVE Series: InstallerFileTakeOver (CVE-2021-41379)</a> </p>
<p>~<a href="https://www.cybrary.it/course/cve-series-mshtml-vulnerability-cve-2021-40444/">CVE Series: MSHTML Vulnerability (CVE-2021-40444)</a> </p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-account-manipulation-ssh-authorized-keys-detection/">Cybrary's MITRE ATT&amp;CK TTP Course: SSH Authorized Keys</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-79]]></link><guid isPermaLink="false">6b6c79d8-f0cd-45dc-b114-a35fac9445e1</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 02 Mar 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/417f1312-5f5d-497f-ae80-432d2773527b/audio-256993-13106-29857-fb39b582-1a0e-4906-bfd2-c69f9ff67646.mp3" length="25194754" type="audio/mpeg"/><itunes:duration>26:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cybrary Course Manager Jenn Barnabee talks with Matt about his Cybrary courses that teach you how to exploit and mitigate the latest critical vulnerabilities, including Log4j, HiveNightmare, and more.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 48 | IoT Hacking with Beau Woods and Paulino Calderon</title><itunes:title>401 Access Denied Ep. 48 | IoT Hacking with Beau Woods and Paulino Calderon</itunes:title><description><![CDATA[<p>How can we improve the security of life-saving medical, communications, and transportation devices? What hands-on skills do we need in order to design more trustworthy hardware? In this episode of 401 Access Denied, InfoSec veterans Beau Woods and Paulino Calderon discuss key tips from their informative book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things." If you enjoy working with your hands and breaking things, then you'll want to hear Beau and Paulino's tips for how to kick off a dynamic, fulfilling career in IoT security. Learn more about why accessibility and collaboration are essential to improving the way that humans interact with, trust, and benefit from technological devices.&nbsp;</p><p><strong>Check out Beau and Paulino's book!</strong></p><p>~<a href="https://www.penguinrandomhouse.com/books/645957/practical-iot-hacking-by-fotios-chantzis-evangel-deirme-ioannis-stais-paulino-calderon-beau-woods/" rel="noopener noreferrer" target="_blank">"Practical IoT Hacking"</a>&nbsp;</p><p><br></p><p><strong>Connect with Beau and Paulino on social media</strong></p><p><br></p><p>~<a href="https://twitter.com/beauwoods" rel="noopener noreferrer" target="_blank">Beau's Twitter</a></p><p><br></p><p>~<a href="https://www.linkedin.com/in/beauwoods/" rel="noopener noreferrer" target="_blank">Beau's LinkedIn</a></p><p><br></p><p>~<a href="https://twitter.com/calderpwn" rel="noopener noreferrer" target="_blank">Paulino's Twitter</a></p><p><br></p><p>~<a href="https://www.linkedin.com/in/paulino-calderon-92932939/" rel="noopener noreferrer" target="_blank">Paulino's LinkedIn</a></p><p><br></p><p><strong>Join the IoT Village Discord server</strong></p><p><br></p><p>~<a href="http://hubs.li/H0L5jGz0" rel="noopener noreferrer" target="_blank">IoT Village</a></p><p><br></p><p>~<a href="https://discord.com/channels/707614530213249104/826890511989473321" rel="noopener noreferrer" target="_blank">#practical-iot-hacking Channel</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>How can we improve the security of life-saving medical, communications, and transportation devices? What hands-on skills do we need in order to design more trustworthy hardware? In this episode of 401 Access Denied, InfoSec veterans Beau Woods and Paulino Calderon discuss key tips from their informative book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things." If you enjoy working with your hands and breaking things, then you'll want to hear Beau and Paulino's tips for how to kick off a dynamic, fulfilling career in IoT security. Learn more about why accessibility and collaboration are essential to improving the way that humans interact with, trust, and benefit from technological devices.&nbsp;</p><p><strong>Check out Beau and Paulino's book!</strong></p><p>~<a href="https://www.penguinrandomhouse.com/books/645957/practical-iot-hacking-by-fotios-chantzis-evangel-deirme-ioannis-stais-paulino-calderon-beau-woods/" rel="noopener noreferrer" target="_blank">"Practical IoT Hacking"</a>&nbsp;</p><p><br></p><p><strong>Connect with Beau and Paulino on social media</strong></p><p><br></p><p>~<a href="https://twitter.com/beauwoods" rel="noopener noreferrer" target="_blank">Beau's Twitter</a></p><p><br></p><p>~<a href="https://www.linkedin.com/in/beauwoods/" rel="noopener noreferrer" target="_blank">Beau's LinkedIn</a></p><p><br></p><p>~<a href="https://twitter.com/calderpwn" rel="noopener noreferrer" target="_blank">Paulino's Twitter</a></p><p><br></p><p>~<a href="https://www.linkedin.com/in/paulino-calderon-92932939/" rel="noopener noreferrer" target="_blank">Paulino's LinkedIn</a></p><p><br></p><p><strong>Join the IoT Village Discord server</strong></p><p><br></p><p>~<a href="http://hubs.li/H0L5jGz0" rel="noopener noreferrer" target="_blank">IoT Village</a></p><p><br></p><p>~<a href="https://discord.com/channels/707614530213249104/826890511989473321" rel="noopener noreferrer" target="_blank">#practical-iot-hacking Channel</a></p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/DelineaInc" rel="noopener noreferrer" target="_blank">Delinea Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/delinea/" rel="noopener noreferrer" target="_blank">Delinea LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-48]]></link><guid isPermaLink="false">2968c327-fd99-448c-ba6a-a42fba12a84b</guid><itunes:image href="https://artwork.captivate.fm/a57afe1a-84d3-4fb8-8b5b-0814fe480c14/delinea-401-access-denied-podcast-logo-dark-logos-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 23 Feb 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6b7cd851-c130-4f72-ae24-a6eea47e9dee/audio-251055-13106-29857-995238ee-3c28-4834-82cc-90653d596793.mp3" length="54220739" type="audio/mpeg"/><itunes:duration>56:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode><itunes:summary>In this episode of 401 Access Denied, InfoSec veterans Beau Woods and Paulino Calderon discuss key tips from their informative book, &quot;Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things.&quot;</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Mitigating Polkit CVE-2021-4034 with CyDefe | The Cybrary Podcast Ep. 78</title><itunes:title>Mitigating Polkit CVE-2021-4034 with CyDefe | The Cybrary Podcast Ep. 78</itunes:title><description><![CDATA[<p>Ready to defend your organization against the widespread PolicyKit vulnerability that experts are comparing to the Log4j flaw? In this episode of the Cybrary Podcast, Raymond Evans, CEO of CyDefe Labs, discusses his latest Cybrary course on Polkit CVE-2021-4034. By exploiting this flaw, just how easy is it to gain root access on a target system? What can we learn from this vulnerability about the value of penetration testers and open-source software? Find out in this podcast and in Ray's course!</p>
<p><strong>Enroll now in Ray's newest course!</strong></p>
<p>~<a href="https://www.cybrary.it/course/cve-series-polkit-cve-2021-4034/">CVE Series: Polkit (CVE-2021-4034)</a> </p>
<p><strong>Learn more about Cybrary's partnership with CyDefe: </strong></p>
<p>~<a href="https://www.cybrary.it/catalog/vendor/cydefe/">https://www.cybrary.it/catalog/vendor/cydefe/</a> </p>
<p><strong>Follow CyDefe Labs on Social Media!</strong></p>
<p>~<a href="https://twitter.com/cydefe">Twitter</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Ready to defend your organization against the widespread PolicyKit vulnerability that experts are comparing to the Log4j flaw? In this episode of the Cybrary Podcast, Raymond Evans, CEO of CyDefe Labs, discusses his latest Cybrary course on Polkit CVE-2021-4034. By exploiting this flaw, just how easy is it to gain root access on a target system? What can we learn from this vulnerability about the value of penetration testers and open-source software? Find out in this podcast and in Ray's course!</p>
<p><strong>Enroll now in Ray's newest course!</strong></p>
<p>~<a href="https://www.cybrary.it/course/cve-series-polkit-cve-2021-4034/">CVE Series: Polkit (CVE-2021-4034)</a> </p>
<p><strong>Learn more about Cybrary's partnership with CyDefe: </strong></p>
<p>~<a href="https://www.cybrary.it/catalog/vendor/cydefe/">https://www.cybrary.it/catalog/vendor/cydefe/</a> </p>
<p><strong>Follow CyDefe Labs on Social Media!</strong></p>
<p>~<a href="https://twitter.com/cydefe">Twitter</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-78]]></link><guid isPermaLink="false">1b34be80-4f04-465b-a39b-461dc85768dc</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 16 Feb 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3071d01f-2aa1-45cf-b6ff-1f31531b3a32/audio-248629-13106-29857-d9dcfcb8-a871-483d-8778-972956afb4ae.mp3" length="36835565" type="audio/mpeg"/><itunes:duration>38:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, Raymond Evans, CEO of CyDefe Labs, discusses his latest Cybrary course on Polkit CVE-2021-4034. By exploiting this flaw, just how easy is it to gain root access on a target system? What can we learn from this vulnerability about the value of penetration testers and open-source software? Find out in this podcast and in Ray&apos;s course!</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 47 | Cybersecurity Conference Survival Tips with Chris Roberts</title><itunes:title>401 Access Denied Ep. 47 | Cybersecurity Conference Survival Tips with Chris Roberts</itunes:title><description><![CDATA[<p>Whether you’re new to cybersecurity or a longtime security professional, one of your best opportunities to network is at conferences. In this fun-filled episode of 401 Access Denied, seasoned conference-goers, Joe Carson and HillBilly Hit Squad’s vCISO (aka “Chief Geek”), Chris Roberts, share their insights on how to make the most of networking events. What clothes should you pack? How can you best plan your daily schedule so that you maximize productivity and have time to socialize? And, most importantly, where in the world can you find the best whiskey? Cheers to a new year filled with engaging, informative cybersecurity events!</p><p><strong>Connect with Chris on social media!</strong></p><p>~<a href="https://www.linkedin.com/in/sidragon1/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/sidragon1" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Whether you’re new to cybersecurity or a longtime security professional, one of your best opportunities to network is at conferences. In this fun-filled episode of 401 Access Denied, seasoned conference-goers, Joe Carson and HillBilly Hit Squad’s vCISO (aka “Chief Geek”), Chris Roberts, share their insights on how to make the most of networking events. What clothes should you pack? How can you best plan your daily schedule so that you maximize productivity and have time to socialize? And, most importantly, where in the world can you find the best whiskey? Cheers to a new year filled with engaging, informative cybersecurity events!</p><p><strong>Connect with Chris on social media!</strong></p><p>~<a href="https://www.linkedin.com/in/sidragon1/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/sidragon1" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-47]]></link><guid isPermaLink="false">55b51e4c-77c9-4349-8362-5178c38519d5</guid><itunes:image href="https://artwork.captivate.fm/f9dffdde-1bfe-421c-970a-6e09123c6bcb/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 09 Feb 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/df3ff44c-f250-416a-bcfb-affec717d79d/audio-245628-13106-29857-8bd58dec-4f9a-4d1f-8e51-a8c801e42c49.mp3" length="48518849" type="audio/mpeg"/><itunes:duration>50:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode><itunes:summary>In this fun-filled episode of 401 Access Denied, seasoned conference-goers, Joe Carson and HillBilly Hit Squad’s vCISO (aka “Chief Geek”), Chris Roberts, share their insights on how to make the most of networking events.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Leaping into Quantum Security with Aegiq | The Cybrary Podcast Ep. 77</title><itunes:title>Leaping into Quantum Security with Aegiq | The Cybrary Podcast Ep. 77</itunes:title><description><![CDATA[<p>The next revolution in quantum computing and technologies is happening now, but how exactly will these growing innovations affect our lives? Dr. Maksym Sich, CEO of the groundbreaking quantum photonics startup, Aegiq, discusses how quantum will impact our medical, communications, and financial industries. Addressing the myth that quantum computing will break all our encryption keys, Maksym elaborates on quantum communications, post-quantum cryptography, and efforts to develop sustainable solutions with security by design. Be ahead of the curve in knowing how we will want to upgrade our systems to improve efficiency, data privacy, and more!</p>
<p><strong>Learn more about Maksym's startup, Aegiq: </strong></p>
<p>~<a href="https://www.aegiq.com/">Company Website</a></p>
<p><strong>For more information on Quantum Computing:</strong></p>
<p>~<a href="https://ec.europa.eu/futurium/en/content/quantum-manifesto-quantum-technologies.html">Quantum Manifesto</a> </p>
<p>~<a href="https://www.gov.uk/government/publications/quantum-technologies-blackett-review">Quantum Technologies -  Blackett Review</a> </p>
<p>~<a href="https://www.quantumcommshub.net/industry-government-media/our-technologies/what-does-qkd-mean-for-the-economy/">Quantum Comms Hub, "What does QKD mean for the Economy?"</a> </p>
<p>~<a href="https://quantumconsortium.org/guide-to-a-quantum-safe-organization/">Report from the QED-C, "Guide to a Quantum Safe Organization"</a></p>
<p>~<a href="https://quantumconsortium.org/quantum-safe-guide">Downloadable Report from the QED-C</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>The next revolution in quantum computing and technologies is happening now, but how exactly will these growing innovations affect our lives? Dr. Maksym Sich, CEO of the groundbreaking quantum photonics startup, Aegiq, discusses how quantum will impact our medical, communications, and financial industries. Addressing the myth that quantum computing will break all our encryption keys, Maksym elaborates on quantum communications, post-quantum cryptography, and efforts to develop sustainable solutions with security by design. Be ahead of the curve in knowing how we will want to upgrade our systems to improve efficiency, data privacy, and more!</p>
<p><strong>Learn more about Maksym's startup, Aegiq: </strong></p>
<p>~<a href="https://www.aegiq.com/">Company Website</a></p>
<p><strong>For more information on Quantum Computing:</strong></p>
<p>~<a href="https://ec.europa.eu/futurium/en/content/quantum-manifesto-quantum-technologies.html">Quantum Manifesto</a> </p>
<p>~<a href="https://www.gov.uk/government/publications/quantum-technologies-blackett-review">Quantum Technologies -  Blackett Review</a> </p>
<p>~<a href="https://www.quantumcommshub.net/industry-government-media/our-technologies/what-does-qkd-mean-for-the-economy/">Quantum Comms Hub, "What does QKD mean for the Economy?"</a> </p>
<p>~<a href="https://quantumconsortium.org/guide-to-a-quantum-safe-organization/">Report from the QED-C, "Guide to a Quantum Safe Organization"</a></p>
<p>~<a href="https://quantumconsortium.org/quantum-safe-guide">Downloadable Report from the QED-C</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-77]]></link><guid isPermaLink="false">22bc2128-43e3-495c-abba-b43a8eea5e93</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 02 Feb 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a2aed727-698f-4ccc-b4a2-e4456bd4e728/audio-241103-13106-29857-02cc0848-7424-499b-9664-9c2f26889913.mp3" length="49238018" type="audio/mpeg"/><itunes:duration>51:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, Dr. Maksym Sich, CEO of the groundbreaking quantum photonics startup, Aegiq, discusses how quantum will impact our medical, communications, and financial industries.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 46 | Fighting Cybercrime &amp; Tracking Malware Trends with Shyam Sundar Ramaswami</title><itunes:title>401 Access Denied Ep. 46 | Fighting Cybercrime &amp; Tracking Malware Trends with Shyam Sundar Ramaswami</itunes:title><description><![CDATA[<p>Everyone is talking about malware these days, but what new developments and trends are we seeing in malware attacks? This week’s featured guest is Shyam Sundar Ramaswami—Senior Research Scientist at Cisco by day, and the Batman of Hacking by night. So how does cybersecurity’s Bruce Wayne propose that we strengthen our incident response plans against emerging malware threats? What’s really happening when we click that inconspicuous link in the “Delivery Address Confirmation Needed” email? Find out the answers to these questions from the ethical hacker hero who’s here to help you save the world from cyberattacks!</p><p><strong>Read Shyam's Book!</strong></p><p>~"It's Your Digital Life" - <a href="https://www.routledge.com/Its-Your-Digital-Life/Govindarajulu-Ramaswami-Vasudevan/p/book/9780367700041" rel="noopener noreferrer" target="_blank">https://www.routledge.com/Its-Your-Digital-Life/Govindarajulu-Ramaswami-Vasudevan/p/book/9780367700041</a></p><p><br></p><p><strong>Check out Shyam’s TED Talks</strong></p><p><br></p><p>~Can a Couch Potato Save the Digital World? | Shyam Sundar Ramaswami | TEDxIIITBangalore - <a href="https://youtu.be/VEDF8bQPOeY" rel="noopener noreferrer" target="_blank">https://youtu.be/VEDF8bQPOeY</a></p><p><br></p><p>~Cyber Security - The Responsibility | Shyam Sundar Ramaswami | TEDxBITSathy - <a href="https://youtu.be/D4wJMjDhUBw" rel="noopener noreferrer" target="_blank">https://youtu.be/D4wJMjDhUBw</a></p><p><br></p><p><strong>Follow Shyam on social media!</strong></p><p><br></p><p>~<a href="https://twitter.com/hackerbat" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/in/shyam-sundar-ramaswami-50204966/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Everyone is talking about malware these days, but what new developments and trends are we seeing in malware attacks? This week’s featured guest is Shyam Sundar Ramaswami—Senior Research Scientist at Cisco by day, and the Batman of Hacking by night. So how does cybersecurity’s Bruce Wayne propose that we strengthen our incident response plans against emerging malware threats? What’s really happening when we click that inconspicuous link in the “Delivery Address Confirmation Needed” email? Find out the answers to these questions from the ethical hacker hero who’s here to help you save the world from cyberattacks!</p><p><strong>Read Shyam's Book!</strong></p><p>~"It's Your Digital Life" - <a href="https://www.routledge.com/Its-Your-Digital-Life/Govindarajulu-Ramaswami-Vasudevan/p/book/9780367700041" rel="noopener noreferrer" target="_blank">https://www.routledge.com/Its-Your-Digital-Life/Govindarajulu-Ramaswami-Vasudevan/p/book/9780367700041</a></p><p><br></p><p><strong>Check out Shyam’s TED Talks</strong></p><p><br></p><p>~Can a Couch Potato Save the Digital World? | Shyam Sundar Ramaswami | TEDxIIITBangalore - <a href="https://youtu.be/VEDF8bQPOeY" rel="noopener noreferrer" target="_blank">https://youtu.be/VEDF8bQPOeY</a></p><p><br></p><p>~Cyber Security - The Responsibility | Shyam Sundar Ramaswami | TEDxBITSathy - <a href="https://youtu.be/D4wJMjDhUBw" rel="noopener noreferrer" target="_blank">https://youtu.be/D4wJMjDhUBw</a></p><p><br></p><p><strong>Follow Shyam on social media!</strong></p><p><br></p><p>~<a href="https://twitter.com/hackerbat" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/in/shyam-sundar-ramaswami-50204966/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-46]]></link><guid isPermaLink="false">110785c8-856d-4d44-b499-78416ce6aebf</guid><itunes:image href="https://artwork.captivate.fm/898bafd8-ace1-4c16-9ffc-910751ca1c76/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 26 Jan 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2f8a99d4-f155-4a7f-91a0-4eed2c6061b6/audio-239084-13106-29857-858784c4-1f9f-4581-bf0b-b52c97355f99.mp3" length="54543359" type="audio/mpeg"/><itunes:duration>56:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode><itunes:summary>This week’s featured guest is Shyam Sundar Ramaswami—Senior Research Scientist at Cisco by day, and the Batman of Hacking by night. So how does cybersecurity’s Bruce Wayne propose that we strengthen our incident response plans against emerging malware threats?</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>From the WWE to Cybersecurity with Cybrary Instructor Corey Holzer | The Cybrary Podcast Ep. 76</title><itunes:title>From the WWE to Cybersecurity with Cybrary Instructor Corey Holzer | The Cybrary Podcast Ep. 76</itunes:title><description><![CDATA[<p>How did Cybrary instructor Corey Holzer go from being the IT help desk person for the World Wrestling Federation to becoming a PhD-holding Information Security Manager? In this episode of the Cybrary podcast, please enjoy Corey’s fascinating stories of nearly colliding with the Undertaker, losing his internet connection during the CRISC exam, and developing essential problem-solving skills as a cybersecurity professional. Get a behind-the-scenes look at Corey’s newest course, Linux Hardening—out now on the Cybrary platform!</p>
<p><strong>Connect with Corey:</strong></p>
<p><a href="https://www.linkedin.com/in/coreyholzer/">~LinkedIn</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>How did Cybrary instructor Corey Holzer go from being the IT help desk person for the World Wrestling Federation to becoming a PhD-holding Information Security Manager? In this episode of the Cybrary podcast, please enjoy Corey’s fascinating stories of nearly colliding with the Undertaker, losing his internet connection during the CRISC exam, and developing essential problem-solving skills as a cybersecurity professional. Get a behind-the-scenes look at Corey’s newest course, Linux Hardening—out now on the Cybrary platform!</p>
<p><strong>Connect with Corey:</strong></p>
<p><a href="https://www.linkedin.com/in/coreyholzer/">~LinkedIn</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-76]]></link><guid isPermaLink="false">ace84b62-a809-4faf-aeed-85bb85f360e4</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 19 Jan 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0fd5c3e7-2ada-4c44-87a3-00acf3f3b1df/audio-237230-13106-29857-c9878da0-3a9b-42d8-898b-73b49a96a3e9.mp3" length="41786287" type="audio/mpeg"/><itunes:duration>43:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary podcast, please enjoy Corey’s fascinating stories of nearly colliding with the Undertaker, losing his internet connection during the CRISC exam, and developing essential problem-solving skills as a cybersecurity professional.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 45 | Establishing Multinational Cyber Partners in NATO CCDCOE with Jaak Tarien</title><itunes:title>401 Access Denied Ep. 45 | Establishing Multinational Cyber Partners in NATO CCDCOE with Jaak Tarien</itunes:title><description><![CDATA[<p>The 2007 cyberattacks on Estonia culminated into a watershed moment in global cybersecurity awareness. Jaak Tarien, Director of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia, discusses the geopolitical concerns of cybercrime. Ransomware attacks can have a significant economic impact, but how are cybercrime operations also indicative of a breach of sovereignty? To best approach this question, Jaak emphasizes the importance of the CCDCOE's legal scholarship, such as the Tallinn Manual, among other efforts that foster transparent multinational cybersecurity communications, research, and training.</p><p>Check out the following resources for more information on the CCDCOE:</p><p>~Official CCDCOE Website: <a href="https://ccdcoe.org/" rel="noopener noreferrer" target="_blank">https://ccdcoe.org/</a></p><p><br></p><p>~Tallinn Manual: <a href="https://ccdcoe.org/research/tallinn-manual/" rel="noopener noreferrer" target="_blank">https://ccdcoe.org/research/tallinn-manual/</a></p><p><br></p><p>~Locked Shields 2021: <a href="https://youtu.be/oHmVjwKi1P8" rel="noopener noreferrer" target="_blank">https://youtu.be/oHmVjwKi1P8</a></p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>The 2007 cyberattacks on Estonia culminated into a watershed moment in global cybersecurity awareness. Jaak Tarien, Director of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia, discusses the geopolitical concerns of cybercrime. Ransomware attacks can have a significant economic impact, but how are cybercrime operations also indicative of a breach of sovereignty? To best approach this question, Jaak emphasizes the importance of the CCDCOE's legal scholarship, such as the Tallinn Manual, among other efforts that foster transparent multinational cybersecurity communications, research, and training.</p><p>Check out the following resources for more information on the CCDCOE:</p><p>~Official CCDCOE Website: <a href="https://ccdcoe.org/" rel="noopener noreferrer" target="_blank">https://ccdcoe.org/</a></p><p><br></p><p>~Tallinn Manual: <a href="https://ccdcoe.org/research/tallinn-manual/" rel="noopener noreferrer" target="_blank">https://ccdcoe.org/research/tallinn-manual/</a></p><p><br></p><p>~Locked Shields 2021: <a href="https://youtu.be/oHmVjwKi1P8" rel="noopener noreferrer" target="_blank">https://youtu.be/oHmVjwKi1P8</a></p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-45]]></link><guid isPermaLink="false">86540bad-5df3-4082-a9f2-ad0d15f00555</guid><itunes:image href="https://artwork.captivate.fm/721a4cdd-ae76-4083-a209-461ed0b68a34/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 12 Jan 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/27ca4fa9-26ec-4707-8d3b-fa98e1e8736d/audio-227482-13106-29857-b87db9c0-1da9-4480-b143-a9b195b9c668.mp3" length="39600210" type="audio/mpeg"/><itunes:duration>41:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode><itunes:summary>Jaak Tarien, Director of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia, discusses the geopolitical concerns of cybercrime.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>401 Access Denied Podcast Ep. 44 | Cybersecurity Year in Review and 2022 Predictions ​with Art Gilliland</title><itunes:title>401 Access Denied Ep. 44 | Cybersecurity Year in Review and 2022 Predictions with Art Gilliland</itunes:title><description><![CDATA[<p>2021 has been quite a year for all of us, but what have we accomplished and learned in the cybersecurity field? We have certainly had to adjust to a global remote work culture and step up our security strategies to take on new challenges involving more specialized cybercrime. Art Gilliland, CEO of ThycoticCentrify, joins our host, Joseph Carson, to reflect on key lessons learned and predictions for 2022. Will Zero Trust become a security norm like Defense in Depth? How could governments get more involved in cryptocurrency regulation efforts? Enjoy this engaging discussion before we kick off the new year!</p><p>Connect with Art!</p><p>~<a href="https://www.linkedin.com/in/artgilliland/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>2021 has been quite a year for all of us, but what have we accomplished and learned in the cybersecurity field? We have certainly had to adjust to a global remote work culture and step up our security strategies to take on new challenges involving more specialized cybercrime. Art Gilliland, CEO of ThycoticCentrify, joins our host, Joseph Carson, to reflect on key lessons learned and predictions for 2022. Will Zero Trust become a security norm like Defense in Depth? How could governments get more involved in cryptocurrency regulation efforts? Enjoy this engaging discussion before we kick off the new year!</p><p>Connect with Art!</p><p>~<a href="https://www.linkedin.com/in/artgilliland/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-44]]></link><guid isPermaLink="false">d20d2512-dbd2-411a-ab0c-f65b1ad1db48</guid><itunes:image href="https://artwork.captivate.fm/21306fde-f6a8-41ba-8047-d58eb43b2d97/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 29 Dec 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8130a661-aa4f-4a9d-a0f9-37cc137ec987/audio-218064-13106-29857-2e10d990-4ab2-4169-9de7-f519186829e5.mp3" length="52685728" type="audio/mpeg"/><itunes:duration>54:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode><itunes:summary>Art Gilliland, CEO of ThycoticCentrify, joins our host, Joseph Carson, to reflect on key lessons learned and predictions for 2022. Will Zero Trust become a security norm like Defense in Depth? How could governments get more involved in cryptocurrency regulation efforts? Enjoy this engaging discussion before we kick off the new year!</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Holiday Break</title><itunes:title>Holiday Break</itunes:title><description><![CDATA[<p>Welcome back to the Cybrary Podcast, and happy holidays! Whether you are celebrating with family and friends, or simply enjoy the spirit of the season, we hope you are able to take some time off from work and school to celebrate what matters most to you.</p>
<p>As 2021 comes to a close and we look back at all we accomplished this year, despite the circumstances, we raise a glass to you and cheers for making it this far.</p>
<p>Thank you for joining us each week to learn something new and continuing to share this journey with us. With your constant support each week, we were able to acheive more than ever before, and the podcast continues to grow in ways we never expected! We can’t help but feel excited for what new opportunities will present themselves in 2022. So, mark you calendars, and stick with us for brand new episodes of the Cybrary Podcast, starting January 19th!</p>
<p>If you or someone you know would like to be a guest on the Cybrary Podcast or 401 Access Denied, email us at podcast@cybrary.it. On behalf of Cybrary, thanks for another great year - and we will see you in 2022!</p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Welcome back to the Cybrary Podcast, and happy holidays! Whether you are celebrating with family and friends, or simply enjoy the spirit of the season, we hope you are able to take some time off from work and school to celebrate what matters most to you.</p>
<p>As 2021 comes to a close and we look back at all we accomplished this year, despite the circumstances, we raise a glass to you and cheers for making it this far.</p>
<p>Thank you for joining us each week to learn something new and continuing to share this journey with us. With your constant support each week, we were able to acheive more than ever before, and the podcast continues to grow in ways we never expected! We can’t help but feel excited for what new opportunities will present themselves in 2022. So, mark you calendars, and stick with us for brand new episodes of the Cybrary Podcast, starting January 19th!</p>
<p>If you or someone you know would like to be a guest on the Cybrary Podcast or 401 Access Denied, email us at podcast@cybrary.it. On behalf of Cybrary, thanks for another great year - and we will see you in 2022!</p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/holiday-break]]></link><guid isPermaLink="false">10af8584-3b50-4e07-825f-325dbaab1d22</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 22 Dec 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/10fc759f-ae7f-4c87-be4f-3481095f3828/audio-216417-13106-29857-a5fb8813-c3c5-4a04-9985-087050d7c1d6.mp3" length="1821054" type="audio/mpeg"/><itunes:duration>01:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Thank you for joining us each week to learn something new and continuing to share this journey with us. Mark you calendars, the Cybrary Podcast is back with all new episodes on January 19th!</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 43 | Hacking the Game: Cybersecurity Training Meets Esports</title><itunes:title>401 Access Denied Ep. 43 | Hacking the Game: Cybersecurity Training Meets Esports</itunes:title><description><![CDATA[<p>Could online gaming be the key to bridging the cybersecurity skills gap? Is enumeration more than a scanner's sport? Ian Austin, Head of Content Innovation at Hack The Box, tackles these questions as he explains why cybersecurity training should be less about checking the boxes and more about thinking outside the box. Hear Ian's thoughts on the global reach of gamified security education and the significance of "purple-minded" cybersecurity initiatives that bring red and blue teams together.</p><p>Connect with Ian Austin!</p><p>~<a href="https://www.linkedin.com/in/ian-austin-a42002156" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Could online gaming be the key to bridging the cybersecurity skills gap? Is enumeration more than a scanner's sport? Ian Austin, Head of Content Innovation at Hack The Box, tackles these questions as he explains why cybersecurity training should be less about checking the boxes and more about thinking outside the box. Hear Ian's thoughts on the global reach of gamified security education and the significance of "purple-minded" cybersecurity initiatives that bring red and blue teams together.</p><p>Connect with Ian Austin!</p><p>~<a href="https://www.linkedin.com/in/ian-austin-a42002156" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-43]]></link><guid isPermaLink="false">c629218a-03c4-4d16-b0e8-42a502b5cc15</guid><itunes:image href="https://artwork.captivate.fm/188f7f64-ccb8-4e56-a0b9-41dcc12ae3ac/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 15 Dec 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa079be6-143d-47d2-bcec-82b39a3f71d7/audio-214456-13106-29857-4d288432-67b6-4ccf-9753-24020ad89db2.mp3" length="39454498" type="audio/mpeg"/><itunes:duration>41:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode><itunes:summary>Ian Austin, Head of Content Innovation at Hack The Box, tackles these questions as he explains why cybersecurity training should be less about checking the boxes and more about thinking outside the box. Hear Ian&apos;s thoughts on the global reach of gamified security education and the significance of &quot;purple-minded&quot; cybersecurity initiatives that bring red and blue teams together.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>A Veteran&apos;s Guide to a Cybersecurity Career Transition with Tim Ramirez | The Cybrary Podcast Ep. 75</title><itunes:title>A Veteran&apos;s Guide to a Cybersecurity Career Transition with Tim Ramirez | The Cybrary Podcast Ep. 75</itunes:title><description><![CDATA[<p>Ready to make a career transition from the military to IT? How can veterans effectively communicate transferrable skills that stand out in the competitive cybersecurity industry? Cybrary Insider Pro Community Manager, Tim Ramirez, shares how he started a new career path after serving 12 years in the U.S. Air Force. Learn about how he began a 3-year IT master's program with no IT experience, managed his expectations on the job market, and finally passed the CISSP exam.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Connect with Tim!</strong></p>
<p>~<a href="https://www.linkedin.com/in/timothy-ramirez/">Linkedin</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Ready to make a career transition from the military to IT? How can veterans effectively communicate transferrable skills that stand out in the competitive cybersecurity industry? Cybrary Insider Pro Community Manager, Tim Ramirez, shares how he started a new career path after serving 12 years in the U.S. Air Force. Learn about how he began a 3-year IT master's program with no IT experience, managed his expectations on the job market, and finally passed the CISSP exam.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Connect with Tim!</strong></p>
<p>~<a href="https://www.linkedin.com/in/timothy-ramirez/">Linkedin</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-75]]></link><guid isPermaLink="false">b4e531c7-8dd3-4b9e-82eb-9f62c58c04cf</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 08 Dec 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fc663fe1-7260-4ce3-8861-a31df3587141/audio-211727-13106-29857-736aff16-8370-4f7d-b1e5-f2b7643e365f.mp3" length="39408023" type="audio/mpeg"/><itunes:duration>41:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cybrary Insider Pro Community Manager, Tim Ramirez, shares how he started a new career path after serving 12 years in the U.S. Air Force. Learn about how he began a 3-year IT master&apos;s program with no IT experience, managed his expectations on the job market, and finally passed the CISSP exam.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 42 | Adopting Simulation-Based Gamified Cybersecurity Training with JC Vega</title><itunes:title>401 Access Denied Ep. 42 | Adopting Simulation-Based Gamified Cybersecurity Training with JC Vega</itunes:title><description><![CDATA[<p>When it comes to incident response, “Your plan is worthless, but your planning is priceless.” These wise words from JC Vega, CISO at Devo, highlight the critical difference between having an incident response plan and being incident response ready. In this episode of the 401 podcast, JC explains how unpredictable, engaging simulations can be a game-changer in building an organization’s resilience against critical cyberattacks like ransomware. Find out how your simulation-based training can effectively help your entire organization to build trust and get actively involved in cybersecurity preparedness.</p><p>Connect with JC!</p><p>~<a href="https://www.linkedin.com/in/jcvega-cyber-colonel/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>When it comes to incident response, “Your plan is worthless, but your planning is priceless.” These wise words from JC Vega, CISO at Devo, highlight the critical difference between having an incident response plan and being incident response ready. In this episode of the 401 podcast, JC explains how unpredictable, engaging simulations can be a game-changer in building an organization’s resilience against critical cyberattacks like ransomware. Find out how your simulation-based training can effectively help your entire organization to build trust and get actively involved in cybersecurity preparedness.</p><p>Connect with JC!</p><p>~<a href="https://www.linkedin.com/in/jcvega-cyber-colonel/" rel="noopener noreferrer" target="_blank">LinkedIn</a></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-42]]></link><guid isPermaLink="false">00ee6e5d-4a33-4f7b-8bb5-5a73f2a10c86</guid><itunes:image href="https://artwork.captivate.fm/9b5b3ef5-ceda-4ce2-8667-a34352909d56/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 01 Dec 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1bd5fa56-92e5-4211-8aa2-66c402739ae2/audio-204773-13106-29857-99ca8088-54c6-46d7-9c29-4e460d53f5a3.mp3" length="45522426" type="audio/mpeg"/><itunes:duration>47:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><itunes:summary>In this episode of the 401 podcast, JC Vega explains how unpredictable, engaging simulations can be a game-changer in building an organization’s resilience against critical cyberattacks like ransomware. Find out how your simulation-based training can effectively help your entire organization to build trust and get actively involved in cybersecurity preparedness.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Strengthening Cyber Threat Intelligence with MITRE ATT&amp;CK | The Cybrary Podcast Ep. 74</title><itunes:title>Strengthening Cyber Threat Intelligence with MITRE ATT&amp;CK | The Cybrary Podcast Ep. 74</itunes:title><description><![CDATA[<p>What does it take to be a cyber threat intelligence analyst? How can cyber threat intelligence or CTI training be applied in real-world strategic defense planning and risk management assessment? Cybrary Course Manager Jennifer Barnabee returns to the Cybrary Podcast with two guests from MITRE to discuss the value of CTI teams and their research. Jackie Lasky, Senior Cybersecurity Engineer, and Amy Robertson, Cyber Operations Lead, break down the ways that cyber threat intelligence is used to produce actionable defensive recommendations to any organization. Learn more about why it’s more important than ever for CTI teams to have diverse contributors with both technical and non-technical skillsets.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>What does it take to be a cyber threat intelligence analyst? How can cyber threat intelligence or CTI training be applied in real-world strategic defense planning and risk management assessment? Cybrary Course Manager Jennifer Barnabee returns to the Cybrary Podcast with two guests from MITRE to discuss the value of CTI teams and their research. Jackie Lasky, Senior Cybersecurity Engineer, and Amy Robertson, Cyber Operations Lead, break down the ways that cyber threat intelligence is used to produce actionable defensive recommendations to any organization. Learn more about why it’s more important than ever for CTI teams to have diverse contributors with both technical and non-technical skillsets.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-ep-74]]></link><guid isPermaLink="false">dd6fe305-0b15-4b7b-beb4-e305d1b19026</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 24 Nov 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b3aa2138-f2e0-47d9-ae90-efddd28211f0/audio-207663-13106-29857-e97a5cfd-f8a3-4277-9f8e-0576e8fd87ce.mp3" length="25388842" type="audio/mpeg"/><itunes:duration>26:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cybrary Course Manager Jennifer Barnabee returns to the Cybrary Podcast with two guests from MITRE to discuss the value of CTI teams and their research. Jackie Lasky, Senior Cybersecurity Engineer, and Amy Robertson, Cyber Operations Lead, break down the ways that cyber threat intelligence is used to produce actionable defensive recommendations to any organization.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 41 | Unlocking the State of Cybersecurity with Quentyn Taylor</title><itunes:title>401 Access Denied Ep. 41 | Current State of Cyber Security with Quentyn Taylor</itunes:title><description><![CDATA[<p>If the security industry is booming, what does this mean for the state of cybersecurity and for humanity at large? Information security leader and content creator, Quentyn Taylor, breaks down the flaws in heavily reactive security and “cybersecurity first” approaches that minimize the human-centered elements of risk management. From IoT-enabled smart locks to RFID credit cards, Quentyn assesses the value and risks behind popular security products. Follow Quentyn's advice to make your organization not only more cyber-aware, but also resilient.</p><p>Connect with Quentyn!</p><p>~<a href="https://www.linkedin.com/in/quentyntaylor/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/quentynblog" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>If the security industry is booming, what does this mean for the state of cybersecurity and for humanity at large? Information security leader and content creator, Quentyn Taylor, breaks down the flaws in heavily reactive security and “cybersecurity first” approaches that minimize the human-centered elements of risk management. From IoT-enabled smart locks to RFID credit cards, Quentyn assesses the value and risks behind popular security products. Follow Quentyn's advice to make your organization not only more cyber-aware, but also resilient.</p><p>Connect with Quentyn!</p><p>~<a href="https://www.linkedin.com/in/quentyntaylor/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/quentynblog" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>Follow Joe on Twitter!</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-41]]></link><guid isPermaLink="false">e1ab6569-0bdc-4f3b-ac34-e22cb0130548</guid><itunes:image href="https://artwork.captivate.fm/3b78e0e9-bda5-48c4-84c2-4ca1f52062e9/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 17 Nov 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bfae9f5c-109d-4718-97c9-0be483b50b74/audio-204761-13106-29857-69045d57-5fb2-46d8-8836-19b78e7c9253.mp3" length="48439629" type="audio/mpeg"/><itunes:duration>50:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><itunes:summary>In this episode of 401 Access Denied, Information security leader and content creator, Quentyn Taylor, breaks down the flaws in heavily reactive security and “cybersecurity first” approaches that minimize the human-centered elements of risk management. From IoT-enabled smart locks to RFID credit cards, Quentyn assesses the value and risks behind popular security products.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Disrupting the Adversary with MITRE&apos;s Threat-Informed Defense Approach | The Cybrary Podcast Ep. 73</title><itunes:title>Disrupting the Adversary with MITRE&apos;s Threat-Informed Defense Approach | The Cybrary Podcast Ep. 73</itunes:title><description><![CDATA[<p>How can you build smarter cyber defense strategies that reduce your organization's risk against the threats you care about most? Let the subject-matter experts at MITRE teach you how to disrupt the adversary by employing a threat-informed defense approach. In this episode of the Cybrary Podcast, Cybrary Course Manager, Jennifer Barnabee, hosts a virtual roundtable with special guests from the MITRE Engenuity team, including Frank Duff, Steve Luke, and Richard Struse. With the help of MITRE’s free training courses on the Cybrary platform and the resources provided by the Center for Threat Informed Defense, you can align your security strategies to combat real-world adversary techniques.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Enroll now in our FREE MITRE ATT&amp;CK Defender courses!  </strong></p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-defender-mad-attack-fundamentals/">MITRE ATT&amp;CK Defender™ (MAD) ATT&amp;CK® Fundamentals Badge Training</a>  </p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-defender-mad-attack-fundamentals/">MITRE ATT&amp;CK Defender™ (MAD) ATT&amp;CK® Cyber Threat Intelligence Certification Training</a> </p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-defender-mad-attack-for-soc-assessments/">MITRE ATT&amp;CK Defender™ (MAD) ATT&amp;CK® SOC Assessments Certification Training</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around">@thorin_around</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>How can you build smarter cyber defense strategies that reduce your organization's risk against the threats you care about most? Let the subject-matter experts at MITRE teach you how to disrupt the adversary by employing a threat-informed defense approach. In this episode of the Cybrary Podcast, Cybrary Course Manager, Jennifer Barnabee, hosts a virtual roundtable with special guests from the MITRE Engenuity team, including Frank Duff, Steve Luke, and Richard Struse. With the help of MITRE’s free training courses on the Cybrary platform and the resources provided by the Center for Threat Informed Defense, you can align your security strategies to combat real-world adversary techniques.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Enroll now in our FREE MITRE ATT&amp;CK Defender courses!  </strong></p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-defender-mad-attack-fundamentals/">MITRE ATT&amp;CK Defender™ (MAD) ATT&amp;CK® Fundamentals Badge Training</a>  </p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-defender-mad-attack-fundamentals/">MITRE ATT&amp;CK Defender™ (MAD) ATT&amp;CK® Cyber Threat Intelligence Certification Training</a> </p>
<p>~<a href="https://www.cybrary.it/course/mitre-attack-defender-mad-attack-for-soc-assessments/">MITRE ATT&amp;CK Defender™ (MAD) ATT&amp;CK® SOC Assessments Certification Training</a> </p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around">@thorin_around</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-73]]></link><guid isPermaLink="false">a4c28b07-6082-49a7-890b-079f3aedc3ae</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 10 Nov 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/75f6cb7f-2f34-4bd9-b25f-4d1908b42ecb/audio-203687-13106-29857-628ca7bb-166c-47a9-a675-ac34940e6c40.mp3" length="35546075" type="audio/mpeg"/><itunes:duration>37:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, Cybrary Course Manager, Jennifer Barnabee, hosts a virtual roundtable with special guests from the MITRE Engenuity team, including Frank Duff, Steve Luke, and Richard Struse. With the help of MITRE’s free training courses on the Cybrary platform and the resources provided by the Center for Threat Informed Defense, you can align your security strategies to combat real-world adversary techniques.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 40 | Leveraging Data Science in Security with Kevin Hanes and Jon Ramsey</title><itunes:title>401 Access Denied Ep. 40 | Leveraging Data Science in Security with Kevin Hanes &amp; Jon Ramsey</itunes:title><description><![CDATA[<p>Cybersecurity is a growing, expansive industry that transcends the fields of technology and even security. How can organizations leverage the critical work of data scientists not only for machine learning automation, but also for diversifying threat detection strategies? In this episode of 401 Access Denied, Joseph Carson, Chief Security Scientist at Thycotic, discusses data science in the security context with Kevin Hanes, CEO of Cybrary, and Jon Ramsey, a fellow cybersecurity executive and returning guest. Join the conversation on the importance of artificial intelligence, machine learning, and deep learning in the advancement of dynamic, adaptive cybersecurity business strategies and training.</p><p>Connect with Jon and Kevin on Linkedin!</p><p>~<a href="https://www.linkedin.com/in/jrramsey/" rel="noopener noreferrer" target="_blank">Jon Ramsey</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/in/kevin-hanes" rel="noopener noreferrer" target="_blank">Kevin Hanes</a>&nbsp;</p><p><br></p><p>Follow Joe on Twitter</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Cybersecurity is a growing, expansive industry that transcends the fields of technology and even security. How can organizations leverage the critical work of data scientists not only for machine learning automation, but also for diversifying threat detection strategies? In this episode of 401 Access Denied, Joseph Carson, Chief Security Scientist at Thycotic, discusses data science in the security context with Kevin Hanes, CEO of Cybrary, and Jon Ramsey, a fellow cybersecurity executive and returning guest. Join the conversation on the importance of artificial intelligence, machine learning, and deep learning in the advancement of dynamic, adaptive cybersecurity business strategies and training.</p><p>Connect with Jon and Kevin on Linkedin!</p><p>~<a href="https://www.linkedin.com/in/jrramsey/" rel="noopener noreferrer" target="_blank">Jon Ramsey</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/in/kevin-hanes" rel="noopener noreferrer" target="_blank">Kevin Hanes</a>&nbsp;</p><p><br></p><p>Follow Joe on Twitter</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-40]]></link><guid isPermaLink="false">f44f03b6-a02f-40d2-b9e7-025c96674f9b</guid><itunes:image href="https://artwork.captivate.fm/ee62aab4-d3ca-45cc-988b-9641bc7eac19/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 03 Nov 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/efc479b6-42b6-444f-b9f3-d2ee719df998/audio-200440-13106-29857-80db9efd-8863-4764-8a8a-610b36c3b82b.mp3" length="48496789" type="audio/mpeg"/><itunes:duration>50:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><itunes:summary>In this episode of 401 Access Denied, Joseph Carson, Chief Security Scientist at Thycotic, discusses data science in the security context with Kevin Hanes, CEO of Cybrary, and Jon Ramsey, a fellow cybersecurity executive and returning guest. Join the conversation on the importance of artificial intelligence, machine learning, and deep learning in the advancement of dynamic, adaptive cybersecurity business strategies and training.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Exploring Adversary Emulation with MITRE Cyber Engineer Michael Long | The Cybrary Podcast Ep. 72</title><itunes:title>Exploring Adversary Emulation with MITRE Cyber Engineer Michael Long | The Cybrary Podcast Ep. 72</itunes:title><description><![CDATA[<p>Think you've got what it takes to replicate the real-world cyber attacks of threat actors like FIN7? Learn how ethical hackers are putting their skills to the test in MITRE ATT&amp;CK TTP-based adversary emulations. In this episode of the Cybrary Podcast, Cybrary Course Manager Jennifer Barnabee chats with MITRE Principal Cyber Adversary Emulation Engineer, Michael Long. Whether you're managing a red team or just getting into ethical hacking, you'll want to hear this discussion about the value of emulating adversaries and simulating malware. Stay tuned for Michael's upcoming MITRE adversary threat emulation course--only on Cybrary!</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around">@thorin_around</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Think you've got what it takes to replicate the real-world cyber attacks of threat actors like FIN7? Learn how ethical hackers are putting their skills to the test in MITRE ATT&amp;CK TTP-based adversary emulations. In this episode of the Cybrary Podcast, Cybrary Course Manager Jennifer Barnabee chats with MITRE Principal Cyber Adversary Emulation Engineer, Michael Long. Whether you're managing a red team or just getting into ethical hacking, you'll want to hear this discussion about the value of emulating adversaries and simulating malware. Stay tuned for Michael's upcoming MITRE adversary threat emulation course--only on Cybrary!</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around">@thorin_around</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-72]]></link><guid isPermaLink="false">9470f600-3557-489a-bb86-cd56cfaded35</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 27 Oct 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/04312c23-2774-447b-82ec-4066535dfecb/audio-200303-13106-29857-fa96cec9-4bd8-44a7-a9f5-25eec21b2f77.mp3" length="20662106" type="audio/mpeg"/><itunes:duration>21:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, Cybrary Course Manager Jennifer Barnabee chats with MITRE Principal Cyber Adversary Emulation Engineer, Michael Long. Whether you&apos;re managing a red team or just getting into ethical hacking, you&apos;ll want to hear this discussion about the value of emulating adversaries and simulating malware.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 39 | Breaking Down Zero Trust Security with Dave Lewis</title><itunes:title>401 Access Denied Ep. 39 | Zero Trust Fundamentals with Dave Lewis</itunes:title><description><![CDATA[<p>Zero Trust security architecture models are becoming more popular as organizations seek to reduce risk. But what are both the business and cultural implications of deperimiterization? Enjoy this engaging conversation with Thycotic's Advisory CISO, and Chief Security Scientist, Joseph Carson, and his doppelgänger, Dave Lewis, the Global Security CISO at Cisco Security. Learn how a Zero Trust mindset involves not only technical solutions such as network zone segmentation, but also human-centered security awareness training and mentorship.</p><p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p><p>Follow Dave on Social Media!</p><p><br></p><p>~<a href="https://www.linkedin.com/in/gattaca/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/gattaca" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>Follow Joe on Twitter</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>Zero Trust security architecture models are becoming more popular as organizations seek to reduce risk. But what are both the business and cultural implications of deperimiterization? Enjoy this engaging conversation with Thycotic's Advisory CISO, and Chief Security Scientist, Joseph Carson, and his doppelgänger, Dave Lewis, the Global Security CISO at Cisco Security. Learn how a Zero Trust mindset involves not only technical solutions such as network zone segmentation, but also human-centered security awareness training and mentorship.</p><p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p><p>Follow Dave on Social Media!</p><p><br></p><p>~<a href="https://www.linkedin.com/in/gattaca/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/gattaca" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>Follow Joe on Twitter</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a></p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a></p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a></p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a></p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a></p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a></p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-39]]></link><guid isPermaLink="false">22ebc141-80e9-4c17-a6f8-d745920e7ec4</guid><itunes:image href="https://artwork.captivate.fm/4a039c25-4139-4762-bf3c-9b25d7b0bb0a/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 20 Oct 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/dbce97bd-e42b-4527-946f-144ae88c295b/audio-196774-13106-29857-3fb861c2-7a6b-4628-96b1-3e150128aa19.mp3" length="38026154" type="audio/mpeg"/><itunes:duration>39:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><itunes:summary>Global Advisory CISO for Cisco, Dave Lewis, joins 401 Access Denied for the third week of Cybersecurity Awareness month to discuss Zero Trust security. We cover the origins of Zero Trust and steps organizations can take today to reduce risk.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>How to Confidently Discuss Cyber Skills with Cybrary Mentor Mark Nibert | The Cybrary Podcast Ep. 71</title><itunes:title>How to Confidently Discuss Cyber Skills with Cybrary Mentor Mark Nibert | The Cybrary Podcast Ep. 71</itunes:title><description><![CDATA[<p>You've got the technicals skills, but how do you explain them to someone? Knowing how to communicate about technology to different audiences is a crucial part of cybersecurity career development. Listen to Chief Cybrary Mentor, Mark Nibert, share his advice on how to tackle your public speaking fears, know when that email should be a meeting, and ask the right questions as you expand your network.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Connect with Mark!</strong></p>
<p>~ <a href="https://www.linkedin.com/in/marknibert">Mark Nibert's Linkedin</a> </p>
<p><strong>Mark's Reading List</strong></p>
<p>~"The Ghost in the Wires" by Kevin Mitnick and William L. Simon</p>
<p>~"Talk Like TED" by Carmine Gallo</p>
<p>~"Executive Presence" by Sylvia Ann Hewlett</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around">@thorin_around</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></description><content:encoded><![CDATA[<p>You've got the technicals skills, but how do you explain them to someone? Knowing how to communicate about technology to different audiences is a crucial part of cybersecurity career development. Listen to Chief Cybrary Mentor, Mark Nibert, share his advice on how to tackle your public speaking fears, know when that email should be a meeting, and ask the right questions as you expand your network.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/">Cybrary</a></p>
<p><strong>Connect with Mark!</strong></p>
<p>~ <a href="https://www.linkedin.com/in/marknibert">Mark Nibert's Linkedin</a> </p>
<p><strong>Mark's Reading List</strong></p>
<p>~"The Ghost in the Wires" by Kevin Mitnick and William L. Simon</p>
<p>~"Talk Like TED" by Carmine Gallo</p>
<p>~"Executive Presence" by Sylvia Ann Hewlett</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around">@thorin_around</a></p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT">Twitter</a></p>
<p>~<a href="https://www.instagram.com/cybrary.it/">Instagram</a></p>
<p>~<a href="https://www.facebook.com/cybraryit/">FaceBook</a></p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA">YouTube</a></p>
<p>~<a href="https://www.linkedin.com/company/cybrary/">LinkedIn</a></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-71]]></link><guid isPermaLink="false">9186006e-2738-49d0-913c-ec05309e6c50</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 13 Oct 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/40d2909c-5824-4598-a5ae-7c024c63db94/audio-194787-13106-29857-51c8d56d-c3df-4b5d-9952-e33c20ae1995.mp3" length="44448675" type="audio/mpeg"/><itunes:duration>46:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode, listen to Mark Nibert, Cybrary&apos;s Chief Mentor, share his advice on how to tackle your public speaking fears, knowing when that email should be a meeting, and asking the right questions as you expand your network.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 38 | Password Cracking with Ethical Hacker Dustin Heywood (aka EvilMog)</title><itunes:title>401 Access Denied Ep. 38 | Password Cracking with Ethical Hacker Dustin Heywood</itunes:title><description><![CDATA[<p>X-Force Red Hacker Dustin Heywood aka EvilMog joins us during the first week of Cybersecurity Awareness Month to share how to be cyber smart with your passwords. He shares critical steps for protecting passwords and some insight into his world of password hacking.</p><p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p><p>Follow Dustin on Social Media!</p><p><br></p><p>~<a href="https://www.linkedin.com/in/evilmog/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Evil_Mog" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>Follow Joe on Twitter&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>X-Force Red Hacker Dustin Heywood aka EvilMog joins us during the first week of Cybersecurity Awareness Month to share how to be cyber smart with your passwords. He shares critical steps for protecting passwords and some insight into his world of password hacking.</p><p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p><p>Follow Dustin on Social Media!</p><p><br></p><p>~<a href="https://www.linkedin.com/in/evilmog/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Evil_Mog" rel="noopener noreferrer" target="_blank">Twitter</a></p><p><br></p><p>Follow Joe on Twitter&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-episode-38]]></link><guid isPermaLink="false">ae662f9c-6632-4229-9fed-0edab72d1ae0</guid><itunes:image href="https://artwork.captivate.fm/fc795b32-3c3a-44f8-8c3c-40582cc100ad/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 06 Oct 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fcb71856-5da2-4010-b681-26fdbb3d9de7/audio-192308-13106-29857-906fb5a8-c71e-4713-baf4-e8461a22c4b9.mp3" length="45920041" type="audio/mpeg"/><itunes:duration>47:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><itunes:summary>You have passwords for nearly everything these days, but just how easy are they to crack? In this episode of 401 Access Denied, award-winning X-Force Red hacker Dustin Heywood gives you several reasons to rethink your approach to password selection and management. Think like a cyber adversary as you learn best practices for password resets, passphrase creation, offline backups, privileged access management, and more.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Meet the IT Guy: Chatting with IT Infrastructure Leader Nick Marentic | The Cybrary Podcast Ep. 70</title><itunes:title>Chatting with IT Infrastructure Leader Nick Marentic | The Cybrary Podcast Ep. 70</itunes:title><description><![CDATA[<p>How do you get a cybersecurity job without experience, and how do you gain experience without a job? Our new Cybrary instructor, IT security manager Nick Marentic, delves into this classic chicken-and-egg problem as he shares insightful career advice. Learn how you can break into cybersecurity from any field, as well as hear what it's like to work in an IT management role.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Connect with Nick!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/nickmarentic" rel="noopener noreferrer" target="_blank">Nick Marentic's LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>How do you get a cybersecurity job without experience, and how do you gain experience without a job? Our new Cybrary instructor, IT security manager Nick Marentic, delves into this classic chicken-and-egg problem as he shares insightful career advice. Learn how you can break into cybersecurity from any field, as well as hear what it's like to work in an IT management role.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Connect with Nick!</strong></p><p><br></p><p>~<a href="https://www.linkedin.com/in/nickmarentic" rel="noopener noreferrer" target="_blank">Nick Marentic's LinkedIn</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-70]]></link><guid isPermaLink="false">af61d7ee-996c-42b8-8006-28e6b8ccaf4f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 29 Sep 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e8cce7c6-fc24-46c8-81e6-77790f1f7955/audio-190825-13106-29857-39b12a08-591a-4052-89f0-bc137af76cd9.mp3" length="44546899" type="audio/mpeg"/><itunes:duration>46:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>How do you get a cybersecurity job without experience, and how do you gain experience without a job? Our new Cybrary instructor, IT security manager Nick Marentic, delves into this classic chicken-and-egg problem as he shares insightful career advice. Learn how you can break into cybersecurity from any field, as well as hear what it&apos;s like to work in an IT management role.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 37 | Assessing Cyber Insurance Needs with Resilience</title><itunes:title>401 Access Denied Ep. 37 | Assessing Cyber Insurance Needs with Resilience</itunes:title><description><![CDATA[<p>How do we accurately measure and minimize cybersecurity risks? How does cyber insurance fit into the risk management process? Joseph Carson, Chief Security Scientist at Thycotic, discusses these questions and more with members of the Resilience cyber insurance company, including Ann Irvine, Chief Data Scientist, and Kevin McGowan, VP of Cyber Underwriting. Learn about how insurance companies like Resilience work with organizations to find the best solutions to offset critical risks.</p><p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p><p>Follow Joe on Twitter&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/?hl=en" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/mycompany/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>How do we accurately measure and minimize cybersecurity risks? How does cyber insurance fit into the risk management process? Joseph Carson, Chief Security Scientist at Thycotic, discusses these questions and more with members of the Resilience cyber insurance company, including Ann Irvine, Chief Data Scientist, and Kevin McGowan, VP of Cyber Underwriting. Learn about how insurance companies like Resilience work with organizations to find the best solutions to offset critical risks.</p><p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p><p>Follow Joe on Twitter&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p>Follow us on Social!!</p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/?hl=en" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/mycompany/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-37]]></link><guid isPermaLink="false">5432bd2c-499e-4384-b604-92d63af72f0a</guid><itunes:image href="https://artwork.captivate.fm/0a293634-541d-48f7-8f33-6fca28c66d53/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 22 Sep 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6bf8a800-771d-4f86-a5c5-6286483df92c/audio-188961-13106-29857-a28e0b28-682f-45b4-8a3a-cf777e9ab4cc.mp3" length="51991093" type="audio/mpeg"/><itunes:duration>54:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><itunes:summary>How do we accurately measure and minimize cybersecurity risks? How does cyber insurance fit into the risk management process? Joseph Carson, Chief Security Scientist at Thycotic, discusses these questions and more with members of the Resilience cyber insurance company, including Ann Irvine, Chief Data Scientist, and Kevin McGowan, VP of Cyber Underwriting. Learn about how insurance companies like Resilience work with organizations to find the best solutions to offset critical risks.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>A Humanizing Approach to Passing the CISSP Exam with Kelly Handerhan | The Cybrary Podcast Ep. 69</title><itunes:title>A Humanizing Approach to Passing the CISSP Exam with Kelly Handerhan | The Cybrary Podcast Ep. 69</itunes:title><description><![CDATA[<p>When your instructor is the legendary Kelly Handerhan, you know you're going to pass the CISSP exam and actually enjoy studying for it. As humans become more technical, Kelly humanizes the technical world so that you can better relate to the subject matter.&nbsp;</p><p>In this episode of the Cybrary Podcast, Kelly shares what's new in the updated CISSP exam and offers tips for how you can prepare. Hear more of her timeless stories in her new and improved CISSP course on the Cybrary platform!&nbsp;</p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>When your instructor is the legendary Kelly Handerhan, you know you're going to pass the CISSP exam and actually enjoy studying for it. As humans become more technical, Kelly humanizes the technical world so that you can better relate to the subject matter.&nbsp;</p><p>In this episode of the Cybrary Podcast, Kelly shares what's new in the updated CISSP exam and offers tips for how you can prepare. Hear more of her timeless stories in her new and improved CISSP course on the Cybrary platform!&nbsp;</p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-69]]></link><guid isPermaLink="false">54e7fe8e-8bfe-4247-b365-e713f11ef226</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 15 Sep 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ffaff2a9-0332-45f2-9c40-0e28a2e961ad/Cybrary-Ep69-Revised-prproj-mixdown.mp3" length="35757825" type="audio/mpeg"/><itunes:duration>24:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>When your instructor is the legendary Kelly Handerhan, you know you&apos;re going to pass the CISSP exam and actually enjoy studying for it. As humans become more technical, Kelly humanizes the technical world so that you can better relate to the subject matter. 

In this episode of the Cybrary Podcast, Kelly shares what&apos;s new in the updated CISSP exam and offers tips for how you can prepare. Hear more of her timeless stories in her new and improved CISSP course on the Cybrary platform!</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 36 | Prepping for Operational Technology Risks with Jon Ramsey and Juan Espinosa</title><itunes:title>401 Access Denied Ep. 36 | Prepping for Operational Technology Risks with Jon Ramsey &amp; Juan Espinosa</itunes:title><description><![CDATA[<p>If you've ever closed your garage door or checked your home security camera with a mobile app, then you've relied on a technical communication network of virtual Information Technology and physical Operational Technology devices. This synthesis of IT and OT provides convenient ways for you to secure your home, but your assets are at risk when malicious actors exploit those networks. In this episode of 401 Access Denied, listen to host Joseph Carson, Chief Security Scientist at Thycotic, talk with cybersecurity executives, Jon Ramsey and Juan Espinosa, about the significance of OT risk management and mitigation. Learn how security managers can work with designers, vendors, and compliance officers to prioritize investment in OT security.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter&nbsp;</strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson&nbsp;</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/?hl=en" rel="noopener noreferrer" target="_blank">Instagram&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/mycompany/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn </a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>If you've ever closed your garage door or checked your home security camera with a mobile app, then you've relied on a technical communication network of virtual Information Technology and physical Operational Technology devices. This synthesis of IT and OT provides convenient ways for you to secure your home, but your assets are at risk when malicious actors exploit those networks. In this episode of 401 Access Denied, listen to host Joseph Carson, Chief Security Scientist at Thycotic, talk with cybersecurity executives, Jon Ramsey and Juan Espinosa, about the significance of OT risk management and mitigation. Learn how security managers can work with designers, vendors, and compliance officers to prioritize investment in OT security.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter&nbsp;</strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson&nbsp;</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/?hl=en" rel="noopener noreferrer" target="_blank">Instagram&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/mycompany/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIn&nbsp;</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn </a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-36]]></link><guid isPermaLink="false">496cd4f5-0fe8-4f63-8ff3-3642f751c510</guid><itunes:image href="https://artwork.captivate.fm/bcfa2ed1-dae8-4636-95ff-79e31ab7d404/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 08 Sep 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4cbdae26-37b8-419f-8e2e-1d8c2e7beb78/audio-181201-13106-29857-323899ea-1dd5-4ea2-85b6-185972d91c11.mp3" length="52657109" type="audio/mpeg"/><itunes:duration>54:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><itunes:summary>If you&apos;ve ever closed your garage door or checked your home security camera with a mobile app, then you&apos;ve relied on a technical communication network of virtual Information Technology and physical Operational Technology devices. This synthesis of IT and OT provides convenient ways for you to secure your home, but your assets are at risk when malicious actors exploit those networks. In this episode of 401 Access Denied, listen to host Joseph Carson, Chief Security Scientist at Thycotic, talk with cybersecurity executives, Jon Ramsey and Juan Espinosa, about the significance of OT risk management and mitigation. Learn how security managers can work with designers, vendors, and compliance officers to prioritize investment in OT security. 
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Follow Joe on Twitter 
~@joe_carson  
Follow us on Social!!
~Cybrary Twitter  
~Thycotic Twitter  
~Instagram  
~Facebook  
~YouTube  
~Cybrary LinkedIn  
~Thycotic LinkedIn</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Defending the Enterprise with Owen Dubiel | The Cybrary Podcast Ep. 68</title><itunes:title>Defending the Enterprise with Owen Dubiel | The Cybrary Podcast Ep. 68</itunes:title><description><![CDATA[<p style="text-align:left;"><span style="color: rgb(29,28,29);font-size: 12px;">Meet our newest Cybrary instructor, Owen Dubiel! Interested in a cybersecurity career, but don't know what to expect? In this episode of the Cybrary podcast, Owen shares what he wishes every intern knew about life in the defensive security space. Using his expertise as an Information Security Engineer, Owen is eager to design Cybrary courses that give entry-level security workers a competitive edge. Learn how he balances his time as an engineer, analyst, and content creator. Plus, hear what a cybersecurity expert really thinks about the accuracy of Mr. Robot and "IT guy" tropes.</span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Check out Cybrary Now!!!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Cybrary</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Connect with Owen!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>- </strong></span><a href="https://www.linkedin.com/in/owendubiel66/" target="_blank"><span style="color: rgba(var(--sk_highlight,18,100,163),1);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">Owen's LinkedIn</span></a></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow Thor on Twitter!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/thorin_around" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">@thorin_around</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow us on Social!!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/cybraryIT" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Twitter</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.instagram.com/cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Instagram</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.facebook.com/cybraryit/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist,...]]></description><content:encoded><![CDATA[<p style="text-align:left;"><span style="color: rgb(29,28,29);font-size: 12px;">Meet our newest Cybrary instructor, Owen Dubiel! Interested in a cybersecurity career, but don't know what to expect? In this episode of the Cybrary podcast, Owen shares what he wishes every intern knew about life in the defensive security space. Using his expertise as an Information Security Engineer, Owen is eager to design Cybrary courses that give entry-level security workers a competitive edge. Learn how he balances his time as an engineer, analyst, and content creator. Plus, hear what a cybersecurity expert really thinks about the accuracy of Mr. Robot and "IT guy" tropes.</span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Check out Cybrary Now!!!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Cybrary</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Connect with Owen!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>- </strong></span><a href="https://www.linkedin.com/in/owendubiel66/" target="_blank"><span style="color: rgba(var(--sk_highlight,18,100,163),1);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">Owen's LinkedIn</span></a></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow Thor on Twitter!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/thorin_around" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">@thorin_around</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow us on Social!!</strong></span></p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/cybraryIT" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Twitter</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.instagram.com/cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Instagram</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.facebook.com/cybraryit/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">FaceBook</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">YouTube</span></a>&nbsp;</p>
<p style="text-align:left;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.linkedin.com/company/cybrary/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">LinkedIn</span></a>&nbsp;</p>
<p style="text-align:left;"></p>
<p style="text-align:left;"></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-68]]></link><guid isPermaLink="false">3115be54-fa14-48eb-8fac-ea901acc0d01</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 01 Sep 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f4244ea7-1592-480b-825a-befc7ca6794a/audio-176866-13106-29857-f69d3371-222b-41ab-860e-d12d8d684011.mp3" length="29952208" type="audio/mpeg"/><itunes:duration>31:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Meet our newest Cybrary instructor, Owen Dubiel! Interested in a cybersecurity career, but don&apos;t know what to expect? In this episode of the Cybrary podcast, Owen shares what he wishes every intern knew about life in the defensive security space. Using his expertise as an Information Security Engineer, Owen is eager to design Cybrary courses that give entry-level security workers a competitive edge. Learn how he balances his time as an engineer, analyst, and content creator. Plus, hear what a cybersecurity expert really thinks about the accuracy of Mr. Robot and &quot;IT guy&quot; tropes.

Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 35 | Safeguarding Critical Infrastructure with Ben Miller</title><itunes:title>401 Access Denied Ep. 35 | Safeguarding Critical Infrastructure with Ben Miller</itunes:title><description><![CDATA[<p>401 Access Denied Ep. 35 | Safeguarding Critical Infrastructure with Ben Miller</p><p>In this episode of 401 Access Denied, we're joined by Dragos VP of Services and R&amp;D, Ben Miller to discuss how securing critical infrastructure has changed over the past 10 years, including the convergence of OT and IT, the increase in ransomware attacks, and the need for critical visibility into industrial control systems (ICS).&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong>&nbsp;</p><p><br></p><p><strong>Follow Ben and Dragos on Twitter</strong></p><p><br></p><p>~<a href="https://twitter.com/DragosInc" rel="noopener noreferrer" target="_blank">@DragosInc</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/electricfork" rel="noopener noreferrer" target="_blank">@electricfork</a>&nbsp;</p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>401 Access Denied Ep. 35 | Safeguarding Critical Infrastructure with Ben Miller</p><p>In this episode of 401 Access Denied, we're joined by Dragos VP of Services and R&amp;D, Ben Miller to discuss how securing critical infrastructure has changed over the past 10 years, including the convergence of OT and IT, the increase in ransomware attacks, and the need for critical visibility into industrial control systems (ICS).&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong>&nbsp;</p><p><br></p><p><strong>Follow Ben and Dragos on Twitter</strong></p><p><br></p><p>~<a href="https://twitter.com/DragosInc" rel="noopener noreferrer" target="_blank">@DragosInc</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/electricfork" rel="noopener noreferrer" target="_blank">@electricfork</a>&nbsp;</p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-35]]></link><guid isPermaLink="false">aad0436e-3e26-442a-8cae-a3145712528a</guid><itunes:image href="https://artwork.captivate.fm/10d97ade-a89b-4263-b5d0-097d59d8b881/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 25 Aug 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e8d146b7-d15d-4e9c-8f3a-0879b52e8b77/audio-174401-13106-29857-33df2cf6-b841-4339-8112-9803b4de51b4.mp3" length="53492882" type="audio/mpeg"/><itunes:duration>55:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><itunes:summary>401 Access Denied Ep. 35 | Critical Infrastructure Security with Ben Miller
In this episode of 401 Access Denied, we&apos;re joined by Dragos VP of Services and R&amp;D, Ben Miller to discuss how securing critical infrastructure has changed over the past 10 years, including the convergence of OT and IT, the increase in ransomware attacks, and the need for critical visibility into industrial control systems (ICS). 
Check out Cybrary Now!!!
~https://www.cybrary.it/
Follow Joe on Twitter 
~@joe_carson 
Follow us on Social!!
~Cybrary Twitter 
~Thycotic Twitter 
~Instagram 
~FaceBook 
~YouTube 
~Cybrary LinkedIn 
~thycotic</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Demystifying the Dark Web to Entering Ethical Hacking with Clint Kehr | The Cybrary Podcast Ep. 67</title><itunes:title>Demystifying the Dark Web to Entering Ethical Hacking with Clint Kehr | The Cybrary Podcast Ep. 67</itunes:title><description><![CDATA[<p>Ever wondered what it was really like to be a hacker? Is there more to Dark Web policing than meets the eye? Ethical hacker and Cybrary instructor Clint Kehr tells the story of his law enforcement career transition from the streets to the web. Gain insights from the conversation on "failing up," networking, and mentoring in the cybersecurity industry.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Check out Clint's Course on Cybrary</strong></p>
<p>~<a href="https://www.cybrary.it/course/offensive-penetration-testing/" target="_self">Offensive Pen Testing</a>&nbsp;</p>
<p><strong>Connect with Clint</strong></p>
<p>~<a href="https://www.linkedin.com/in/clint-kehr-678745187/" target="_self">Clint's LinkedIn</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow us on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Ever wondered what it was really like to be a hacker? Is there more to Dark Web policing than meets the eye? Ethical hacker and Cybrary instructor Clint Kehr tells the story of his law enforcement career transition from the streets to the web. Gain insights from the conversation on "failing up," networking, and mentoring in the cybersecurity industry.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! </strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Check out Clint's Course on Cybrary</strong></p>
<p>~<a href="https://www.cybrary.it/course/offensive-penetration-testing/" target="_self">Offensive Pen Testing</a>&nbsp;</p>
<p><strong>Connect with Clint</strong></p>
<p>~<a href="https://www.linkedin.com/in/clint-kehr-678745187/" target="_self">Clint's LinkedIn</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow us on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/cybrary-67]]></link><guid isPermaLink="false">e1b9d136-71a1-4195-8f48-f4d070f9bd0a</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 18 Aug 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/80d969c6-2db6-4b53-b080-8fc438524ab6/audio-174112-13106-29857-8eb6f6a4-3640-4f00-8b2c-27ed16bc5886.mp3" length="36125721" type="audio/mpeg"/><itunes:duration>37:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ever wondered what it was really like to be a hacker? Is there more to Dark Web policing than meets the eye? Ethical hacker and Cybrary instructor Clint Kehr tells the story of his law enforcement career transition from the streets to the web. Gain insights from the conversation on &quot;failing up,&quot; networking, and mentoring in the cybersecurity industry.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube! 
Check out Cybrary Now!!!
~Cybrary 
Check out Clint&apos;s Course on Cybrary
~Offensive Pen Testing 
Connect with Clint
~Clint&apos;s LinkedIn 
Follow Thor on Twitter!
~@thorin_around 
Follow us on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 34 | Analyzing Verizon&apos;s Data Breach Investigations Report</title><itunes:title>401 Access Denied Ep. 34 | 2021 Verizon Data Breach Investigations Report Top Takeaways</itunes:title><description><![CDATA[<p>In this episode, Joseph Carson and Jonathan Meyers discuss the 2021 Verizon Data Breach Investigations Report and its findings. We cover how the threat landscape has changed in the past year and why there's been an increase in the number of cyberattacks. Hear what the experts say you can do to balance security and productivity. Plus, the top-cited causes of data breaches.&nbsp;&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~https://twitter.com/joe_carson</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode, Joseph Carson and Jonathan Meyers discuss the 2021 Verizon Data Breach Investigations Report and its findings. We cover how the threat landscape has changed in the past year and why there's been an increase in the number of cyberattacks. Hear what the experts say you can do to balance security and productivity. Plus, the top-cited causes of data breaches.&nbsp;&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~https://twitter.com/joe_carson</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/verizon-data-breach]]></link><guid isPermaLink="false">a1d42751-f168-491d-917e-344ee4e1d635</guid><itunes:image href="https://artwork.captivate.fm/537be754-7258-4db5-99cf-83faf7bb19aa/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 11 Aug 2021 17:11:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e16414e3-aa8b-465d-8515-671e55e70016/audio-172783-13106-29857-2122a8a4-9b98-4be1-bcfb-f6b66686ade7.mp3" length="52953243" type="audio/mpeg"/><itunes:duration>55:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>How to Succeed in Cybersecurity with Meg West | The Cybrary Podcast Ep. 66</title><itunes:title>How to Succeed in Cybersecurity with Meg West | The Cybrary Podcast Ep. 66</itunes:title><description><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">How did Meg West go from a political science degree to an incident response manager career in 3 years? Listen to her story of perseverance and her advice for any of you who want to jump into the dynamic cybersecurity field. We debunk the biggest myths about security work, uncover what it’s really like to be a “woman in tech,” and discuss her growing virality on YouTube as “Cybersecurity Meg.”</span></p>
<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;"><strong>Follow Cybersec Meg on Social!</strong></span></p>
<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">~</span><a href="https://twitter.com/cybersecmeg" target="_self"><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">@cybersecmeg</span></a><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;"> </span></p>
<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">~</span><a href="https://www.youtube.com/channel/UCQiE6iIQr9bNSFaYcFgFYGw" target="_self"><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">YouTube</span></a><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;"> </span></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">How did Meg West go from a political science degree to an incident response manager career in 3 years? Listen to her story of perseverance and her advice for any of you who want to jump into the dynamic cybersecurity field. We debunk the biggest myths about security work, uncover what it’s really like to be a “woman in tech,” and discuss her growing virality on YouTube as “Cybersecurity Meg.”</span></p>
<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;"><strong>Follow Cybersec Meg on Social!</strong></span></p>
<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">~</span><a href="https://twitter.com/cybersecmeg" target="_self"><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">@cybersecmeg</span></a><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;"> </span></p>
<p><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">~</span><a href="https://www.youtube.com/channel/UCQiE6iIQr9bNSFaYcFgFYGw" target="_self"><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">YouTube</span></a><span style="color: rgb(29,28,29);background-color: rgb(255,255,255);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;"> </span></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-66]]></link><guid isPermaLink="false">37d00137-b1fa-4611-9f39-5eeea5e934d2</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 04 Aug 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5dc979e8-964f-4031-8d3c-755c1ef38bb9/audio-168068-13106-29857-27d4c0a8-1711-42f2-aaf5-8a9b565b00b6.mp3" length="24223639" type="audio/mpeg"/><itunes:duration>25:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>How did Meg West go from a political science degree to an incident response manager career in 3 years? Listen to her story of perseverance and her advice for any of you who want to jump into the dynamic cybersecurity field.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 33 | Red Team 101: Offensive Security with Joe Vest</title><itunes:title>401 Access Denied Ep. 33 | Red Team 101: Offensive Security with Joe Vest</itunes:title><description><![CDATA[<p>In this episode, Joe Vest joins the 401 Access Denied team to discuss red teaming and pen testing operations and fundamentals. Joe is the author of the original SANS SEC 564 Red Teaming and Threat Emulation course, former technical lead for a DoD red team, and co-author of Red Team Development &amp; Operations. Joe walks us through how to build and run a professional red team, along with the common pitfalls and obstacles most organizations face.  </p><p><strong>Check out Joe's book here</strong>: https://redteam.guide/</p><p><strong>Follow Joe Vest on Twitter</strong>: @joevest</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode, Joe Vest joins the 401 Access Denied team to discuss red teaming and pen testing operations and fundamentals. Joe is the author of the original SANS SEC 564 Red Teaming and Threat Emulation course, former technical lead for a DoD red team, and co-author of Red Team Development &amp; Operations. Joe walks us through how to build and run a professional red team, along with the common pitfalls and obstacles most organizations face.  </p><p><strong>Check out Joe's book here</strong>: https://redteam.guide/</p><p><strong>Follow Joe Vest on Twitter</strong>: @joevest</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-33]]></link><guid isPermaLink="false">ac3a3357-dc63-4e34-b211-99f5e54125fb</guid><itunes:image href="https://artwork.captivate.fm/6209dd04-532b-4e7c-804e-c54ea35b9e2a/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 28 Jul 2021 04:15:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3be22926-e089-4495-8016-c9e1e813d406/audio-169433-13106-29857-44d71093-8d05-4ef6-8c69-d970f7b47865.mp3" length="49400006" type="audio/mpeg"/><itunes:duration>51:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><itunes:summary>In this episode, Joe Vest joins the 401 Access Denied team to discuss red teaming and pen testing operations and fundamentals.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Building a Culture of Security with Haekka | The Cybrary Podcast Ep. 65</title><itunes:title>Building a Culture of Security with Haekka | The Cybrary Podcast Ep. 65</itunes:title><description><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">In this episode, Cybrary's Mike Gruen and Jonathan Meyers sit down with Travis Good and Ryan Rich, co-founders of Haekka, a Security Awareness training company that lives directly in Slack. Travis and Ryan discuss their history in security and ways to keep security training up-to-date with the ever-changing digital landscape.</span></p>
<p></p>
<p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">In this episode, Cybrary's Mike Gruen and Jonathan Meyers sit down with Travis Good and Ryan Rich, co-founders of Haekka, a Security Awareness training company that lives directly in Slack. Travis and Ryan discuss their history in security and ways to keep security training up-to-date with the ever-changing digital landscape.</span></p>
<p></p>
<p>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-65]]></link><guid isPermaLink="false">61d1e385-b26f-454a-a1e5-4a53e3984e19</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 21 Jul 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/48239d36-2dd1-4026-bcd7-2500cad4692f/audio-167392-13106-29857-962cbeae-8bbe-4713-8908-8476479c0613.mp3" length="40876510" type="audio/mpeg"/><itunes:duration>42:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode, Cybrary&apos;s Mike Gruen and Jonathan Meyers sit down with Travis Good and Ryan Rich, co-founders of Haekka, a Security Awareness training company that lives directly in Slack.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 32 | Best Practices on Penetration Testing with Dave Kennedy</title><itunes:title>401 Access Denied Ep. 32 | Penetration Testing Top Tips with Dave Kennedy</itunes:title><description><![CDATA[<p>In this episode of 401 Access Denied, Dave Kennedy, CEO of Binary Defense and TrustedSec, and co-author of <em>Metasploit: The Penetration Testers Guide </em>joins the 401 team to talk about penetration testing. We uncover invaluable lessons from a master in the industry.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of 401 Access Denied, Dave Kennedy, CEO of Binary Defense and TrustedSec, and co-author of <em>Metasploit: The Penetration Testers Guide </em>joins the 401 team to talk about penetration testing. We uncover invaluable lessons from a master in the industry.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-32]]></link><guid isPermaLink="false">5150347a-fd6f-40e1-bb94-dab47e56e0b0</guid><itunes:image href="https://artwork.captivate.fm/2a1270ab-5fe7-4673-b339-e4b872a33193/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 14 Jul 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a882c232-d696-4900-ac6f-3344fe20014b/audio-164035-13106-29857-64673489-8248-4e37-94a3-c9f44bc7e546.mp3" length="56068018" type="audio/mpeg"/><itunes:duration>58:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><itunes:summary>In this episode of 401 Access Denied, Dave Kennedy, CEO of Binary Defense and TrustedSec, and co-author of Metasploit: The Penetration Testers Guide joins the 401 team to talk about penetration testing.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Cybersecurity Exercises and FBI Backdoors | The Cybrary Podcast Ep. 64</title><itunes:title>Cybersecurity Exercises and FBI Backdoors | The Cybrary Podcast Ep. 64</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcasts, Cybrary's Jonathan Meyers, along with Michael Weigand and Josh Lospinoso from Shift5, are joined by Dr. TJ O'Connor to discuss their shared experience of army cyber defense exercises. Dr. OConnor also touches on his journey in cybersecurity education and explains his current role as the Cybersecurity Program Chair at Florida Tech, which includes participating in FITSEC defensive and offensive competitions.</p>
<p></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcasts, Cybrary's Jonathan Meyers, along with Michael Weigand and Josh Lospinoso from Shift5, are joined by Dr. TJ O'Connor to discuss their shared experience of army cyber defense exercises. Dr. OConnor also touches on his journey in cybersecurity education and explains his current role as the Cybersecurity Program Chair at Florida Tech, which includes participating in FITSEC defensive and offensive competitions.</p>
<p></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-64]]></link><guid isPermaLink="false">f8432132-87ab-4b1d-8edd-f4d0b7cee139</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 07 Jul 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/35d256a7-fb3f-4117-8cb0-37fdf75fcbab/audio-162491-13106-29857-0e7e561b-9e17-4c0d-8258-6db448bc131c.mp3" length="44964307" type="audio/mpeg"/><itunes:duration>46:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcasts, Cybrary&apos;s Jonathan Meyers, along with Michael Weigand and Josh Lospinoso from Shift5, are joined by Dr. TJ O&apos;Connor to discuss their shared experience of army cyber defense exercises.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 31 | Ransomware &amp; Critical Infrastructure Q&amp;A with Dan Lohrmann</title><itunes:title>401 Access Denied Ep. 31 | Ransomware &amp; Critical Infrastructure Q&amp;A with Dan Lohrmann</itunes:title><description><![CDATA[<p>Recent events confirm that the US’s critical infrastructure and supply chain are very vulnerable to ransomware attacks. What more can and should be done to keep them safe from ransomware? As NATO and the White House announce steps to crack down on bad actors, will it move the needle at all? Dan Lohrmann, CSO of Security Mentor, and formerly of State of Michigan and the NSA, joins the 401 team to discuss.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Recent events confirm that the US’s critical infrastructure and supply chain are very vulnerable to ransomware attacks. What more can and should be done to keep them safe from ransomware? As NATO and the White House announce steps to crack down on bad actors, will it move the needle at all? Dan Lohrmann, CSO of Security Mentor, and formerly of State of Michigan and the NSA, joins the 401 team to discuss.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-31]]></link><guid isPermaLink="false">4e2f5496-4ee3-4bf3-98af-237bdcc9f23a</guid><itunes:image href="https://artwork.captivate.fm/566cedb3-d408-4773-823e-5e11c724ee0d/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 30 Jun 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/628c4601-992c-4dba-9244-21796889ae3c/audio-161041-13106-29857-5b6bbe37-8bf3-4081-965e-021a07f9352b.mp3" length="58101157" type="audio/mpeg"/><itunes:duration>01:00:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><itunes:summary>Recent events confirm that the US’s critical infrastructure and supply chain are very vulnerable to ransomware attacks. What more can and should be done to keep them safe from ransomware? Dan Lohrmann, CSO of Security Mentor, and formerly of State of Michigan and the NSA, joins the 401 team to discuss.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Finding Your Hope | Go For It with Sarah Moffat Ep. 8</title><itunes:title>Finding Your Hope | Go For It with Sarah Moffat Ep. 8</itunes:title><description><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">As the first season of Go For It comes to an end, Sarah shares her experience with overcoming mental obstacles such as depression and finding hope amidst an uncertain time. Sarah explains the importance of "thinking everything is rigged in your favor" when your faith is being tested by a difficult, and sometimes abusive, working environment.</span></p>]]></description><content:encoded><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">As the first season of Go For It comes to an end, Sarah shares her experience with overcoming mental obstacles such as depression and finding hope amidst an uncertain time. Sarah explains the importance of "thinking everything is rigged in your favor" when your faith is being tested by a difficult, and sometimes abusive, working environment.</span></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/go-fori-it-with-sarah-moffat-ep-8]]></link><guid isPermaLink="false">3ad7ea24-d3d0-4412-9e0a-0cdd3006ee11</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Mon, 28 Jun 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/711f8bd3-9d79-4d60-a3de-db528b737355/audio-160655-13106-29857-bddb87a6-fa58-4f1c-af06-038af242be0c.mp3" length="20802699" type="audio/mpeg"/><itunes:duration>21:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In the Go For It Season Finale, Sarah shares her experience with overcoming mental obstacles such as depression and finding hope amidst an uncertain time.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Making Security Awareness Fun with Mimecast&apos;s Jann Yogman | The Cybrary Podcast Ep. 63</title><itunes:title>Making Security Awareness Fun with Mimecast&apos;s Jann Yogman | The Cybrary Podcast Ep. 63</itunes:title><description><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">On this episode of the Cybrary Podcast, Jann Yogman continues the conversation on Mimecast's Security Awareness Training. Jann shares his journey as one of the writers for the training show, including</span> <span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">his experience in</span> <span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">brainstorm sessions and favorite moments on the set. If the last Cybrary Podcast left you curious about the production process, this podcast episode is for you!</span></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">On this episode of the Cybrary Podcast, Jann Yogman continues the conversation on Mimecast's Security Awareness Training. Jann shares his journey as one of the writers for the training show, including</span> <span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">his experience in</span> <span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">brainstorm sessions and favorite moments on the set. If the last Cybrary Podcast left you curious about the production process, this podcast episode is for you!</span></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-63]]></link><guid isPermaLink="false">80685674-19f7-4268-b2d6-4ecc79346b42</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 23 Jun 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8ff39b4d-e0e7-4087-9c08-73f11ae30395/audio-160083-13106-29857-52b3f933-87d3-4c42-9a7f-b25afaa05193.mp3" length="57056050" type="audio/mpeg"/><itunes:duration>59:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week, Writer and Director Jann Yogman continues the conversation on Mimecast&apos;s Security Awareness Training.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 30 | Pen Testing &amp; Incident Response with Pathfynder</title><itunes:title>401 Access Denied Ep. 30 | Pen Testing &amp; Incident Response with Pathfynder</itunes:title><description><![CDATA[<p>There are a lot of myths about what pen testing or red-teaming really are. DJ Fuller, CEO of Pathfynder joins us today to share what companies should expect when they engage a third-party to help them with cyber security and how to establish a good incident response program. Get the low down on the common mistakes that organizations make when hiring a third-party service or choosing to move forward internally.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong>&nbsp;</p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>There are a lot of myths about what pen testing or red-teaming really are. DJ Fuller, CEO of Pathfynder joins us today to share what companies should expect when they engage a third-party to help them with cyber security and how to establish a good incident response program. Get the low down on the common mistakes that organizations make when hiring a third-party service or choosing to move forward internally.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong>&nbsp;</p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-30]]></link><guid isPermaLink="false">ce8ab296-0317-42ab-9a19-c626991ef848</guid><itunes:image href="https://artwork.captivate.fm/0222f3bd-d149-46f4-af06-4badbb3586c8/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Tue, 15 Jun 2021 15:29:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa9f43ff-997f-4117-9508-5c47ba3f7196/audio-158560-13106-29857-bdc5acb0-f940-40ab-8500-4c79fe572979.mp3" length="48573920" type="audio/mpeg"/><itunes:duration>50:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode><itunes:summary>In this episode of 401 Access Denied, get the low down on the common mistakes that organizations make when hiring a third-party service or choosing to move forward internally.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Finding Your Path with Jonathan Alboum | Go For It with Sarah Moffat Ep. 7</title><itunes:title>Finding Your Path with Jonathan Alboum | Go For It with Sarah Moffat Ep. 7</itunes:title><description><![CDATA[<p>In this episode of Go For it, Jonathan Alboum joins Sarah to discuss his journey in security, ranging from his former CIO of USDA position to his current work in the government as the Federal CTO of Service Now. Sarah and Jonathan talk about the importance of leaping into new opportunities and ways on handling career transitions.</p>]]></description><content:encoded><![CDATA[<p>In this episode of Go For it, Jonathan Alboum joins Sarah to discuss his journey in security, ranging from his former CIO of USDA position to his current work in the government as the Federal CTO of Service Now. Sarah and Jonathan talk about the importance of leaping into new opportunities and ways on handling career transitions.</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/go-fori-it-with-sarah-moffat-ep-7]]></link><guid isPermaLink="false">3eadbf91-8e71-4bdb-97bd-4341502e0a0a</guid><itunes:image href="https://artwork.captivate.fm/5961b14b-8b15-40fe-a2cb-6bbebc4086fb/go-for-it-v7-281-29-square-big.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Mon, 14 Jun 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/be160db3-35e0-41c7-b082-c634134ad4e9/audio-158276-13106-29857-98a1d606-3e7d-49c0-868c-d442060eb767.mp3" length="28956794" type="audio/mpeg"/><itunes:duration>30:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode Sarah and her guest Jonathan Alboum, the Federal CTO of Service Now, talk about the importance of leaping into new opportunities and ways on handling career transitions.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Drew Freed on His Role as Mimecast&apos;s Human Error | The Cybrary Podcast Ep. 62</title><itunes:title>Drew Freed on His Role as Mimecast&apos;s Human Error | The Cybrary Podcast Ep. 62</itunes:title><description><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">In this episode of the Cybrary Podcast Drew Freed, the face behind Mimecast's iconic Human Error character, discusses being approached at his bartending gig for the role as well as his journey within the security education space. Get to know Drew's acting experience, hobbies, favorite movies, and his most memorable moments on the Mimecast set. Want to know how Human Error got his iconic costume? Ever wondered what it's like to get tackled by the Melbourne Rebels rugby team? We discuss it all on the Cybrary Podcast.</span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Check out Cybrary Now!!!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Cybrary</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow Thor on Twitter!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/thorin_around" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">@thorin_around</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow Cybrary on Social!!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/cybraryIT" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Twitter</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.instagram.com/cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Instagram</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.facebook.com/cybraryit/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">FaceBook</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">YouTube</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a...]]></description><content:encoded><![CDATA[<p><span style="color: rgb(29,28,29);background-color: rgb(248,248,248);font-size: 15px;font-family: Slack-Lato, appleLogo, sans-serif;">In this episode of the Cybrary Podcast Drew Freed, the face behind Mimecast's iconic Human Error character, discusses being approached at his bartending gig for the role as well as his journey within the security education space. Get to know Drew's acting experience, hobbies, favorite movies, and his most memorable moments on the Mimecast set. Want to know how Human Error got his iconic costume? Ever wondered what it's like to get tackled by the Melbourne Rebels rugby team? We discuss it all on the Cybrary Podcast.</span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Check out Cybrary Now!!!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Cybrary</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow Thor on Twitter!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/thorin_around" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">@thorin_around</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;"><strong>Follow Cybrary on Social!!</strong></span></p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://twitter.com/cybraryIT" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Twitter</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.instagram.com/cybrary.it/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">Instagram</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.facebook.com/cybraryit/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">FaceBook</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">YouTube</span></a>&nbsp;</p>
<p style="text-align:start;"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">~</span><a href="https://www.linkedin.com/company/cybrary/" target="_self"><span style="color: rgb(10,19,22);background-color: rgb(255,255,255);font-size: 16px;font-family: Geomanist, sans-serif;">LinkedIn</span></a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-62]]></link><guid isPermaLink="false">f46d1461-d22c-45e3-8d69-c42a123acaa7</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 09 Jun 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c9446058-3a13-4eb1-8378-b451e1753636/audio-156272-13106-29857-a05e2787-70fb-4719-8d62-187f1e19fac0.mp3" length="48068269" type="audio/mpeg"/><itunes:duration>50:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast Drew Freed, the face behind Mimecast&apos;s iconic Human Error character, discusses being approached at his bartending gig for the role as well as his journey within the security education space. Get to know Drew&apos;s acting experience, hobbies, favorite movies, and his most memorable moments on the Mimecast set.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 29 | Helpful or Harmful? The Microsoft Exchange Server Hack &amp; FBI Cleanup with Josh Lospinoso</title><itunes:title>401 Access Denied Ep. 29 | Helpful or Harmful? The Microsoft Exchange Server Hack &amp; FBI Cleanup with Josh Lospinoso</itunes:title><description><![CDATA[<p>After the four zero-day vulnerabilities were discovered, the FBI also proactively removed backdoors on numerous private Exchange servers. Was that overreach or the right thing to do? On today's episode, we're joined by Josh Lospinoso, CEO and co-founder of Shift5 and former U.S. Army cyber officer, to discuss law enforcement in cyber security.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>After the four zero-day vulnerabilities were discovered, the FBI also proactively removed backdoors on numerous private Exchange servers. Was that overreach or the right thing to do? On today's episode, we're joined by Josh Lospinoso, CEO and co-founder of Shift5 and former U.S. Army cyber officer, to discuss law enforcement in cyber security.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-episode-29]]></link><guid isPermaLink="false">d8db0dd5-ab00-450d-b980-d092e7a6ef0b</guid><itunes:image href="https://artwork.captivate.fm/e3fc0279-6048-4b8b-a7ce-622cce53e0d5/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 02 Jun 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6a862b65-f7ae-46a4-9f42-7db7e5b53d4b/audio-154943-13106-29857-a8a8e536-5df4-42ed-8aa3-71b09c8e16ae.mp3" length="51506007" type="audio/mpeg"/><itunes:duration>53:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><itunes:summary>On today&apos;s episode, we&apos;re joined by Josh Lospinoso, CEO and co-founder of Shift5 and former U.S. Army cyber officer, to discuss law enforcement in cyber security.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Transitioning to DevSecOps with Bella Trenkova | The Cybrary Podcast Ep. 61</title><itunes:title>Transitioning to DevSecOps with Bella Trenkova | The Cybrary Podcast Ep. 61</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, Mike Gruen, the CISO at Cybrary, sits down with Bella Trenkova, the Founder of Ardigent Consulting, which offers Agile and DevSecOps services and coaching. Mike and Bella discuss the importance of and the common misconceptions about DevSecOps. They do a deep dive into the nuances of investing in DevSecOps for any company as well as transitioning into a DevSecOps team.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, Mike Gruen, the CISO at Cybrary, sits down with Bella Trenkova, the Founder of Ardigent Consulting, which offers Agile and DevSecOps services and coaching. Mike and Bella discuss the importance of and the common misconceptions about DevSecOps. They do a deep dive into the nuances of investing in DevSecOps for any company as well as transitioning into a DevSecOps team.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/the-cybrary-podcast-episode-61]]></link><guid isPermaLink="false">e2e7246f-8630-416e-bd63-9ddd1b12232c</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 26 May 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3c409cd4-2d3e-43bc-a900-b84211efa7be/audio-152911-13106-29857-272c1fda-b75a-409d-9eef-c446f3649c03.mp3" length="46799987" type="audio/mpeg"/><itunes:duration>48:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, Mike Gruen, the CISO at Cybrary, sits down with Bella Trenkova, the Founder of Ardigent Consulting, which offers Agile and DevSecOps services and coaching. Mike and Bella discuss the importance of and the common misconceptions about DevSecOps. They do a deep dive into the nuances of investing in DevSecOps for any company as well as transitioning into a DevSecOps team.

Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 28 | Digital Forensics &amp; Incident Response with Ondrej Krehel of LIFARS</title><itunes:title>401 Access Denied Ep. 28 | Digital Forensics &amp; Incident Response with Ondrej Krehel of LIFARS</itunes:title><description><![CDATA[<p>In this episode of 401 Access Denied, we are joined by Ondrej Krehel, CEO and Founder of LIFARS, to discuss Digital Forensics, Incident Response, Ransomware Mitigation, and Cyber Resiliency. Do you know your risks and how to respond if targeted by hackers? We discuss how to be resilient on both a personal and organizational level.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of 401 Access Denied, we are joined by Ondrej Krehel, CEO and Founder of LIFARS, to discuss Digital Forensics, Incident Response, Ransomware Mitigation, and Cyber Resiliency. Do you know your risks and how to respond if targeted by hackers? We discuss how to be resilient on both a personal and organizational level.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/401-access-denied-ep-28]]></link><guid isPermaLink="false">52c0151e-837d-427c-a5c4-e7e8811d2dc0</guid><itunes:image href="https://artwork.captivate.fm/970868e0-683f-4ec3-882e-d0de77b1502e/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 19 May 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e8bc8f2d-2a7b-426a-9cc6-e1669c4c7b34/audio-150952-13106-29857-ecbd4422-fe21-4e9e-9cc9-1f3577ad929e.mp3" length="49143886" type="audio/mpeg"/><itunes:duration>51:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><itunes:summary>In this episode of 401 Access Denied, we are joined by Ondrej Krehel, CEO and Founder of LIFARS, to discuss Digital Forensics, Incident Response, Ransomware Mitigation, and Cyber Resiliency.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Finding Your Gratitude with Kerry Wekolo | Go For It with Sarah Moffat Ep. 6</title><itunes:title>Finding Your Gratitude with Kerry Wekelo | Go For It with Sarah Moffat Ep. 6</itunes:title><description><![CDATA[<p>On this week's episode, Sarah sits down with Kerry Wekelo, the COO of&nbsp; Actualize Consulting, to discuss the power of gratitude for career development. Using her personal work experience and leadership development expertise, Kerry shares her techniques on nourishing gratitude on a daily basis in order to grow your professional mindset.</p>]]></description><content:encoded><![CDATA[<p>On this week's episode, Sarah sits down with Kerry Wekelo, the COO of&nbsp; Actualize Consulting, to discuss the power of gratitude for career development. Using her personal work experience and leadership development expertise, Kerry shares her techniques on nourishing gratitude on a daily basis in order to grow your professional mindset.</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm/episode/go-for-it-with-sarah-moffat-episode-six]]></link><guid isPermaLink="false">bc0f0a7d-daf3-4824-8331-60cacb111271</guid><itunes:image href="https://artwork.captivate.fm/cf4fd8d9-8829-4f34-962f-2a6f57e73df6/go-for-it-v7-281-29-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Mon, 17 May 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3ed5617e-2196-4ea2-812c-2e18244fb484/audio-149897-13106-29857-0febe37b-d2a0-46ae-a23a-66b9f07a9e54.mp3" length="24261355" type="audio/mpeg"/><itunes:duration>25:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybrary</itunes:author></item><item><title>Instructor Spotlight with Nick Moy | The Cybrary Podcast Ep. 60</title><itunes:title>Instructor Spotlight with Nick Moy | The Cybrary Podcast Ep. 60</itunes:title><description><![CDATA[<p>In this week’s episode of The Cybrary Podcast we are speaking with Nick Moy, renowned Cybrary Instructor and VP of Security Engineering for a mortgage firm. Nick discusses how he began his cyber journey and the courses he teaches on Cybrary.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Follow Nick on Twitter and YouTube</strong></p>
<p>~<a href="https://twitter.com/m0n42ch" target="_self">@m0n42ch</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCbVrIa5mvL0V3Q6MKTkdMUw" target="_self">YouTube</a>&nbsp;</p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this week’s episode of The Cybrary Podcast we are speaking with Nick Moy, renowned Cybrary Instructor and VP of Security Engineering for a mortgage firm. Nick discusses how he began his cyber journey and the courses he teaches on Cybrary.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Follow Nick on Twitter and YouTube</strong></p>
<p>~<a href="https://twitter.com/m0n42ch" target="_self">@m0n42ch</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCbVrIa5mvL0V3Q6MKTkdMUw" target="_self">YouTube</a>&nbsp;</p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">c5a62eee-6291-4f95-960d-3b8b50f88293</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 12 May 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e3504ddb-a0ac-4121-a913-8fceae392aa1/audio-149482-13106-29857-f017894a-72d1-49a8-a0a9-41900669f1be.mp3" length="29068195" type="audio/mpeg"/><itunes:duration>30:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this week’s episode of The Cybrary Podcast we are speaking with Nick Moy, renowned Cybrary Instructor and VP of Security Engineering for a mortgage firm. Nick discusses how he began his cyber journey and the courses he teaches on Cybrary.

Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!

Follow Nick on Twitter and YouTube
~@m0n42ch 
~YouTube 
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 27 | 1 Year Anniversary Special: The Making of 401 Access Denied</title><itunes:title>401 Access Denied Ep. 27 | 1 Year Anniversary Special: The Making of 401 Access Denied</itunes:title><description><![CDATA[<p>It’s the special anniversary edition of the 401 Access Denied podcast! In honor of our 1-year anniversary and more than 16,000 listens, Joe and Mike want to take you behind the scenes and introduce you to everyone who works on the podcast and brings it to you biweekly. Listeners, thank you for hanging out with us for 1 magical year. We want to hear your thoughts <a href="https://app.smartsheet.com/b/form/8852568d2dae449f94d51229a877c132" rel="noopener noreferrer" target="_blank"> here</a>. What topics or guest stars matter to you?</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>It’s the special anniversary edition of the 401 Access Denied podcast! In honor of our 1-year anniversary and more than 16,000 listens, Joe and Mike want to take you behind the scenes and introduce you to everyone who works on the podcast and brings it to you biweekly. Listeners, thank you for hanging out with us for 1 magical year. We want to hear your thoughts <a href="https://app.smartsheet.com/b/form/8852568d2dae449f94d51229a877c132" rel="noopener noreferrer" target="_blank"> here</a>. What topics or guest stars matter to you?</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">9ce878fe-aa99-4444-aa15-ed256f15d35a</guid><itunes:image href="https://artwork.captivate.fm/a019c03f-2914-4c73-b3cd-a1fe3b025754/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 05 May 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f16383df-746a-4785-a3bb-4a124a7f2ad2/audio-149483-13106-29857-121ced71-340a-4de5-83cf-2f3f8c9aef4f.mp3" length="47197114" type="audio/mpeg"/><itunes:duration>49:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><itunes:summary>It’s the special anniversary edition of the 401 Access Denied podcast! In honor of our 1-year anniversary and more than 16,000 listens, Joe and Mike want to take you behind the scenes and introduce you to everyone who works on the podcast and brings it to you biweekly.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 5 Finding Energy for Daily Success | Go For It with Sarah Moffat</title><itunes:title>Ep. 5 Finding Energy for Daily Success | Go For It with Sarah Moffat</itunes:title><description><![CDATA[<p>What gives you energy? We’re not talking about “what motivates you”, we’re diving into what gives you the energy to work, live, and experience life with intent. If you could have 3x the amount of energy as you do now, what would you do with it? Today’s episode explores the virtuous cycle of energy and how to set yourself up for success every day.</p> <p> </p>]]></description><content:encoded><![CDATA[<p>What gives you energy? We’re not talking about “what motivates you”, we’re diving into what gives you the energy to work, live, and experience life with intent. If you could have 3x the amount of energy as you do now, what would you do with it? Today’s episode explores the virtuous cycle of energy and how to set yourself up for success every day.</p> <p> </p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">f2dfc3ad-d75e-4c5f-ac6b-0d81c9e20eff</guid><itunes:image href="https://artwork.captivate.fm/db8a248d-c346-47b5-88a7-96dd3c16a408/go-for-it-v7-1-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Mon, 03 May 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ea6b6a73-ccc1-45a9-bd06-fbd608e09791/audio-149484-13106-29857-befa7605-76a3-4c57-9821-85303e5ea13d.mp3" length="21808756" type="audio/mpeg"/><itunes:duration>22:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Today’s episode explores the virtuous cycle of energy and how to set yourself up for success every day.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>From Project Manager to NASA Engineer in 3...2...1... | The Cybrary Podcast Ep. 59</title><itunes:title>From Project Manager to NASA Engineer in 3...2...1... | The Cybrary Podcast Ep. 59</itunes:title><description><![CDATA[<p>Welcome to episode 59 of the Cybrary Podcast. This week’s guest, Cindy Chan-Leonor, Co-founder of CyberDEI, joins us from California to discuss imposter syndrome, her journey into cybersecurity, and why finding a community to connect with is vital to your success.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>
<p></p>]]></description><content:encoded><![CDATA[<p>Welcome to episode 59 of the Cybrary Podcast. This week’s guest, Cindy Chan-Leonor, Co-founder of CyberDEI, joins us from California to discuss imposter syndrome, her journey into cybersecurity, and why finding a community to connect with is vital to your success.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>
<p></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">d7952b50-c48c-4a17-814b-63255e9026bc</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 28 Apr 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ea13720f-6447-42a3-9219-66d051837748/audio-149485-13106-29857-fc0c39e2-41c0-422b-bd2f-962b65ea421d.mp3" length="31868805" type="audio/mpeg"/><itunes:duration>33:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome to episode 59 of the Cybrary Podcast. This week’s guest, Cindy Chan-Leonor, Co-founder of CyberDEI, joins us from California to discuss imposter syndrome, her journey into cybersecurity, and why finding a community to connect with is vital to your success.

Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!

Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 26 | Cyber Insurance with the Experts: Michael Phillips and Kevin McGowan</title><itunes:title>401 Access Denied Ep. 26 | Cyber Insurance with the Experts: Michael Phillips and Kevin McGowan</itunes:title><description><![CDATA[<p>Mike and Joe dig into the topic of cyber insurance with the folks from Resilience Insurance – Kevin McGowan, VP of Cyber Underwriting and Michael Phillips, Head of Claims. As cyber laws are changing and cyber criminals are continually getting better and more creative in their approach, cybercrimes are becoming more commonplace. We discuss what you need to know when selecting cyber insurance for your organization to help minimize disruption and ease the aftermath of a cyber incident.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Mike and Joe dig into the topic of cyber insurance with the folks from Resilience Insurance – Kevin McGowan, VP of Cyber Underwriting and Michael Phillips, Head of Claims. As cyber laws are changing and cyber criminals are continually getting better and more creative in their approach, cybercrimes are becoming more commonplace. We discuss what you need to know when selecting cyber insurance for your organization to help minimize disruption and ease the aftermath of a cyber incident.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">ba867ba1-f927-4361-a361-d40babbc09b5</guid><itunes:image href="https://artwork.captivate.fm/f4c94644-28ff-4b7f-918f-bee96e8cde14/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 21 Apr 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e3fbfb62-c1fa-48a4-9f1c-95c8d25d70c6/audio-149486-13106-29857-6fcea384-522d-436d-8f3a-566c58c8498a.mp3" length="56590805" type="audio/mpeg"/><itunes:duration>58:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><itunes:summary>Mike and Joe dig into the topic of cyber insurance with the folks from Resilience Insurance – Kevin McGowan, VP of Cyber Underwriting and Michael Phillips, Head of Claims. We discuss what you need to know when selecting cyber insurance for your organization to help minimize disruption and ease the aftermath of a cyber incident.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 4 Finding Your Breath with Sharon Chi | Go For It with Sarah Moffat</title><itunes:title>Ep. 4 Finding Your Breath with Sharon Chi | Go For It with Sarah Moffat</itunes:title><description><![CDATA[<p>On this week’s episode, Sarah welcomes Sharon Chi to uncover how to “avoid mental constipation” and react with purpose. Do you find yourself always going, but never pausing to take a breath to hear your own thoughts and reflect on your life, goals, and intentions? How do find the energy and motivation to grow and keep moving forward? Get ready to listen and think about your driving force and how to be intentional in thought and action.</p> <p>If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at <a class="c-link" href="mailto:podcast@cybrary.it" target="_blank" rel= "noopener noreferrer" data-stringify-link= "mailto:podcast@cybrary.it" data-sk= "tooltip_parent">podcast@cybrary.it</a>.</p>]]></description><content:encoded><![CDATA[<p>On this week’s episode, Sarah welcomes Sharon Chi to uncover how to “avoid mental constipation” and react with purpose. Do you find yourself always going, but never pausing to take a breath to hear your own thoughts and reflect on your life, goals, and intentions? How do find the energy and motivation to grow and keep moving forward? Get ready to listen and think about your driving force and how to be intentional in thought and action.</p> <p>If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at <a class="c-link" href="mailto:podcast@cybrary.it" target="_blank" rel= "noopener noreferrer" data-stringify-link= "mailto:podcast@cybrary.it" data-sk= "tooltip_parent">podcast@cybrary.it</a>.</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">5d9153e5-e833-4d8e-b2fd-3353420eabac</guid><itunes:image href="https://artwork.captivate.fm/d9986f41-855d-4816-8918-f1c1b170158f/go-for-it-v7-1-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Mon, 19 Apr 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/def25875-8622-4c4d-a909-859b46e782ad/audio-149487-13106-29857-9f379973-697a-400c-944b-6cd429753c9e.mp3" length="19122077" type="audio/mpeg"/><itunes:duration>19:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this week’s episode, Sarah welcomes Sharon Chi to uncover how to “avoid mental constipation” and react with purpose.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Cross-Trained Cyber Specialists | The Cybrary Podcast Ep. 58</title><itunes:title>Cross-Trained Cyber Specialists | The Cybrary Podcast Ep. 58</itunes:title><description><![CDATA[<p>On this episode, we welcome Mike Behrmann, Director of Security at Blumira to talk with Cybrary’s Director of Content, Will Carlson, about Workforce Development. Continuous professional development is an expectation at many growing companies today, but is it being made a priority? As Will and Mike discuss the moving target known as Cybersecurity, they delve into resume and job interview expectations, how to set goals that align with your cybersecurity journey, and the importance of cross training while finding your specialization.</p>
<p></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>On this episode, we welcome Mike Behrmann, Director of Security at Blumira to talk with Cybrary’s Director of Content, Will Carlson, about Workforce Development. Continuous professional development is an expectation at many growing companies today, but is it being made a priority? As Will and Mike discuss the moving target known as Cybersecurity, they delve into resume and job interview expectations, how to set goals that align with your cybersecurity journey, and the importance of cross training while finding your specialization.</p>
<p></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">9c209181-865a-4f19-bbac-c11fa93e8358</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 14 Apr 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d571b4d6-44b6-4b5c-bd41-09597a5fceb3/audio-149488-13106-29857-ca555926-d6bd-4d93-9e13-4d9e15e162a1.mp3" length="39825652" type="audio/mpeg"/><itunes:duration>41:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this episode, we welcome Mike Behrmann, Director of Security at Blumira to talk with Cybrary’s Director of Content, Will Carlson, about Workforce Development. Continuous professional development is an expectation at many growing companies today, but is it being made a priority? As Will and Mike discuss the moving target known as Cybersecurity, they delve into resume and job interview expectations, how to set goals that align with your cybersecurity journey, and the importance of cross training while finding your specialization.

Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!

Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 25 | Inside Application Security with Ted Harrington</title><itunes:title>401 Access Denied Ep. 25 | Inside Application Security with Ted Harrington</itunes:title><description><![CDATA[<p>Special guest Ted Harrington joins Joe and Mike today to discuss application security – how to be more secure, what AppSec myths to reconsider, and how to change mentalities at your organization. Ted is Executive Partner at Independent Security Evaluators and author of Hackable: How To Do Application Security Right.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Special guest Ted Harrington joins Joe and Mike today to discuss application security – how to be more secure, what AppSec myths to reconsider, and how to change mentalities at your organization. Ted is Executive Partner at Independent Security Evaluators and author of Hackable: How To Do Application Security Right.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">7e88dcbe-d0af-44fb-a86f-bd36c21a0f6a</guid><itunes:image href="https://artwork.captivate.fm/4cbb641a-7a45-459a-a98d-be8d3397a950/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 07 Apr 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/820443b9-d7f1-47bd-b76e-d294fb716261/audio-149489-13106-29857-c3900eb5-3f96-4fcb-9c34-b0678e81b975.mp3" length="55256436" type="audio/mpeg"/><itunes:duration>57:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>25</itunes:episode><itunes:season>1</itunes:season><podcast:episode>25</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Special guest Ted Harrington joins Joe and Mike today to discuss application security – how to be more secure, what AppSec myths to reconsider, and how to change mentalities at your organization.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 3 Finding Your Next Steps | Go For It with Sarah Moffat</title><itunes:title>Ep. 3 Finding Your Next Steps | Go For It with Sarah Moffat</itunes:title><description><![CDATA[<p>Do you ever wonder how some people get ahead so fast? Well, you can’t reach the next level with the same level of thinking as now. When you’re surrounded by sameness, how do you grow? In this episode of Go For It, Sarah dives into being intentional and thoughtful, and ways to create an environment optimized for the growth of you and those around you.</p> <p>If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at podcast@cybrary.it.</p>]]></description><content:encoded><![CDATA[<p>Do you ever wonder how some people get ahead so fast? Well, you can’t reach the next level with the same level of thinking as now. When you’re surrounded by sameness, how do you grow? In this episode of Go For It, Sarah dives into being intentional and thoughtful, and ways to create an environment optimized for the growth of you and those around you.</p> <p>If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at podcast@cybrary.it.</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">0ae9383f-4bd9-40db-8f3f-037b7bfc1822</guid><itunes:image href="https://artwork.captivate.fm/18d7e2f0-6451-4d8d-a2dd-67704082c6e3/go-for-it-v7-1-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Mon, 05 Apr 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab0f9321-d62e-4d92-abe8-ea0b0246bf51/audio-149490-13106-29857-60d04e5b-8ae5-4d53-a6e8-af337dac920c.mp3" length="29449799" type="audio/mpeg"/><itunes:duration>30:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of Go For It, Sarah dives into being intentional and thoughtful, and ways to create an environment optimized for the growth of you and those around you.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>SolarWinds And Supply Chains With Tina Kuhn | The Cybrary Podcast Ep. 57</title><itunes:title>SolarWinds and Supply Chains with Tina Kuhn | The Cybrary Podcast Ep. 57</itunes:title><description><![CDATA[<p>It’s Episode 57 of the Cybrary Podcast and we welcome Tina Kuhn, President of Cybercore Technologies, to talk about supply chains.&nbsp;</p><p>With attacks as recent as SolarWinds and future attacks that will inevitably occur, Mike and Tina discuss everything from counterfeit equipment and hardware tampering, to the state of critical infrastructure and how to evaluate products for optimal security.&nbsp;&nbsp;&nbsp;</p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>It’s Episode 57 of the Cybrary Podcast and we welcome Tina Kuhn, President of Cybercore Technologies, to talk about supply chains.&nbsp;</p><p>With attacks as recent as SolarWinds and future attacks that will inevitably occur, Mike and Tina discuss everything from counterfeit equipment and hardware tampering, to the state of critical infrastructure and how to evaluate products for optimal security.&nbsp;&nbsp;&nbsp;</p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">195ad629-e2fb-44fb-b6f1-d5b2946567b7</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 31 Mar 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7bcbea89-3330-4a45-9800-d791c288d381/audio-149491-13106-29857-d1b17ac6-f927-4223-b7bf-12380a14ccb4.mp3" length="29082471" type="audio/mpeg"/><itunes:duration>30:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>It’s Episode 57 of the Cybrary Podcast and we welcome Tina Kuhn, President of Cybercore Technologies, to talk about supply chains. 
With attacks as recent as SolarWinds and future attacks that will inevitably occur, Mike and Tina discuss everything from counterfeit equipment and hardware tampering, to the state of critical infrastructure and how to evaluate products for optimal security.   
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 24 | Joe &amp; Mike&apos;s Top 5 Free Cybersecurity Tools</title><itunes:title>401 Access Denied Ep. 24 | Joe &amp; Mike&apos;s Top 5 Free Cybersecurity Tools</itunes:title><description><![CDATA[<p>In your cyber security journey, you’ve probably heard of a massive number of cyber security tools, many of them free. It can be tricky to figure out where to start and which tool is worth your time. In this podcast, Joe and Mike discuss the free cyber security tools in their arsenal and the significant value they’ve provided over the years.&nbsp;</p><p>Did we miss your favorite free tool? Write to Joe and Mike <a href="https://app.smartsheet.com/b/form/8852568d2dae449f94d51229a877c132" rel="noopener noreferrer" target="_blank">here.</a></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In your cyber security journey, you’ve probably heard of a massive number of cyber security tools, many of them free. It can be tricky to figure out where to start and which tool is worth your time. In this podcast, Joe and Mike discuss the free cyber security tools in their arsenal and the significant value they’ve provided over the years.&nbsp;</p><p>Did we miss your favorite free tool? Write to Joe and Mike <a href="https://app.smartsheet.com/b/form/8852568d2dae449f94d51229a877c132" rel="noopener noreferrer" target="_blank">here.</a></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">ff7f2827-e583-450a-911d-31ea30e19e72</guid><itunes:image href="https://artwork.captivate.fm/b1fc5d23-1fdf-4160-bd87-80d40b79d27e/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 24 Mar 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0b9bea61-43aa-400f-80a3-9be7a7ba434d/audio-149492-13106-29857-804287b9-3751-494e-a6cb-2f2f118f6227.mp3" length="38284963" type="audio/mpeg"/><itunes:duration>39:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><itunes:summary>In your cyber security journey, you’ve probably heard of a massive number of cyber security tools, many of them free. It can be tricky to figure out where to start and which tool is worth your time. In this podcast, Joe and Mike discuss the free cyber security tools in their arsenal and the significant value they’ve provided over the years.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 2 Finding Your Driving Force with Charity Carney | Go For It with Sarah Moffat</title><itunes:title>Ep. 2 Finding Your Driving Force with Charity Carney | Go For It with Sarah Moffat</itunes:title><description><![CDATA[<p>Welcome back to Go For It with Sarah Moffat. Joining us for episode 2, is Charity Carney, VP of Security and Compliance at InVita Healthcare Technologies. Throughout her career, Charity had many less than positive experiences, but she shares her journey of finding what motivated her to go for it and leave a toxic work environment for her dream job. We hope her story can inspire you to GO FOR IT and find your driving force to courageously achieve your goals.</p> <p>If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at <a href= "mailto:podcast@cybrary.it">podcast@cybrary.it</a>.</p>]]></description><content:encoded><![CDATA[<p>Welcome back to Go For It with Sarah Moffat. Joining us for episode 2, is Charity Carney, VP of Security and Compliance at InVita Healthcare Technologies. Throughout her career, Charity had many less than positive experiences, but she shares her journey of finding what motivated her to go for it and leave a toxic work environment for her dream job. We hope her story can inspire you to GO FOR IT and find your driving force to courageously achieve your goals.</p> <p>If you have a topic you’d like Sarah to discuss, or are interested in being a guest, email us at <a href= "mailto:podcast@cybrary.it">podcast@cybrary.it</a>.</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">9dd88802-df9d-4a0b-bc62-70ad51c0613c</guid><itunes:image href="https://artwork.captivate.fm/7c347a5f-905a-422d-b754-32a9720de92e/go-for-it-v7-1-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Mon, 22 Mar 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/63f3575c-df3b-4f50-bde0-80f366cf2c69/audio-149493-13106-29857-a78b7ef6-a02a-44b6-904d-d6881e056f53.mp3" length="20193237" type="audio/mpeg"/><itunes:duration>21:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome back to Go For It with Sarah Moffat. Joining us for episode 2, is Charity Carney, VP of Security and Compliance at InVita Healthcare Technologies. Throughout her career, Charity had many less than positive experiences, but she shares her journey of finding what motivated her to go for it and leave a toxic work environment for her dream job.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Using Your Data to Help You | The Cybrary Podcast Ep. 56</title><itunes:title>Using Your Data to Help You | The Cybrary Podcast Ep. 56</itunes:title><description><![CDATA[<p>On this episode of the Cybrary Podcast, we welcome back Base Operations, introducing Scott Money, the VP of Engineering. Everyone knows Google, but Mike, Jonathan, and Scott throwback to the days of Lycos, before PHP, server side scripting, cookies, and SSL. What launched Google into becoming the leading name in search engines around the world, and what advancements were pivotal in the success and failures of companies since the 1990’s? Scott dives into the role Base Operations plays in data gathering, and how people and companies today can benefit from and are impacted by the wealth of information on the internet.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>On this episode of the Cybrary Podcast, we welcome back Base Operations, introducing Scott Money, the VP of Engineering. Everyone knows Google, but Mike, Jonathan, and Scott throwback to the days of Lycos, before PHP, server side scripting, cookies, and SSL. What launched Google into becoming the leading name in search engines around the world, and what advancements were pivotal in the success and failures of companies since the 1990’s? Scott dives into the role Base Operations plays in data gathering, and how people and companies today can benefit from and are impacted by the wealth of information on the internet.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">019fd0a9-304b-454c-830c-5d9e9a9a0126</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 17 Mar 2021 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c161accc-b2ef-49f2-ac2e-769d8227394c/audio-149494-13106-29857-7e7c31f6-d2c0-424e-ac1a-cc818c1835fb.mp3" length="42533390" type="audio/mpeg"/><itunes:duration>44:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this episode of the Cybrary Podcast, we welcome back Base Operations, introducing Scott Money, the VP of Engineering. Everyone knows Google, but Mike, Jonathan, and Scott throwback to the days of Lycos, before PHP, server side scripting, cookies, and SSL. What launched Google into becoming the leading name in search engines around the world, and what advancements were pivotal in the success and failures of companies since the 1990’s? Scott dives into the role Base Operations plays in data gathering, and how people and companies today can benefit from and are impacted by the wealth of information on the internet.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 23 | Ransomware Rundown with Dan Lohrmann</title><itunes:title>401 Access Denied Ep. 23 | Ransomware Rundown with Dan Lohrmann</itunes:title><description><![CDATA[<p>Ransomware attacks have exploded in frequency and severity in recent months. Joe and Mike are joined by guest Dan Lohrmann, currently Chief Strategist &amp; CSO at Security Mentor, and formerly of the NSA, Lockheed Martin, and CISO for State of Michigan. Discussion revolves around concrete steps we can all take today to reduce attacks, minimize damage, and decide if cyber insurance is really worth it.&nbsp;</p><p>Resources:&nbsp;</p><p><a href="https://www.nomoreransom.org/" rel="noopener noreferrer" target="_blank">https://www.nomoreransom.org/</a>&nbsp;</p><p><br></p><p><a href="https://csrc.nist.gov/" rel="noopener noreferrer" target="_blank">https://csrc.nist.gov/</a></p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Ransomware attacks have exploded in frequency and severity in recent months. Joe and Mike are joined by guest Dan Lohrmann, currently Chief Strategist &amp; CSO at Security Mentor, and formerly of the NSA, Lockheed Martin, and CISO for State of Michigan. Discussion revolves around concrete steps we can all take today to reduce attacks, minimize damage, and decide if cyber insurance is really worth it.&nbsp;</p><p>Resources:&nbsp;</p><p><a href="https://www.nomoreransom.org/" rel="noopener noreferrer" target="_blank">https://www.nomoreransom.org/</a>&nbsp;</p><p><br></p><p><a href="https://csrc.nist.gov/" rel="noopener noreferrer" target="_blank">https://csrc.nist.gov/</a></p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">f9066234-0fc9-41fc-96f9-5055f244b763</guid><itunes:image href="https://artwork.captivate.fm/16fe8bd4-85f9-44bb-97ad-4fbbd90cbfa4/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 10 Mar 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/dbceb80d-65a1-45ab-9ca9-0f726274cb41/audio-149495-13106-29857-e98907c9-c3c5-4a0a-b7f6-7d85bd647f1c.mp3" length="58475700" type="audio/mpeg"/><itunes:duration>01:00:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><itunes:summary>Ransomware attacks have exploded in frequency and severity in recent months. Joe and Mike are joined by guest Dan Lohrmann, currently Chief Strategist &amp; CSO at Security Mentor, and formerly of the NSA, Lockheed Martin, and CISO for State of Michigan. Discussion revolves around concrete steps we can all take today to reduce attacks, minimize damage, and decide if cyber insurance is really worth it.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep.1 Finding Your Ah-Ha Moment | Go For It with Sarah Moffat</title><itunes:title>Ep.1 Finding Your Ah-Ha Moment | Go For It with Sarah Moffat</itunes:title><description><![CDATA[<p>Welcome to the first episode of Go For It with Sarah Moffat, and happy International Women’s Day! We’re exited to introduce Sarah, the President and Founder of LeadingLadies.co, as she shares her story and inspiration to go for it, every day. From her part-time work through high school and college, to the experiences that taught her how to run operations for large businesses, Sarah shares how she discovered her Ah-Ha moment and how people can find theirs.</p> <p>If you have a topic you’d like Sarah to discuss, email us at podcast@cybrary.it</p>]]></description><content:encoded><![CDATA[<p>Welcome to the first episode of Go For It with Sarah Moffat, and happy International Women’s Day! We’re exited to introduce Sarah, the President and Founder of LeadingLadies.co, as she shares her story and inspiration to go for it, every day. From her part-time work through high school and college, to the experiences that taught her how to run operations for large businesses, Sarah shares how she discovered her Ah-Ha moment and how people can find theirs.</p> <p>If you have a topic you’d like Sarah to discuss, email us at podcast@cybrary.it</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">895f0e07-c19f-4921-9f26-58d2a9cfc078</guid><itunes:image href="https://artwork.captivate.fm/0ba532eb-fadb-4f5d-892f-2d95666689fb/go-for-it-v7-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Mon, 08 Mar 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/58aea747-be41-4315-add2-283b11b467cb/audio-149496-13106-29857-ecba9cf6-6015-4ed5-adc6-95ea3e91eaad.mp3" length="24976176" type="audio/mpeg"/><itunes:duration>26:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome to the first episode of Go For It with Sarah Moffat, and happy International Women’s Day! We’re exited to introduce Sarah, the President and Founder of LeadingLadies.co, as she shares her story and inspiration to go for it, every day. From her part-time work through high school and college, to the experiences that taught her how to run operations for large businesses, Sarah shares how she discovered her Ah-Ha moment and how people can find theirs.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>How Project Managers Get SaaSy with Clubhouse | The Cybrary Podcast Ep. 55</title><itunes:title>How Project Managers Get SaaSy with Clubhouse | The Cybrary Podcast Ep. 55</itunes:title><description><![CDATA[<p>Calling all engineers! This week on the Cybrary Podcast, we welcome Zachary Ozer from ClubHouse. From one VP of Engineering to another, Mike and Zach talk all things development, product planning, and how to help junior and senior engineers be more effective and enjoy their jobs. Zach also offers key insights into how people at ClubHouse further their initiatives and how to parse through and implement customer feedback into product development.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Calling all engineers! This week on the Cybrary Podcast, we welcome Zachary Ozer from ClubHouse. From one VP of Engineering to another, Mike and Zach talk all things development, product planning, and how to help junior and senior engineers be more effective and enjoy their jobs. Zach also offers key insights into how people at ClubHouse further their initiatives and how to parse through and implement customer feedback into product development.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">c83b1456-4f73-4935-b579-85f7b3daa275</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 03 Mar 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4327fb56-0bf2-457d-9441-8c890394b44e/audio-149497-13106-29857-bbfc3945-ef16-4e0e-b031-158db3ce6a5d.mp3" length="29145107" type="audio/mpeg"/><itunes:duration>30:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Calling all engineers! This week on the Cybrary Podcast, we welcome Zachary Ozer from ClubHouse. From one VP of Engineering to another, Mike and Zach talk all things development, product planning, and how to help junior and senior engineers be more effective and enjoy their jobs. Zach also offers key insights into how people at ClubHouse further their initiatives and how to parse through and implement customer feedback into product development.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>The Future of Password Security | The Cybrary Podcast Ep. 54</title><itunes:title>The Future of Password Security | The Cybrary Podcast Ep. 54</itunes:title><description><![CDATA[<p>Joining the Cybrary Podcast this week is Jeff Capone, CEO &amp; Co-founder of SecureCircle. In this episode, Jeff, Mike and Jonathan discuss zero-trust policies, why people use encryption, and what it would mean for data access, privacy, and security if we could make the need for passwords obsolete.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Joining the Cybrary Podcast this week is Jeff Capone, CEO &amp; Co-founder of SecureCircle. In this episode, Jeff, Mike and Jonathan discuss zero-trust policies, why people use encryption, and what it would mean for data access, privacy, and security if we could make the need for passwords obsolete.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">9804159a-20a4-47f0-b392-d36291f1d2ff</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 24 Feb 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/11ca925c-9d37-4017-acaa-2fd3cfdf467c/audio-149499-13106-29857-9758d36a-e5b1-46ba-a575-a94e81355094.mp3" length="50534648" type="audio/mpeg"/><itunes:duration>52:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Joining the Cybrary Podcast this week is Jeff Capone, CEO &amp; Co-founder of SecureCircle. In this episode, Jeff, Mike and Jonathan discuss zero-trust policies, why people use encryption, and what it would mean for data access, privacy, and security if we could make the need for passwords obsolete.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 22 | Responsible Disclosure Programs with Katie Moussouris &amp; Casey Ellis</title><itunes:title>401 Access Denied Ep. 22 | Responsible Disclosure Programs with Katie Moussouris &amp; Casey Ellis</itunes:title><description><![CDATA[<p>Casey Ellis, Founder &amp; CTO of Bugcrowd and Katie Moussouris, Founder &amp; CEO of Luta Security discuss vulnerability disclosure programs with Mike and Joe today. Developing a disclosure program can be so complex that many organizations don’t create one at all. So we asked - what processes should companies put in place to be sure they provide vulnerability information safely and in a usable way? Our guests today share the best practice steps that companies should take to prepare.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Casey Ellis, Founder &amp; CTO of Bugcrowd and Katie Moussouris, Founder &amp; CEO of Luta Security discuss vulnerability disclosure programs with Mike and Joe today. Developing a disclosure program can be so complex that many organizations don’t create one at all. So we asked - what processes should companies put in place to be sure they provide vulnerability information safely and in a usable way? Our guests today share the best practice steps that companies should take to prepare.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">8e247530-c8fe-46ca-844d-0623f717b4de</guid><itunes:image href="https://artwork.captivate.fm/dc3f5b6f-3f66-4d3c-9053-546eacaf3433/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 24 Feb 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3332e6e-ba03-48b3-a8da-e5bad99ea0ae/audio-149498-13106-29857-fd4c6625-0d17-46d7-8773-0e3410ac6a85.mp3" length="80080445" type="audio/mpeg"/><itunes:duration>01:23:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><itunes:summary>Casey Ellis, Founder &amp; CTO of Bugcrowd and Katie Moussouris, Founder &amp; CEO of Luta Security discuss vulnerability disclosure programs with Mike and Joe today.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Lies You&apos;ve Been Sold About Encryption | The Cybrary Podcast Ep. 53</title><itunes:title>Lies You&apos;ve Been Sold About Encryption | The Cybrary Podcast Ep. 53</itunes:title><description><![CDATA[<p>“Protecting data wherever it lives” is at the forefront of the long debated question: Is your data secure? The apps you use, the websites you visit, the Zoom calls you're on - there is so much personal and business information availble, but who makes the decisions about data handling and security? Jonathan and Mike welcome Patrick Walsh, CEO of IronCore Labs, to discuss transparent data encryption, data access and privacy, security in-depth, and how companies today are facing these challenges.&nbsp;</p>
<p>View more episodes about encryption:&nbsp;</p>
<p>Ep. 24 | Encrption &amp; Backdoors part 1 -<a href="https://youtu.be/5t4ZBQ9bGfg" target="_self">https://youtu.be/5t4ZBQ9bGfg</a>&nbsp;</p>
<p>Ep. 25 | Encrption &amp; Backdoors part 2 - <a href="https://youtu.be/T0csMZBdNsM" target="_self">https://youtu.be/T0csMZBdNsM</a> Learn more about IronCore Labs here: <a href="https://ironcorelabs.com/" target="_self">https://ironcorelabs.com</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>“Protecting data wherever it lives” is at the forefront of the long debated question: Is your data secure? The apps you use, the websites you visit, the Zoom calls you're on - there is so much personal and business information availble, but who makes the decisions about data handling and security? Jonathan and Mike welcome Patrick Walsh, CEO of IronCore Labs, to discuss transparent data encryption, data access and privacy, security in-depth, and how companies today are facing these challenges.&nbsp;</p>
<p>View more episodes about encryption:&nbsp;</p>
<p>Ep. 24 | Encrption &amp; Backdoors part 1 -<a href="https://youtu.be/5t4ZBQ9bGfg" target="_self">https://youtu.be/5t4ZBQ9bGfg</a>&nbsp;</p>
<p>Ep. 25 | Encrption &amp; Backdoors part 2 - <a href="https://youtu.be/T0csMZBdNsM" target="_self">https://youtu.be/T0csMZBdNsM</a> Learn more about IronCore Labs here: <a href="https://ironcorelabs.com/" target="_self">https://ironcorelabs.com</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">972e9bd0-430e-4bfd-91b4-2b6a14adf003</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 17 Feb 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/34f61de2-2252-4f47-9cd1-220536d223aa/audio-149500-13106-29857-9e4d1c90-f59b-4cb2-9208-6590cf9d00fa.mp3" length="55756490" type="audio/mpeg"/><itunes:duration>58:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>“Protecting data wherever it lives” is at the forefront of the long debated question: Is your data secure? The apps you use, the websites you visit, the Zoom calls you&apos;re on - there is so much personal and business information availble, but who makes the decisions about data handling and security? Jonathan and Mike welcome Patrick Walsh, CEO of IronCore Labs, to discuss transparent data encryption, data access and privacy, security in-depth, and how companies today are facing these challenges. 
View more episodes about encryption: 
Ep. 24 | Encrption &amp; Backdoors part 1 -https://youtu.be/5t4ZBQ9bGfg 
Ep. 25 | Encrption &amp; Backdoors part 2 - https://youtu.be/T0csMZBdNsM Learn more about IronCore Labs here: https://ironcorelabs.com
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Funding: The VC’s Perspective &amp; The Entrepreneur’s Dilemma | The Cybrary Podcast Ep. 52</title><itunes:title>Funding: The VC’s Perspective &amp; The Entrepreneur’s Dilemma| The Cybrary Podcast Ep. 52</itunes:title><description><![CDATA[<p>Have you wondered what’s involved in venture capital fund raising? In this episode of the Cybrary Podcast, we welcome Les Craig, Co-founder of RedOwl Analytics and current Partner at Next Frontier Capital. From their years of experience in Cybersecurity, Les, Mike, and Jonathan talk about the successes and pitfalls of starting businesses, what founders should understand about venture capital firms when seeking funding, and the importance of building connections and forming trusted relationships.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Have you wondered what’s involved in venture capital fund raising? In this episode of the Cybrary Podcast, we welcome Les Craig, Co-founder of RedOwl Analytics and current Partner at Next Frontier Capital. From their years of experience in Cybersecurity, Les, Mike, and Jonathan talk about the successes and pitfalls of starting businesses, what founders should understand about venture capital firms when seeking funding, and the importance of building connections and forming trusted relationships.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">e8c97bc3-9993-4f5e-92f5-3f58ce7edbe0</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 10 Feb 2021 14:33:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a319b268-f2de-412b-838f-b0f64608d079/audio-149501-13106-29857-6dc7c0ae-dee4-413e-b299-0dfc9dba55e3.mp3" length="60018833" type="audio/mpeg"/><itunes:duration>01:02:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Have you wondered what’s involved in venture capital fund raising? In this episode of the Cybrary Podcast, we welcome Les Craig, Co-founder of RedOwl Analytics and current Partner at Next Frontier Capital. From their years of experience in Cybersecurity, Les, Mike, and Jonathan talk about the successes and pitfalls of starting businesses, what founders should understand about venture capital firms when seeking funding, and the importance of building connections and forming trusted relationships.

Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 21 | How Cyber Criminals Exploit Human Behavior</title><itunes:title>401 Access Denied Ep. 21 | How Cyber Criminals Exploit Human Behavior</itunes:title><description><![CDATA[<p>Joe and Mike talk to Jessica Barker, Co-CEO of Cygenta and author of Confident Cyber Security and the recently released Cybersecurity ABC’s. Jessica breaks down the psychology behind cyber criminals and why we frequently blame the employees on the front lines of attacks. Plus, why companies need to stop telling employees to be constantly alert. Get a copy of Confident Cyber Security here: <a href="https://www.amazon.com/Confident-Cyber-Security-Started-Futureproof/dp/1789663407" rel="noopener noreferrer" target="_blank"> https://www.amazon.com/Confident-Cyber-Security-Started-Futureproof/dp/1789663407</a></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Joe and Mike talk to Jessica Barker, Co-CEO of Cygenta and author of Confident Cyber Security and the recently released Cybersecurity ABC’s. Jessica breaks down the psychology behind cyber criminals and why we frequently blame the employees on the front lines of attacks. Plus, why companies need to stop telling employees to be constantly alert. Get a copy of Confident Cyber Security here: <a href="https://www.amazon.com/Confident-Cyber-Security-Started-Futureproof/dp/1789663407" rel="noopener noreferrer" target="_blank"> https://www.amazon.com/Confident-Cyber-Security-Started-Futureproof/dp/1789663407</a></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">a239e77f-0051-4909-8669-68c4603ee297</guid><itunes:image href="https://artwork.captivate.fm/58d43a3c-f1ad-476d-b3f4-cd6d11a6dbd1/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 10 Feb 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6463a69-903e-433c-bbae-5e5f86a010db/audio-149502-13106-29857-c54cb0f9-baec-4d37-99fd-43799f771d49.mp3" length="47456025" type="audio/mpeg"/><itunes:duration>49:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><itunes:summary>Joe and Mike talk to Jessica Barker, Co-CEO of Cygenta and author of Confident Cyber Security and the recently released Cybersecurity ABC’s. Jessica breaks down the psychology behind cyber criminals and why we frequently blame the employees on the front lines of attacks. Plus, why companies need to stop telling employees to be constantly alert. Get a copy of Confident Cyber Security here: https://www.amazon.com/Confident-Cyber-Security-Started-Futureproof/dp/1789663407</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Developing Engineers from the Ground Up | The Cybrary Podcast Ep. 51</title><itunes:title>Developing Engineers from the Ground Up | The Cybrary Podcast Ep. 51</itunes:title><description><![CDATA[<p>This week on the Cybrary Podcast, we welcome Caleb Woods. Caleb is the CEO of Rolemodel Software, a company specializing in building internal tools for their customers. Speaking with Mike Gruen and Thomas Horlacher from Cybrary, Caleb discusses the work his company is doing as well as their Craftsmanship Academy, a way for those new to the engineering space to apply their skills and learn on the job skills through hands on development training and real world projects.&nbsp;</p>
<p>You can learn more about the Craftsmanship Academy by going to their site <a href="https://www.craftsmanshipacademy.com/" target="_self">https://www.craftsmanshipacademy.com/</a> They are accepting applications now through the end of February 2021.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>This week on the Cybrary Podcast, we welcome Caleb Woods. Caleb is the CEO of Rolemodel Software, a company specializing in building internal tools for their customers. Speaking with Mike Gruen and Thomas Horlacher from Cybrary, Caleb discusses the work his company is doing as well as their Craftsmanship Academy, a way for those new to the engineering space to apply their skills and learn on the job skills through hands on development training and real world projects.&nbsp;</p>
<p>You can learn more about the Craftsmanship Academy by going to their site <a href="https://www.craftsmanshipacademy.com/" target="_self">https://www.craftsmanshipacademy.com/</a> They are accepting applications now through the end of February 2021.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">54a0070c-64e9-448d-ad23-1bc2cbd5f198</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 03 Feb 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/34e40fdf-124d-4b96-b3a4-0171052198f3/audio-149503-13106-29857-6e16a88b-b5bd-43e3-b948-32fc527100a3.mp3" length="35197701" type="audio/mpeg"/><itunes:duration>36:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week on the Cybrary Podcast, we welcome Caleb Woods. Caleb is the CEO of Rolemodel Software, a company specializing in building internal tools for their customers. Speaking with Mike Gruen and Thomas Horlacher from Cybrary, Caleb discusses the work his company is doing as well as their Craftsmanship Academy, a way for those new to the engineering space to apply their skills and learn on the job skills through hands on development training and real world projects. 
You can learn more about the Craftsmanship Academy by going to their site https://www.craftsmanshipacademy.com/ They are accepting applications now through the end of February 2021.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Who Owns Your Data? | The Cybrary Podcast Ep. 50</title><itunes:title>Who Owns Your Data? | The Cybrary Podcast Ep. 50</itunes:title><description><![CDATA[<p>It’s episode 50 of The Cybrary Podcast and we’re talking about Ransomeware! What is it, where does it come from, and how do you prevent an attack? Greg Edwards, CEO and Founder of CryptoStopper, goes in depth into his experiences in the MSP space and how ransomware attacks served as the catalyst to starting his own company. Plus, hear Mike and Jonathan’s views on Advanced Persistent Threats and the importance of patch management in the cloud and on prim.&nbsp;</p>
<p>Interested in detecting and stopping ransomware? Check out Greg's company, CryptoStopper to learn more: <a href="https://www.getcryptostopper.com/" target="_blank">https://www.getcryptostopper.com/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>It’s episode 50 of The Cybrary Podcast and we’re talking about Ransomeware! What is it, where does it come from, and how do you prevent an attack? Greg Edwards, CEO and Founder of CryptoStopper, goes in depth into his experiences in the MSP space and how ransomware attacks served as the catalyst to starting his own company. Plus, hear Mike and Jonathan’s views on Advanced Persistent Threats and the importance of patch management in the cloud and on prim.&nbsp;</p>
<p>Interested in detecting and stopping ransomware? Check out Greg's company, CryptoStopper to learn more: <a href="https://www.getcryptostopper.com/" target="_blank">https://www.getcryptostopper.com/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">890f1ad8-6800-4b46-82c9-9b77c61409cb</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 27 Jan 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7d1394d8-7279-420f-98ea-828fd22e9f9a/audio-149505-13106-29857-1244f9ed-560a-4f85-a3b8-84fa8bf6c77a.mp3" length="39930065" type="audio/mpeg"/><itunes:duration>41:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn 


Interested in detecting and stopping ransomware? Check out CryptoStopper to learn more: https://www.getcryptostopper.com/</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 20 | The Latest from the SolarWinds Sunburst Breach</title><itunes:title>401 Access Denied Ep. 20 | The Latest from the SolarWinds Sunburst Breach</itunes:title><description><![CDATA[<p>The 401 Access Denied team discusses the latest findings from the recent Sunburst supply chain attack that targeted thousands of SolarWinds customers – quite possibly the largest supply chain attack in history. We cover what’s been learned from the investigation so far and how we can apply those lessons to prevent being victims of future attacks. Joe and Mike are joined by Terence Jackson, CISO at Thycotic and Jonathan Meyers, Principal Infrastructure Engineer and Head of IT at Cybrary.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>The 401 Access Denied team discusses the latest findings from the recent Sunburst supply chain attack that targeted thousands of SolarWinds customers – quite possibly the largest supply chain attack in history. We cover what’s been learned from the investigation so far and how we can apply those lessons to prevent being victims of future attacks. Joe and Mike are joined by Terence Jackson, CISO at Thycotic and Jonathan Meyers, Principal Infrastructure Engineer and Head of IT at Cybrary.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">ec879e4d-c2b5-4aa7-8a57-5f579f7a5722</guid><itunes:image href="https://artwork.captivate.fm/1ee22faf-a7bb-4915-be06-e0d0312ef168/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 27 Jan 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4a85d8b3-b709-409f-8db1-4f075318a8c7/audio-149504-13106-29857-bef4ce1a-4a59-4ae4-b562-543f0c569c31.mp3" length="71124163" type="audio/mpeg"/><itunes:duration>01:14:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><itunes:summary>The 401 Access Denied team discusses the latest findings from the recent Sunburst supply chain attack that targeted thousands of SolarWinds customers – quite possibly the largest supply chain attack in history. We cover what’s been learned from the investigation so far and how we can apply those lessons to prevent being victims of future attacks. Joe and Mike are joined by Terence Jackson, CISO at Thycotic and Jonathan Meyers, Principal Infrastructure Engineer and Head of IT at Cybrary.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Talent Screening: Invest in the Human Element | The Cybrary Podcast Ep. 49</title><itunes:title>Talent Screening: Invest in the Human Element | The Cybrary Podcast Ep. 49</itunes:title><description><![CDATA[<p>This week we welcome back Chloe Messdaghi, VP of Strategy at Point3 Security, to talk about Point3's new Talent Screening service which creates a more effective and efficient process for evaluating, hiring, and onboarding new employees. In this episode, Chloe shares her experiences in the InfoSec hiring process to reveal common stereotypes preventing applicants from reaching the interview stage, and how organizations can implement an unbiased system for pre-interview screening.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>This week we welcome back Chloe Messdaghi, VP of Strategy at Point3 Security, to talk about Point3's new Talent Screening service which creates a more effective and efficient process for evaluating, hiring, and onboarding new employees. In this episode, Chloe shares her experiences in the InfoSec hiring process to reveal common stereotypes preventing applicants from reaching the interview stage, and how organizations can implement an unbiased system for pre-interview screening.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">70953932-5963-4c2c-96fb-a6788596954f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 20 Jan 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a3276f7c-fbb4-493f-8e03-054ca9233b58/audio-149506-13106-29857-bbb8254a-5c91-4a36-a132-66320192670c.mp3" length="25729063" type="audio/mpeg"/><itunes:duration>26:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week we welcome back Chloe Messdaghi, VP of Strategy at Point3 Security, to talk about Point3&apos;s new Talent Screening service which creates a more effective and efficient process for evaluating, hiring, and onboarding new employees. In this episode, Chloe shares her experiences in the InfoSec hiring process to reveal common stereotypes preventing applicants from reaching the interview stage, and how organizations can implement an unbiased system for pre-interview screening.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 19 | Inside a Russian Troll Farm with Jessikka Aro</title><itunes:title>401 Access Denied Ep. 19 | Inside a Russian Troll Farm with Jessikka Aro</itunes:title><description><![CDATA[<p>In 2014 Jessikka Aro was a journalist reporting on the start of the Russo-Ukrainian War when she became aware of a group of Russian citizens who were being paid to promote pro-Russia propaganda. Jessikka joins us today to discuss the influence trolls had on public opinion, as well as how she outed them and became a victim of the trolls herself. And most importantly, we discuss how the Russian disinformation campaign is still working successfully in 2021 to control the narrative worldwide.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In 2014 Jessikka Aro was a journalist reporting on the start of the Russo-Ukrainian War when she became aware of a group of Russian citizens who were being paid to promote pro-Russia propaganda. Jessikka joins us today to discuss the influence trolls had on public opinion, as well as how she outed them and became a victim of the trolls herself. And most importantly, we discuss how the Russian disinformation campaign is still working successfully in 2021 to control the narrative worldwide.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">639c9f0b-0d7f-4aa6-9457-0d355a8daadc</guid><itunes:image href="https://artwork.captivate.fm/671679e6-015d-4127-a093-95581f29e7d2/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 13 Jan 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/dcbe2607-e8f7-4ed2-ac63-931021a2ba2a/audio-149508-13106-29857-0c88c881-7db1-4f2a-8646-817733be1146.mp3" length="61232403" type="audio/mpeg"/><itunes:duration>01:03:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><itunes:summary>In 2014 Jessikka Aro was a journalist reporting on the start of the Russo-Ukrainian War when she became aware of a group of Russian citizens who were being paid to promote pro-Russia propaganda. Jessikka joins us today to discuss the influence trolls had on public opinion, as well as how she outed them and became a victim of the trolls herself. And most importantly, we discuss how the Russian disinformation campaign is still working successfully in 2021 to control the narrative worldwide.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Hacking by the Rules: Game Changers after Y2K | The Cybrary Podcast Ep. 48</title><itunes:title>Hacking by the Rules: Game Changers after Y2K | The Cybrary Podcast Ep. 48</itunes:title><description><![CDATA[<p>Do better builders make better breakers? Jonathan Meyers, Josh Lospinoso, and Philip Wylie share their views and experiences with the game changers in cybersecurity over the last 20 years, and how it’s helped and hindered people trying to enter the space. In this episode, they cover everything from rapid iteration and continuous learning, to the value of certifications and how to gain the right experience to move forward.&nbsp;</p>
<p>Check out Phil's new book, "The Pentester Blueprint: Starting your Career as an Ethical Hacker" to learn more about your potential as an ethical hacker.</p>
<p></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Do better builders make better breakers? Jonathan Meyers, Josh Lospinoso, and Philip Wylie share their views and experiences with the game changers in cybersecurity over the last 20 years, and how it’s helped and hindered people trying to enter the space. In this episode, they cover everything from rapid iteration and continuous learning, to the value of certifications and how to gain the right experience to move forward.&nbsp;</p>
<p>Check out Phil's new book, "The Pentester Blueprint: Starting your Career as an Ethical Hacker" to learn more about your potential as an ethical hacker.</p>
<p></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">fc777426-aba9-4a1f-8f82-9c5a40ded89e</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 13 Jan 2021 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1417ba74-613b-41e9-a7f1-763db906b8af/audio-149507-13106-29857-6b62fc5f-c3a2-4607-8093-d1f8b7b5d21e.mp3" length="64069951" type="audio/mpeg"/><itunes:duration>01:06:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Do better builders make better breakers? Jonathan Meyers, Josh Lospinoso, and Philip Wylie share their views and experiences with the game changers in cybersecurity over the last 20 years, and how it’s helped and hindered people trying to enter the space. In this episode, they cover everything from rapid iteration and continuous learning, to the value of certifications and how to gain the right experience to move forward. 
Check out Phil&apos;s new book, &quot;The Pentester Blueprint: Starting your Career as an Ethical Hacker&quot; to learn more about your potential as an ethical hacker.

Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn  

Check out Phil&apos;s new book, &quot;The Pentester Blueprint: Starting your Career as an Ethical Hacker&quot; to learn more about your potential as an ethical hacker.</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 18 | Cybersecurity News</title><itunes:title>401 Access Denied Ep. 18 | Cybersecurity News</itunes:title><description><![CDATA[<p>Joe Carson from Thycotic and Mike Gruen from Cybrary share how they stay up-to-date with security news through podcasts, blogs, and events. They plug their favorite experts who give honest and direct news, sometimes even with a touch of comedy.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Joe Carson from Thycotic and Mike Gruen from Cybrary share how they stay up-to-date with security news through podcasts, blogs, and events. They plug their favorite experts who give honest and direct news, sometimes even with a touch of comedy.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">87f13981-5d05-4328-b8cf-315b5547f3b0</guid><itunes:image href="https://artwork.captivate.fm/563d0129-fdcb-4163-b964-3f3d822cb18f/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 30 Dec 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7c1a50d6-3402-4fa4-9a6f-3b683d966774/audio-149509-13106-29857-b6d3a5f0-c4f8-423c-973d-7f97f89a5f28.mp3" length="24469384" type="audio/mpeg"/><itunes:duration>25:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><itunes:summary>Joe Carson from Thycotic and Mike Gruen from Cybrary share how they stay up-to-date with security news through podcasts, blogs, and events. They plug their favorite experts who give honest and direct news, sometimes even with a touch of comedy.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Winter Intermission</title><itunes:title>Winter Intermission</itunes:title><description><![CDATA[<p><span style="font-weight: 400;">Welcome back to the Cybrary Podcast, and Happy Holidays! </span></p> <p><span style="font-weight: 400;">Whether you celebrate Christmas, Hanukkah, Kwanza, or just enjoy the spirit of the season, we hope you are able to take some time off from work and school to celebrate what matters most to you.  </span></p> <p><span style="font-weight: 400;">As 2020 comes to a close, and we look back at the best (</span><em><span style= "font-weight: 400;">and worst</span></em><span style= "font-weight: 400;">) moments of the year, we raise a glass to you and cheers for making it this far. Thank you, for joining us each week to learn something new and share this journey with us. We appreciate your support and look forward to 2021, so stick with us to find out what episodes we have coming in January!</span></p> <p><span style="font-weight: 400;">If you or someone you know would like to be a guest on the Cybrary Podcast, email us at podcast@cybrary.it</span></p> <p><span style="font-weight: 400;">The Cybrary Podcast will return in January 2021 for episode 48, so follow or subscribe to the podcast on your favorite streaming service to be notified when future episodes are available!</span></p> <p><span style="font-weight: 400;">Happy New Year Cybrarians. Cybrary Out.</span></p>]]></description><content:encoded><![CDATA[<p><span style="font-weight: 400;">Welcome back to the Cybrary Podcast, and Happy Holidays! </span></p> <p><span style="font-weight: 400;">Whether you celebrate Christmas, Hanukkah, Kwanza, or just enjoy the spirit of the season, we hope you are able to take some time off from work and school to celebrate what matters most to you.  </span></p> <p><span style="font-weight: 400;">As 2020 comes to a close, and we look back at the best (</span><em><span style= "font-weight: 400;">and worst</span></em><span style= "font-weight: 400;">) moments of the year, we raise a glass to you and cheers for making it this far. Thank you, for joining us each week to learn something new and share this journey with us. We appreciate your support and look forward to 2021, so stick with us to find out what episodes we have coming in January!</span></p> <p><span style="font-weight: 400;">If you or someone you know would like to be a guest on the Cybrary Podcast, email us at podcast@cybrary.it</span></p> <p><span style="font-weight: 400;">The Cybrary Podcast will return in January 2021 for episode 48, so follow or subscribe to the podcast on your favorite streaming service to be notified when future episodes are available!</span></p> <p><span style="font-weight: 400;">Happy New Year Cybrarians. Cybrary Out.</span></p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">eebf629d-d74f-4c19-b508-f6225e26f884</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 23 Dec 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/303148b2-18be-4cc5-a9c3-4e39415e64a3/audio-149510-13106-29857-e3edbbdb-8f73-4584-b894-64d412a5ded5.mp3" length="1107267" type="audio/mpeg"/><itunes:duration>01:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome back to the Cybrary Podcast, and Happy Holidays! 

Whether you celebrate Christmas, Hanukkah, Kwanza, or just enjoy the spirit of the season, we hope you can take some time off from work and school to celebrate what matters most to you. We are looking forward to 2021, so stick with us to find out what episodes we have coming in January!

If you or someone you know would like to be a guest on the Cybrary Podcast, email us at podcast@cybrary.it

Happy New Year Cybrarians. Cybrary Out.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Skills vs. Expectations: Defining the Bias Gap | The Cybrary Podcast Ep. 47</title><itunes:title>Skills vs. Expectations: Defining the Bias Gap | The Cybrary Podcast Ep. 47</itunes:title><description><![CDATA[<p>Mike Skelton, part of BugCrowd's Security Operation Team, joins Cybrary's Mike Gruen to breakdown the expectation and communication gap. Recruiting the right talent is hard enough when factoring in skills and experience, but the top concern according to Skelton is the lack of proper communication and expectation setting. In this episode, Skelton and Gruen deconstruct their experiences on hiring for their teams and being hired, and the critical role communicating your needs plays in setting realistic expectations for companies and prospective applicants.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Mike Skelton, part of BugCrowd's Security Operation Team, joins Cybrary's Mike Gruen to breakdown the expectation and communication gap. Recruiting the right talent is hard enough when factoring in skills and experience, but the top concern according to Skelton is the lack of proper communication and expectation setting. In this episode, Skelton and Gruen deconstruct their experiences on hiring for their teams and being hired, and the critical role communicating your needs plays in setting realistic expectations for companies and prospective applicants.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">0f616656-39be-4de8-91c5-2abab1fe1c4f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 16 Dec 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f0a72b0a-07c3-4c7e-a4fc-795dfabdcf8c/audio-149512-13106-29857-433482bd-0d4a-4383-858b-79615c4b7c0d.mp3" length="40816091" type="audio/mpeg"/><itunes:duration>42:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mike Skelton, part of BugCrowd&apos;s Security Operation Team, joins Cybrary&apos;s Mike Gruen to breakdown the expectation and communication gap. Recruiting the right talent is hard enough when factoring in skills and experience, but the top concern according to Skelton is the lack of proper communication and expectation setting. In this episode, Skelton and Gruen deconstruct their experiences on hiring for their teams and being hired, and the critical role communicating your needs plays in setting realistic expectations for companies and prospective applicants.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 17 | Digital Identities &amp; Government Innovations</title><itunes:title>401 Access Denied Ep. 17 | Digital Identities &amp; Government Innovations</itunes:title><description><![CDATA[<p>Joining us today is the National Cyber Security Policy Director for the Estonian Government, Raul Rikk. Raul shares lessons in how Estonia excels in the digitalization of government services and cyber defense strategies. We’ll discuss the 2007 coordinated Russian cyber-attacks against Estonia - how Estonia not only recovered from an attempt to isolate them from the rest of the world, but went on to develop one of the best emergency cyber defense operations in the world.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Joining us today is the National Cyber Security Policy Director for the Estonian Government, Raul Rikk. Raul shares lessons in how Estonia excels in the digitalization of government services and cyber defense strategies. We’ll discuss the 2007 coordinated Russian cyber-attacks against Estonia - how Estonia not only recovered from an attempt to isolate them from the rest of the world, but went on to develop one of the best emergency cyber defense operations in the world.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">03d669c0-d41e-45d2-9e2f-f68859442262</guid><itunes:image href="https://artwork.captivate.fm/a4ca3f14-4d5f-423c-ae1c-854758d0ec87/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 16 Dec 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/77eee667-436f-4e42-8322-a3281bb8bd98/audio-149511-13106-29857-5139a365-5214-48cf-bd45-e5ac3f242050.mp3" length="57425553" type="audio/mpeg"/><itunes:duration>59:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><itunes:summary>Joining us today is the National Cyber Security Policy Director for the Estonian Government, Raul Rikk. Raul shares lessons in how Estonia excels in the digitalization of government services and cyber defense strategies. We’ll discuss the 2007 coordinated Russian cyber-attacks against Estonia - how Estonia not only recovered from an attempt to isolate them from the rest of the world, but went on to develop one of the best emergency cyber defense operations in the world.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Is Your Right to Privacy Enough? | The Cybrary Podcast Ep. 46</title><itunes:title>Is Your Right to Privacy Enough? | The Cybrary Podcast Ep. 46</itunes:title><description><![CDATA[<p>Rob Shavell, Co-Founder of Abine (https://abine.com/), joins the Cybrary Podcast this week to talk everything PRIVACY. From Abine's products Blur and DeleteMe that specialize in data masking, privacy, and compliance, Rob and Mike talk GDPR, Data usage transparency, the "freemium tradeoffs", internet bifurcation, and so much more. Where do you stand on the topic?</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Rob Shavell, Co-Founder of Abine (https://abine.com/), joins the Cybrary Podcast this week to talk everything PRIVACY. From Abine's products Blur and DeleteMe that specialize in data masking, privacy, and compliance, Rob and Mike talk GDPR, Data usage transparency, the "freemium tradeoffs", internet bifurcation, and so much more. Where do you stand on the topic?</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">8aae0d98-5d88-4ca2-bd91-b5b180dcdc8c</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 09 Dec 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a2d771eb-07b2-4394-a955-81ad7dd1a759/audio-149513-13106-29857-ee99099d-2d23-494b-8571-0a9b967142fc.mp3" length="43254311" type="audio/mpeg"/><itunes:duration>45:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Rob Shavell, Co-Founder of Abine (https://abine.com/), joins the Cybrary Podcast this week to talk everything PRIVACY. From Abine&apos;s products Blur and DeleteMe that specialize in data masking, privacy, and compliance, Rob and Mike talk GDPR, Data usage transparency, the &quot;freemium tradeoffs&quot;, internet bifurcation, and so much more. Where do you stand on the topic?
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Privacy: The Double-edged Sword | The Cybrary Podcast Ep. 45</title><itunes:title>Privacy: The Double-edged Sword | The Cybrary Podcast Ep. 45</itunes:title><description><![CDATA[<p>Everyone likes their privacy, but no one likes dealing with overly-complex security measures. This week we welcome Josh Lospinoso, Co-Founder of Shift5, and Matthew Dunlop, CISO at Under Armour as they shed light on the top growing competitive differentiator among consumers that market giants, like Apple, use to their advantage. Plus, an insider's POV on Operational Technology Hacking.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Everyone likes their privacy, but no one likes dealing with overly-complex security measures. This week we welcome Josh Lospinoso, Co-Founder of Shift5, and Matthew Dunlop, CISO at Under Armour as they shed light on the top growing competitive differentiator among consumers that market giants, like Apple, use to their advantage. Plus, an insider's POV on Operational Technology Hacking.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">031833e4-3316-4b78-90a8-54eeeb714f2c</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 02 Dec 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ad2bf346-567e-4742-ad34-0e2eede0ef4f/audio-149514-13106-29857-761aafa3-8049-4efc-926d-063e1dc4fb9c.mp3" length="66463718" type="audio/mpeg"/><itunes:duration>01:09:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Everyone likes their privacy, but no one likes dealing with overly-complex security measures. This week we welcome Josh Lospinoso, Co-Founder of Shift5, and Matthew Dunlop, CISO at Under Armour as they shed light on the top growing competitive differentiator among consumers that market giants, like Apple, use to their advantage. Plus, an insider&apos;s POV on Operational Technology Hacking.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 16 | Best Practices: Teaching Your Kids to Use Technology Safely</title><itunes:title>401 Access Denied Ep. 16 | Best Practices: Teaching Your Kids to Use Technology Safely</itunes:title><description><![CDATA[<p>Most parents are struggling with where to draw the line with their children when it comes to technology. It’s designed to be addictive, so how do you teach your kids to understand the risks, set boundaries, and enforce them? And how do you make sure they protect their passwords and identities? Joe and Mike share the conversations they’ve had with their own kids and the parental controls they’ve put in place.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Most parents are struggling with where to draw the line with their children when it comes to technology. It’s designed to be addictive, so how do you teach your kids to understand the risks, set boundaries, and enforce them? And how do you make sure they protect their passwords and identities? Joe and Mike share the conversations they’ve had with their own kids and the parental controls they’ve put in place.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">6c77e4d0-c954-491b-887e-95b48edaca81</guid><itunes:image href="https://artwork.captivate.fm/ea5d7888-4755-4165-960d-ae4f8e8a4848/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 02 Dec 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d3c951d2-d8a1-4fd7-b20b-2b838c620a5e/audio-149515-13106-29857-3dd77b66-7394-46be-9856-1b16b3df44fc.mp3" length="45801384" type="audio/mpeg"/><itunes:duration>47:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><itunes:summary>Most parents are struggling with where to draw the line with their children when it comes to technology. It’s designed to be addictive, so how do you teach your kids to understand the risks, set boundaries, and enforce them? And how do you make sure they protect their passwords and identities? Joe and Mike share the conversations they’ve had with their own kids and the parental controls they’ve put in place.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Thanksgiving Intermission | The Cybrary Podcast</title><itunes:title>Thanksgiving Intermission | The Cybrary Podcast</itunes:title><description><![CDATA[<pre class="c-mrkdwn__pre" data-stringify-type="pre"> Time for an intermission! We're taking this week off, but tune in next Wednesday for our next episode featuring Josh Lospinoso from Shift5 and Matthew Dunlop from Under Armour. </pre>]]></description><content:encoded><![CDATA[<pre class="c-mrkdwn__pre" data-stringify-type="pre"> Time for an intermission! We're taking this week off, but tune in next Wednesday for our next episode featuring Josh Lospinoso from Shift5 and Matthew Dunlop from Under Armour. </pre>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">dd81f6ed-cb03-428b-b5ed-69bb4b25ac37</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 25 Nov 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/da1251a9-00ee-40f3-843b-258c178e026f/audio-149516-13106-29857-fc6df2e8-d65d-4859-b29e-f63710d0cb26.mp3" length="1682732" type="audio/mpeg"/><itunes:duration>01:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Time for an intermission! We&apos;re taking this week off, but tune in next Wednesday for our next episode featuring Josh Lospinoso from Shift5 and Matthew Dunlop from Under Armour.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>All Hands on Security: Bridging the DevSecOps Gap | The Cybrary Podcast Ep. 44</title><itunes:title>All Hands on Security: Bridging the DevSecOps Gap | The Cybrary Podcast Ep. 44</itunes:title><description><![CDATA[<p>Security is the name of the game, and Jared Ablon, CEO of HackEDU, is working with his team to bridge the gap between security and engineering. Security is a different type of defect and the better developers are at catching those defects, the better your product, services, developers, and security will be. As Mike Gruen of Cybrary points out, security and operations in an assembly line isn't scalable for organizations that want to grow, but with DevSecOps, having people skilled in areas of security, operations, and development can streamline the process and resources to create an overall better solution.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Security is the name of the game, and Jared Ablon, CEO of HackEDU, is working with his team to bridge the gap between security and engineering. Security is a different type of defect and the better developers are at catching those defects, the better your product, services, developers, and security will be. As Mike Gruen of Cybrary points out, security and operations in an assembly line isn't scalable for organizations that want to grow, but with DevSecOps, having people skilled in areas of security, operations, and development can streamline the process and resources to create an overall better solution.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">90db3a73-7334-46ef-b65f-0fbd1d3ad6b9</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 18 Nov 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0b9e11fb-cd03-4401-9e09-78805c4686bd/audio-149518-13106-29857-e2507523-d31d-4978-943e-da79c74584ba.mp3" length="34264201" type="audio/mpeg"/><itunes:duration>35:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Security is the name of the game, and Jared Ablon, CEO of HackEDU, is working with his team to bridge the gap between security and engineering. Security is a different type of defect and the better developers are at catching those defects, the better your product, services, developers, and security will be. As Mike Gruen of Cybrary points out, security and operations in an assembly line isn&apos;t scalable for organizations that want to grow, but with DevSecOps, having people skilled in areas of security, operations, and development can streamline the process and resources to create an overall better solution.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 15 | AI, ML, and Quantum Computing: Hope or Hype?</title><itunes:title>401 Access Denied Ep. 15 | AI, ML, and Quantum Computing: Hope or Hype?</itunes:title><description><![CDATA[<p>Today, Joe, Mike, and special guest Josh Lospinoso dig into buzzwords like Quantum Computing, Machine Learning and AI. Are they worth all the hype? Should humanity be concerned about the cyber security risks associated with them? Josh is the CEO and co-founder of Shift5, where experts protect OT platforms like planes, trains and tanks against cyber attack.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Today, Joe, Mike, and special guest Josh Lospinoso dig into buzzwords like Quantum Computing, Machine Learning and AI. Are they worth all the hype? Should humanity be concerned about the cyber security risks associated with them? Josh is the CEO and co-founder of Shift5, where experts protect OT platforms like planes, trains and tanks against cyber attack.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">74384d0c-5959-4767-8373-fbb6cb045b95</guid><itunes:image href="https://artwork.captivate.fm/9040d285-f89b-4408-ba89-4fe56a061ea5/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 18 Nov 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1c46d967-177c-4c5f-af69-40eeb11ab5aa/audio-149517-13106-29857-c2e7ab92-62c3-4868-a49d-04dea1e25076.mp3" length="54267151" type="audio/mpeg"/><itunes:duration>56:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><itunes:summary>Today, Joe, Mike, and special guest Josh Lospinoso dig into buzzwords like Quantum Computing, Machine Learning and AI. Are they worth all the hype? Should humanity be concerned about the cyber security risks associated with them? Josh is the CEO and co-founder of Shift5, where experts protect OT platforms like planes, trains and tanks against cyber attack.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>The Millennial&apos;s Guide to Work with Purpose | The Cybrary Podcast Ep. 43</title><itunes:title>The Millennial&apos;s Guide to Work with Purpose | The Cybrary Podcast Ep. 43</itunes:title><description><![CDATA[<p>“Living in your purpose,” as Sarah Moffat says, is a key driver in meeting your goals and being satisfied with what you do. In this episode of the Cybrary Podcast, Sarah from LeadingLadies.co and Thomas Horlacher from Cybrary discuss everything from leadership roles, effective leadership strategy, how to build and lead high-performance teams, and how to do it all while being a woman in male-dominant industries.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>“Living in your purpose,” as Sarah Moffat says, is a key driver in meeting your goals and being satisfied with what you do. In this episode of the Cybrary Podcast, Sarah from LeadingLadies.co and Thomas Horlacher from Cybrary discuss everything from leadership roles, effective leadership strategy, how to build and lead high-performance teams, and how to do it all while being a woman in male-dominant industries.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">bd556a87-320e-488e-a67e-df68df3aa37f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 11 Nov 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/91365bcf-446f-42de-95ae-9cd8cf58422f/audio-149519-13106-29857-a5e6146d-d37f-4998-9a2d-c89375c6da06.mp3" length="41529797" type="audio/mpeg"/><itunes:duration>43:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>“Living in your purpose,” as Sarah Moffat says, is a key driver in meeting your goals and being satisfied with what you do. In this episode of the Cybrary Podcast, Sarah from LeadingLadies.co and Thomas Horlacher from Cybrary discuss everything from leadership roles, effective leadership strategy, how to build and lead high-performance teams, and how to do it all while being a woman in male-dominant industries.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 14 | OT Security: Scientific Sensors</title><itunes:title>401 Access Denied Ep. 14 | OT Security: Scientific Sensors</itunes:title><description><![CDATA[<p>The 401 Access Denied crew from Cybrary and Thycotic are joined today by special guest Steve Jacobs, Systems Architect for a large-scale ecological science program. We discuss data integrity and information security - hot topics for a program that collects over 5 billion ecological sensor readings per day from 81 field sites across the US to provide data to climate change scientists.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>The 401 Access Denied crew from Cybrary and Thycotic are joined today by special guest Steve Jacobs, Systems Architect for a large-scale ecological science program. We discuss data integrity and information security - hot topics for a program that collects over 5 billion ecological sensor readings per day from 81 field sites across the US to provide data to climate change scientists.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">2a67f9b6-84aa-4504-8c13-f86d2253e5ab</guid><itunes:image href="https://artwork.captivate.fm/c2f82f8b-7cf3-4eb6-959f-c133f208f11c/401-podcast-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 04 Nov 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ea0b0f6-79ef-476e-a3d0-82d5c3ad79b8/audio-149521-13106-29857-73281b05-d608-450b-be21-7a168e0b17a0.mp3" length="56308474" type="audio/mpeg"/><itunes:duration>58:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><itunes:summary>The 401 Access Denied crew from Cybrary and Thycotic are joined today by special guest Steve Jacobs, Systems Architect for a large-scale ecological science program. We discuss data integrity and information security - hot topics for a program that collects over 5 billion ecological sensor readings per day from 81 field sites across the US to provide data to climate change scientists.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>The Monolith Formerly Known As Cyber | The Cybrary Podcast Ep. 42</title><itunes:title>The Monolith Formerly Known As Cyber | The Cybrary Podcast Ep. 42</itunes:title><description><![CDATA[<p>The word "cyber" is a vague and misunderstood term for many people. Cyndi Gula, Managing Director and Co-Founder at Gula Tech Adventures, explains why there's a critical disconnect in people's understanding of what cyber means and how it actively impacts them every day. In this episode of The Cybrary Podcast, Cyndi, Jonathan, and Thomas dig deeper into what cyber really means to the individual, how to make cybersecurity more personal and relatable, and how renaming "cybersecurity" to "data care" could have a positive impact on future generations.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>The word "cyber" is a vague and misunderstood term for many people. Cyndi Gula, Managing Director and Co-Founder at Gula Tech Adventures, explains why there's a critical disconnect in people's understanding of what cyber means and how it actively impacts them every day. In this episode of The Cybrary Podcast, Cyndi, Jonathan, and Thomas dig deeper into what cyber really means to the individual, how to make cybersecurity more personal and relatable, and how renaming "cybersecurity" to "data care" could have a positive impact on future generations.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">b2fcfb7a-cc23-4c8f-8a15-15ca26124449</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 04 Nov 2020 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/79a74da5-8557-4931-ae80-b94667a8394d/audio-149520-13106-29857-926c27d6-84ab-4c7c-a013-49b651cb9da1.mp3" length="63416699" type="audio/mpeg"/><itunes:duration>01:06:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>The word &quot;cyber&quot; is a vague and misunderstood term for many people. Cyndi Gula, Managing Director and Co-Founder at Gula Tech Adventures, explains why there&apos;s a critical disconnect in people&apos;s understanding of what cyber means and how it actively impacts them every day. In this episode of The Cybrary Podcast, Cyndi, Jonathan, and Thomas dig deeper into what cyber really means to the individual, how to make cybersecurity more personal and relatable, and how renaming &quot;cybersecurity&quot; to &quot;data care&quot; could have a positive impact on future generations.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Successful Scaling with Multi-Cloud | The Cybrary Podcast Ep. 41</title><itunes:title>Successful Scaling with Multi-Cloud | The Cybrary Podcast Ep. 41</itunes:title><description><![CDATA[<p>The Cloud is a popular topic across Cybersecurity and IT teams, but many companies still struggle with understanding the full power, implication and impact that moving to a multi-cloud or hybrid-cloud environment can have. As a pioneer in the Cloud Governance space, Cloudtamer.io Co-Founders Brian Price and Joseph Spurrier join the Cybrary Podcast to dive into best practices and common pitfalls of moving to a cloud provider or switching cloud vendors.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>The Cloud is a popular topic across Cybersecurity and IT teams, but many companies still struggle with understanding the full power, implication and impact that moving to a multi-cloud or hybrid-cloud environment can have. As a pioneer in the Cloud Governance space, Cloudtamer.io Co-Founders Brian Price and Joseph Spurrier join the Cybrary Podcast to dive into best practices and common pitfalls of moving to a cloud provider or switching cloud vendors.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">126a7756-2a24-485e-a7b3-6f8a58dcc0b8</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 28 Oct 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/22684f38-4dc2-486c-bcdf-c17dd02f0900/audio-149522-13106-29857-a089ba6c-e220-4d04-8b83-7dfb5d66ccad.mp3" length="47882417" type="audio/mpeg"/><itunes:duration>49:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>The Cloud is a popular topic across Cybersecurity and IT teams, but many companies still struggle with understanding the full power, implication and impact that moving to a multi-cloud or hybrid-cloud environment can have. As a pioneer in the Cloud Governance space, Cloudtamer.io Co-Founders Brian Price and Joseph Spurrier join the Cybrary Podcast to dive into best practices and common pitfalls of moving to a cloud provider or switching cloud vendors.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 13 | OT Security: Transportation with Shift5</title><itunes:title>401 Access Denied Ep. 13 | OT Security: Transportation with Shift5</itunes:title><description><![CDATA[<p>We continue delving into the topic of OT Security with special guest Josh Lospinoso, CEO and co-founder of Shift5. Shift5 experts protect OT platforms like planes, trains and tanks against cyber-attack. As former US Army cyber officer, Lospinoso wrote dozens of infosec tools, and built and taught the C++ course that US Cyber Command uses to teach its junior developers. We are excited to welcome him to the 401 Access Denied podcast to dive further into OT Security surrounding transportation.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>We continue delving into the topic of OT Security with special guest Josh Lospinoso, CEO and co-founder of Shift5. Shift5 experts protect OT platforms like planes, trains and tanks against cyber-attack. As former US Army cyber officer, Lospinoso wrote dozens of infosec tools, and built and taught the C++ course that US Cyber Command uses to teach its junior developers. We are excited to welcome him to the 401 Access Denied podcast to dive further into OT Security surrounding transportation.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">bb16ea1f-6cba-4f74-a411-e13f9d691873</guid><itunes:image href="https://artwork.captivate.fm/7bb44253-be4c-4323-a933-5f6342291a5c/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 21 Oct 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f36d837a-46c4-4caa-92e1-bd4ab9765e3d/audio-149524-13106-29857-aaea4791-a3cd-4032-998a-4f358c1c7b3a.mp3" length="52229058" type="audio/mpeg"/><itunes:duration>54:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><itunes:summary>We continue delving into the topic of OT Security with special guest Josh Lospinoso, CEO and co-founder of Shift5. Shift5 experts protect OT platforms like planes, trains and tanks against cyber-attack. As former US Army cyber officer, Lospinoso wrote dozens of infosec tools, and built and taught the C++ course that US Cyber Command uses to teach its junior developers. We are excited to welcome him to the 401 Access Denied podcast to dive further into OT Security surrounding transportation.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>21st-Century Digital Warfare | The Cybrary Podcast Ep. 40</title><itunes:title>21st-Century Digital Warfare | The Cybrary Podcast Ep. 40</itunes:title><description><![CDATA[<p>Today's guest, Karen Gibson, Retired US Army Intelligence Officer knows that "to be a digital warrior means a commitment to continual lifetime training." Throughout her 33 years of military service she learned that building trust and a culture centered around offensive and defensive measures is critical to bridging the gap between Military Ops and Civilian Cyber Defenses in an increasingly digital environment.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Today's guest, Karen Gibson, Retired US Army Intelligence Officer knows that "to be a digital warrior means a commitment to continual lifetime training." Throughout her 33 years of military service she learned that building trust and a culture centered around offensive and defensive measures is critical to bridging the gap between Military Ops and Civilian Cyber Defenses in an increasingly digital environment.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">651bba3e-dfa0-484d-ab18-30b2c5548189</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 21 Oct 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cce4fa14-29f5-4b1d-82f4-3f29e15cad87/audio-149523-13106-29857-ef6ce843-d167-49ff-9ba2-01944ab1f7e7.mp3" length="29388860" type="audio/mpeg"/><itunes:duration>30:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Today&apos;s guest, Karen Gibson, Retired US Army Intelligence Officer knows that &quot;to be a digital warrior means a commitment to continual lifetime training.&quot; Throughout her 33 years of military service she learned that building trust and a culture centered around offensive and defensive measures is critical to bridging the gap between Military Ops and Civilian Cyber Defenses in an increasingly digital environment.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>The Open Source Workforce | The Cybrary Podcast Ep. 39</title><itunes:title>The Open Source Workforce | The Cybrary Podcast Ep. 39</itunes:title><description><![CDATA[<p>Throughout the episode, Gerald, Mike, and Jonathan talk about scaling up services for SaaS products, the importance of doubling-down on security awareness and engagement with a completely remote workforce, and experiences working off hours around the world for 24/7 monitored work roles.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Throughout the episode, Gerald, Mike, and Jonathan talk about scaling up services for SaaS products, the importance of doubling-down on security awareness and engagement with a completely remote workforce, and experiences working off hours around the world for 24/7 monitored work roles.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">b45c9363-70c1-4460-9070-6e2775c7ece8</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 14 Oct 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2cf21288-efaa-4dcb-9594-4c151cb58049/audio-149525-13106-29857-a76f52cb-c7de-4208-92c5-48dd3dc4a09f.mp3" length="48531871" type="audio/mpeg"/><itunes:duration>50:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Throughout the episode, Gerald, Mike, and Jonathan talk about scaling up services for SaaS products, the importance of doubling-down on security awareness and engagement with a completely remote workforce, and experiences working off hours around the world for 24/7 monitored work roles.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 12 | OT Security: Introduction to OT Security with Chris Kubecka</title><itunes:title>401 Access Denied Ep. 12 | OT Security: Introduction to OT Security with Chris Kubecka</itunes:title><description><![CDATA[<p>In this episode of the 401 Access Denied Podcast, Thycotic and Cybrary welcome special guest Chris Kubecka, the Founder and CEO of HypaSec, to talk about OT Security: what is it, why is it important, and what are the risks? Kubecka will share stories from her exploits in international cyber warfare incident management and what devices in our homes fall short on security.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the 401 Access Denied Podcast, Thycotic and Cybrary welcome special guest Chris Kubecka, the Founder and CEO of HypaSec, to talk about OT Security: what is it, why is it important, and what are the risks? Kubecka will share stories from her exploits in international cyber warfare incident management and what devices in our homes fall short on security.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">06278948-a189-469d-9895-a89b3030a7c1</guid><itunes:image href="https://artwork.captivate.fm/88b416a6-4033-4f3b-adea-1f9721d3d7f1/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 07 Oct 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/211ebca7-f2a8-459f-aafc-1d9a8ef7cc10/audio-149527-13106-29857-34da4b38-e6d0-4c16-abaf-7321661a4831.mp3" length="56576617" type="audio/mpeg"/><itunes:duration>58:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><itunes:summary>In this episode of the 401 Access Denied Podcast, Thycotic and Cybrary welcome special guest Chris Kubecka, the Founder and CEO of HypaSec, to talk about OT Security: what is it, why is it important, and what are the risks? Kubecka will share stories from her exploits in international cyber warfare incident management and what devices in our homes fall short on security.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>How Smartphone Tech Put Xmode on the Map | The Cybrary Podcast Ep. 38</title><itunes:title>How Smartphone Tech Put Xmode on the Map | The Cybrary Podcast Ep. 38</itunes:title><description><![CDATA[<p>In this Episode of the Cybrary Podcast, tech startup Xmode reveals their early hurdles and mistakes in understanding the hidden value and risks behind location data collection. Joined by Xmode CEO Josh Anton and Mary Souther, Head of Cybersecurity Sales, Cybrary's Mike Gruen and Jonathan Meyers go back to 2008 in their discussion about Blackberry, Bluetooth technology, and Apple conspiracies. It's all in the name of smart device evolution!&nbsp;</p>
<p>Plus, hear the backstory of Xmode (previously DrunkMode) and what the precipice was for them to pivot from a safety solution for college students, to being "a living map for your life."</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this Episode of the Cybrary Podcast, tech startup Xmode reveals their early hurdles and mistakes in understanding the hidden value and risks behind location data collection. Joined by Xmode CEO Josh Anton and Mary Souther, Head of Cybersecurity Sales, Cybrary's Mike Gruen and Jonathan Meyers go back to 2008 in their discussion about Blackberry, Bluetooth technology, and Apple conspiracies. It's all in the name of smart device evolution!&nbsp;</p>
<p>Plus, hear the backstory of Xmode (previously DrunkMode) and what the precipice was for them to pivot from a safety solution for college students, to being "a living map for your life."</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">0782736a-af6e-4a07-b428-f65cb6b2eb87</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 07 Oct 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e4b71d88-1b90-4739-a712-051142d66239/audio-149526-13106-29857-25515087-77e4-46d9-a755-e518f0213049.mp3" length="54945068" type="audio/mpeg"/><itunes:duration>57:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this Episode of the Cybrary Podcast, tech startup Xmode reveals their early hurdles and mistakes in understanding the hidden value and risks behind location data collection. Joined by Xmode CEO Josh Anton and Mary Souther, Head of Cybersecurity Sales, Cybrary&apos;s Mike Gruen and Jonathan Meyers go back to 2008 in their discussion about Blackberry, Bluetooth technology, and Apple conspiracies. It&apos;s all in the name of smart device evolution! 
Plus, hear the backstory of Xmode (previously DrunkMode) and what the precipice was for them to pivot from a safety solution for college students, to being &quot;a living map for your life.&quot;
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn  

Plus, hear the backstory of Xmode (previously DrunkMode) and how they pivoted from a safety solution for college students to being &quot;a living map for your life.&quot;</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Why Does Additional Security Cost More? | The Cybrary Podcast Ep. 37</title><itunes:title>Why Does Additional Security Cost More? | The Cybrary Podcast Ep. 37</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, they discuss why adding additional security costs more and why its not included.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, they discuss why adding additional security costs more and why its not included.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">4507bdec-d634-4dbb-b8de-e3a61cd11179</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 30 Sep 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ab4014c-a167-4cdc-8272-f9054e5b52d9/audio-149528-13106-29857-2d337296-1f39-49b7-9bdf-c5cf0aa89a42.mp3" length="26808445" type="audio/mpeg"/><itunes:duration>27:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, they discuss why adding additional security costs more and why its not included.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 11 | Favorite Hacker Movies with David Scott Lewis</title><itunes:title>401 Access Denied Ep. 11 | Favorite Hacker Movies with David Scott Lewis</itunes:title><description><![CDATA[<p>Who better to discuss our favorite hacker movies with than David Scott Lewis, inspiration for the iconic film “War Games.”&nbsp;</p><p>Hollywood has a knack for influencing public opinion, and 37 years later, the movie is still credited for shaping society’s impression of hackers. We’ll get the background of the real story behind the movie and discuss the other hacker movies we love to watch over and over.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Who better to discuss our favorite hacker movies with than David Scott Lewis, inspiration for the iconic film “War Games.”&nbsp;</p><p>Hollywood has a knack for influencing public opinion, and 37 years later, the movie is still credited for shaping society’s impression of hackers. We’ll get the background of the real story behind the movie and discuss the other hacker movies we love to watch over and over.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">fbc7f100-655b-472f-a593-18d103922d24</guid><itunes:image href="https://artwork.captivate.fm/48963208-db6f-4cd7-a4d0-cf20233b8cd0/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 23 Sep 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cc1e3b88-fd99-4a14-bc03-143d3eeccd1a/audio-149531-13106-29857-2a6b6108-dd03-40d9-8359-781e4d033e1c.mp3" length="59824282" type="audio/mpeg"/><itunes:duration>01:02:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><itunes:summary>Who better to discuss our favorite hacker movies with than David Scott Lewis, inspiration for the iconic film “War Games.”

Hollywood has a knack for influencing public opinion, and 37 years later, the movie is still credited for shaping society’s impression of hackers. We’ll get the background of the real story behind the movie and discuss the other hacker movies we love to watch over and over.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>The Cybersecurity Skills Gap: Finding the Unicorn | Cybrary Limited Series</title><itunes:title>The Cybersecurity Skills Gap: Finding the Unicorn | Cybrary Limited Series</itunes:title><description><![CDATA[<p>How do you get the job you want in an efficient way? Renee Small (Cybersecurity Recruiter), Will Carlson (Director of Content Ops at Cybrary), Jon Brickey (SVP of Cybersecurity at Mastercard), and Ryan Corey (CEO at Cybrary) talk about one of the most controversial topics in Cybersecurity - breaking into the cybersecurity industry.&nbsp;</p>
<p>In this episode of the Cybrary Podcast, our panelists discuss everything from assessing your skills to why it's near impossible to get hired in cybersecurity despite the millions of open jobs. As current recruiter and co-host of the Breaking into Cybersecurity Podcast, Renee offers a hiring manager and recruiter perspective to why skills are a critical element for professionals today. Plus, Jon Brickey and Will Carlson weigh in on the Skills Gap vs. Talent Gap debate - Are they the same thing, and are there really not enough qualified people to fill all the jobs needed?&nbsp;</p>
<p>From misconceptions and the continuous search for industry "unicorns", this episode uncovers the secrets to why people can't get past the interview process, and what organizations need to do to keep up with the evolution of technology today. Here's a hint, it's based on aptitude and potential..."You can't train someone to be more curious or passionate, but you can develop their technical and soft skills." With technology engrained in everything we do, playing catch up won't sustain this industry. Tune into the discussion and get a copy of data points mentioned throughout the podcast from Cybrary's 2020 Skill Gap Research Report: <a href="https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/" target="_self"> https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>How do you get the job you want in an efficient way? Renee Small (Cybersecurity Recruiter), Will Carlson (Director of Content Ops at Cybrary), Jon Brickey (SVP of Cybersecurity at Mastercard), and Ryan Corey (CEO at Cybrary) talk about one of the most controversial topics in Cybersecurity - breaking into the cybersecurity industry.&nbsp;</p>
<p>In this episode of the Cybrary Podcast, our panelists discuss everything from assessing your skills to why it's near impossible to get hired in cybersecurity despite the millions of open jobs. As current recruiter and co-host of the Breaking into Cybersecurity Podcast, Renee offers a hiring manager and recruiter perspective to why skills are a critical element for professionals today. Plus, Jon Brickey and Will Carlson weigh in on the Skills Gap vs. Talent Gap debate - Are they the same thing, and are there really not enough qualified people to fill all the jobs needed?&nbsp;</p>
<p>From misconceptions and the continuous search for industry "unicorns", this episode uncovers the secrets to why people can't get past the interview process, and what organizations need to do to keep up with the evolution of technology today. Here's a hint, it's based on aptitude and potential..."You can't train someone to be more curious or passionate, but you can develop their technical and soft skills." With technology engrained in everything we do, playing catch up won't sustain this industry. Tune into the discussion and get a copy of data points mentioned throughout the podcast from Cybrary's 2020 Skill Gap Research Report: <a href="https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/" target="_self"> https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">3942019a-e998-44c8-a373-2438e7cd95eb</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 23 Sep 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/32b0f201-c04c-4d52-9f79-ac1de27919bf/audio-149530-13106-29857-b891aa00-1ae0-41da-bf83-b78c3f4f685e.mp3" length="47918970" type="audio/mpeg"/><itunes:duration>49:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>How do you get the job you want in an efficient way? Renee Small (Cybersecurity Recruiter), Will Carlson (Director of Content Ops at Cybrary), Jon Brickey (SVP of Cybersecurity at Mastercard), and Ryan Corey (CEO at Cybrary) talk about one of the most controversial topics in Cybersecurity - breaking into the cybersecurity industry. 
In this episode of the Cybrary Podcast, our panelists discuss everything from assessing your skills to why it&apos;s near impossible to get hired in cybersecurity despite the millions of open jobs. As current recruiter and co-host of the Breaking into Cybersecurity Podcast, Renee offers a hiring manager and recruiter perspective to why skills are a critical element for professionals today. Plus, Jon Brickey and Will Carlson weigh in on the Skills Gap vs. Talent Gap debate - Are they the same thing, and are there really not enough qualified people to fill all the jobs needed? 
From misconceptions and the continuous search for industry &quot;unicorns&quot;, this episode uncovers the secrets to why people can&apos;t get past the interview process, and what organizations need to do to keep up with the evolution of technology today. Here&apos;s a hint, it&apos;s based on aptitude and potential...&quot;You can&apos;t train someone to be more curious or passionate, but you can develop their technical and soft skills.&quot; With technology engrained in everything we do, playing catch up won&apos;t sustain this industry. Tune into the discussion and get a copy of data points mentioned throughout the podcast from Cybrary&apos;s 2020 Skill Gap Research Report:  https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>The Cybersecurity Skills Gap: Is it Real? | Cybrary Limited Series</title><itunes:title>The Cybersecurity Skills Gap: Is it Real? | Cybrary Limited Series</itunes:title><description><![CDATA[<p>"There's not enough cyber talent." "If I train my employees, they'll leave for better jobs." "We need to find a unicorn - only candidates with 30 years of AWS experience should apply." This episode of the Cybrary Podcast is packed with long-debated and controversial topics, from skill gaps in organizations, to upskilling employees, and even misconceptions from management on who should be hired.&nbsp;</p>
<p>Cybrary's Chief Product Officer, Trevor Halstead, and CEO, Ryan Corey sit down with Naomi Buckwalter, Director of Information Security &amp; Privacy at Energage and Ron Gula, President and Co-Founder at Gula Tech Adventures to bring into view mind-blowing stats from Cybrary's newest survey report. Some big hitters touched on by our panelists are diversity (or the lack of it) in cybersecurity, having a skills growth mindset, using cybersecurity as a business enabler, and in a current/post-pandemic world, the criticality of IT and it's role in cybersecurity.&nbsp;</p>
<p>There is so much to unpack in this episode, so jump into the discussion. Download Cybrary's 2020 Skill Gap Research Report here: <a href="https://app.sounder.fm/shows/13106/episodes/149529" target="_self"> https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>"There's not enough cyber talent." "If I train my employees, they'll leave for better jobs." "We need to find a unicorn - only candidates with 30 years of AWS experience should apply." This episode of the Cybrary Podcast is packed with long-debated and controversial topics, from skill gaps in organizations, to upskilling employees, and even misconceptions from management on who should be hired.&nbsp;</p>
<p>Cybrary's Chief Product Officer, Trevor Halstead, and CEO, Ryan Corey sit down with Naomi Buckwalter, Director of Information Security &amp; Privacy at Energage and Ron Gula, President and Co-Founder at Gula Tech Adventures to bring into view mind-blowing stats from Cybrary's newest survey report. Some big hitters touched on by our panelists are diversity (or the lack of it) in cybersecurity, having a skills growth mindset, using cybersecurity as a business enabler, and in a current/post-pandemic world, the criticality of IT and it's role in cybersecurity.&nbsp;</p>
<p>There is so much to unpack in this episode, so jump into the discussion. Download Cybrary's 2020 Skill Gap Research Report here: <a href="https://app.sounder.fm/shows/13106/episodes/149529" target="_self"> https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">ffc13f7f-c0dd-41d3-a285-fa358fd59cad</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 23 Sep 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ca514e77-a797-43cc-94d3-c0af6616300a/audio-149529-13106-29857-57f6c39d-100f-4cc9-99e9-510df2a00a04.mp3" length="39391639" type="audio/mpeg"/><itunes:duration>41:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>&quot;There&apos;s not enough cyber talent.&quot; &quot;If I train my employees, they&apos;ll leave for better jobs.&quot; &quot;We need to find a unicorn - only candidates with 30 years of AWS experience should apply.&quot; This episode of the Cybrary Podcast is packed with long-debated and controversial topics, from skill gaps in organizations, to upskilling employees, and even misconceptions from management on who should be hired. 
Cybrary&apos;s Chief Product Officer, Trevor Halstead, and CEO, Ryan Corey sit down with Naomi Buckwalter, Director of Information Security &amp; Privacy at Energage and Ron Gula, President and Co-Founder at Gula Tech Adventures to bring into view mind-blowing stats from Cybrary&apos;s newest survey report. Some big hitters touched on by our panelists are diversity (or the lack of it) in cybersecurity, having a skills growth mindset, using cybersecurity as a business enabler, and in a current/post-pandemic world, the criticality of IT and it&apos;s role in cybersecurity. 
There is so much to unpack in this episode, so jump into the discussion. Download Cybrary&apos;s 2020 Skill Gap Research Report here:  https://www.cybrary.it/business/resources/cybersecurity-skills-gap-research-report/
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Founding WiCyS (Women in CyberSecurity) with Dr. Siraj | The Cybrary Podcast Ep. 36</title><itunes:title>Founding WiCyS (Women in CyberSecurity) with Dr. Siraj | The Cybrary Podcast Ep. 36</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Dr. Ambareen Siraj, the founder of WiCyS - a non profit whose purpose is to bring women together in cybersecurity. Speaking with Amanda and Angel from the Cybrary team, Dr. Siraj goes through her history in cybersecurity and how WiCyS has helped open the doors for other women to get involved and learn about cybersecurity.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Dr. Ambareen Siraj, the founder of WiCyS - a non profit whose purpose is to bring women together in cybersecurity. Speaking with Amanda and Angel from the Cybrary team, Dr. Siraj goes through her history in cybersecurity and how WiCyS has helped open the doors for other women to get involved and learn about cybersecurity.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">a78fe422-7488-4003-9784-14637bb61a03</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 16 Sep 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e4f7df94-4c01-4337-933d-801b3d33119b/audio-149532-13106-29857-4c88340b-90a0-456d-9b2c-20e3dfdba9be.mp3" length="55069555" type="audio/mpeg"/><itunes:duration>57:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Dr. Ambareen Siraj, the founder of WiCyS - a non profit whose purpose is to bring women together in cybersecurity. Speaking with Amanda and Angel from the Cybrary team, Dr. Siraj goes through her history in cybersecurity and how WiCyS has helped open the doors for other women to get involved and learn about cybersecurity.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Why the Military isn&apos;t Good for Technologists | The Cybrary Podcast Ep. 35</title><itunes:title>Why the Military isn&apos;t Good for Technologists | The Cybrary Podcast Ep. 35</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, Josh discusses an article he wrote about how the military is a bad place for hackers and what could be done about it. &nbsp;</p>
<p>Here is a link to his original article: <a href="https://warontherocks.com/2018/07/fish-out-of-water-how-the-military-is-an-impossible-place-for-hackers-and-what-to-do-about-it/" target="_blank"> https://warontherocks.com/2018/07/fish-out-of-water-how-the-military-is-an-impossible-place-for-hackers-and-what-to-do-about-it/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, Josh discusses an article he wrote about how the military is a bad place for hackers and what could be done about it. &nbsp;</p>
<p>Here is a link to his original article: <a href="https://warontherocks.com/2018/07/fish-out-of-water-how-the-military-is-an-impossible-place-for-hackers-and-what-to-do-about-it/" target="_blank"> https://warontherocks.com/2018/07/fish-out-of-water-how-the-military-is-an-impossible-place-for-hackers-and-what-to-do-about-it/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">158ad572-603f-46f1-b74f-df0483f222f7</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 09 Sep 2020 12:51:09 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c69dfe6a-336c-4692-8f2c-744bf7152c76/audio-149533-13106-29857-159e1936-495a-4e20-84f5-bae0b515ebcf.mp3" length="30191732" type="audio/mpeg"/><itunes:duration>31:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we welcome back Josh Lospinoso, the CEO of Shift5. Speaking with Mike Gruen and Jonathan Meyers from Cybrary, Josh discusses an article he wrote about how the military is a bad place for hackers and what could be done about it.  
Here is a link to his original article:  https://warontherocks.com/2018/07/fish-out-of-water-how-the-military-is-an-impossible-place-for-hackers-and-what-to-do-about-it/
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 10 | Election Security: Can a Hacker Really Pick the Next US President?</title><itunes:title>401 Access Denied Ep. 10 | Election Security: Can a Hacker Really Pick the Next US President?</itunes:title><description><![CDATA[<p>Special guest Dan Lohrmann from Security Mentor and former advisor to the White House and Homeland Security joins Thycotic and Cybrary to talk election security. We cover topics from voting registration, mail-in voting, to in-person voting and even the fake news Americans will be bombarded with from now until election day. How do we - and more importantly, should we - feel confident in our election security?</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Special guest Dan Lohrmann from Security Mentor and former advisor to the White House and Homeland Security joins Thycotic and Cybrary to talk election security. We cover topics from voting registration, mail-in voting, to in-person voting and even the fake news Americans will be bombarded with from now until election day. How do we - and more importantly, should we - feel confident in our election security?</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">025f7a0d-621d-484e-be5e-27cbed861ce5</guid><itunes:image href="https://artwork.captivate.fm/a72505df-1b40-4410-8fbe-133eacb03999/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 09 Sep 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ca718c47-d014-4e00-8241-c2604e42a170/audio-149534-13106-29857-ee46d5f6-46e1-479b-8ab6-3ac5960f0ab4.mp3" length="52048434" type="audio/mpeg"/><itunes:duration>54:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><itunes:summary>Special guest Dan Lohrmann from Security Mentor and former advisor to the White House and Homeland Security joins Thycotic and Cybrary to talk election security. We cover topics from voting registration, mail-in voting, to in-person voting and even the fake news Americans will be bombarded with from now until election day. How do we - and more importantly, should we - feel confident in our election security?</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Threat Hunting &amp; Windows 95 | The Cybrary Podcast Ep. 34</title><itunes:title>Threat Hunting &amp; Windows 95 | The Cybrary Podcast Ep. 34</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Kyle Hanslovan and Chris Bisnett, the CEO, Chief Architect and Co-Founders of Huntress Labs. Speaking with Ryan Corey and Mike Gruen from Cybrary, Kyle and Chris explain the early issues they ran into when starting Huntress Labs and the Windows 95 problems they are still solving.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Kyle Hanslovan and Chris Bisnett, the CEO, Chief Architect and Co-Founders of Huntress Labs. Speaking with Ryan Corey and Mike Gruen from Cybrary, Kyle and Chris explain the early issues they ran into when starting Huntress Labs and the Windows 95 problems they are still solving.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">ae273809-a5c0-47cc-bd2c-4d3624a2e63e</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 02 Sep 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/29f2787a-a729-4837-9866-48b80d0775ac/audio-149535-13106-29857-4280a67a-42a6-4d8c-a586-ff7b75fe7e6b.mp3" length="49091356" type="audio/mpeg"/><itunes:duration>51:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Kyle Hanslovan and Chris Bisnett, the CEO, Chief Architect and Co-Founders of Huntress Labs. Speaking with Ryan Corey and Mike Gruen from Cybrary, Kyle and Chris explain the early issues they ran into when starting Huntress Labs and the Windows 95 problems they are still solving.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>The Road to Being an Instructor | The Cybrary Podcast Ep. 33</title><itunes:title>The Road to Being an Instructor | The Cybrary Podcast Ep. 33</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Alex Matheson, the Senior Program Manager for Code42, and Ken Underhill, Cybrary's Master Instructor. Alex and Ken discuss what it's like to be an online instructor and the difficulties that come along with it.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Alex Matheson, the Senior Program Manager for Code42, and Ken Underhill, Cybrary's Master Instructor. Alex and Ken discuss what it's like to be an online instructor and the difficulties that come along with it.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">6bcd4975-2492-4e50-a7bd-9c7f09f64e00</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 26 Aug 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/54f06053-36d7-45b9-8035-b190452d9f9b/audio-149536-13106-29857-d0e4431c-4fbe-48cd-8c37-975c165afd42.mp3" length="27885633" type="audio/mpeg"/><itunes:duration>29:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Alex Matheson, the Senior Program Manager for Code42, and Ken Underhill, Cybrary&apos;s Master Instructor. Alex and Ken discuss what it&apos;s like to be an online instructor and the difficulties that come along with it.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 9 | Password Rules You *Have* to Break</title><itunes:title>401 Access Denied Ep. 9 | Password Rules You *Have* to Break</itunes:title><description><![CDATA[<p>Joseph Carson &amp; Mike Gruen cover all things password today. Are all passwords created equally? As you attempt to balance usability vs security, what should you focus on more? We’ll learn why your children are now a target for hackers and if we can really dream of a password-less society someday.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Joseph Carson &amp; Mike Gruen cover all things password today. Are all passwords created equally? As you attempt to balance usability vs security, what should you focus on more? We’ll learn why your children are now a target for hackers and if we can really dream of a password-less society someday.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">0f610702-5b59-4802-9e7f-3f4a4daec6cb</guid><itunes:image href="https://artwork.captivate.fm/c06ac18a-696f-4a54-92dc-d0f779516e44/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 26 Aug 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/88f2951b-8ae1-435c-b121-6c26923e4d60/audio-149537-13106-29857-b9cec0af-062d-468f-9a32-9ab943a006e0.mp3" length="38880129" type="audio/mpeg"/><itunes:duration>40:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><itunes:summary>Joseph Carson &amp; Mike Gruen cover all things password today. Are all passwords created equally? As you attempt to balance usability vs security, what should you focus on more? We’ll learn why your children are now a target for hackers and if we can really dream of a password-less society someday.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>DDoS and IoT Nightmares | The Cybrary Podcast Ep. 32</title><itunes:title>DDoS and IoT Nightmares | The Cybrary Podcast Ep. 32</itunes:title><description><![CDATA[<p>In this episode of The Cybrary Podcast we sit down with Richard Hummel, the Manager of Threat Research at Arbor Networks - the Security Division of NetScout. Speaking with Mike Gruen, the CISO of Cybrary, Richard talks about DDoS attacks in the gaming industry and how IoT devices should scare everyone.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Cybrary Podcast we sit down with Richard Hummel, the Manager of Threat Research at Arbor Networks - the Security Division of NetScout. Speaking with Mike Gruen, the CISO of Cybrary, Richard talks about DDoS attacks in the gaming industry and how IoT devices should scare everyone.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">c8bf03a9-5149-43fd-9f3b-4a48cb269c3b</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 19 Aug 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f01c8ba2-8254-4d23-ac9c-342e67b2635e/audio-149538-13106-29857-b409bdfb-14fb-4c53-bf6d-afbf36599b81.mp3" length="39628001" type="audio/mpeg"/><itunes:duration>41:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of The Cybrary Podcast we sit down with Richard Hummel, the Manager of Threat Research at Arbor Networks - the Security Division of NetScout. Speaking with Mike Gruen, the CISO of Cybrary, Richard talks about DDoS attacks in the gaming industry and how IoT devices should scare everyone.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Jumping in with Battleship | The Cybrary Podcast Ep. 31</title><itunes:title>Jumping in with Battleship | The Cybrary Podcast Ep. 31</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Katelyn Ilkani, the CoFounder, President and CRO for Battleship (formerly known as Scopedive). Speaking with Ryan Corey, the CEO of Cybrary, Katelyn explains the mission of Battleship and how it was started. For more information on Battleship you can check them out here: <a href="https://battleshipsecurity.com/" target="_self">https://battleshipsecurity.com/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Katelyn Ilkani, the CoFounder, President and CRO for Battleship (formerly known as Scopedive). Speaking with Ryan Corey, the CEO of Cybrary, Katelyn explains the mission of Battleship and how it was started. For more information on Battleship you can check them out here: <a href="https://battleshipsecurity.com/" target="_self">https://battleshipsecurity.com/</a></p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">6e6102be-cfb9-46ec-9e12-5eceb9a420ab</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 12 Aug 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1cff8a0b-43ee-45aa-9f7e-26365ec43091/audio-149540-13106-29857-770520ba-3798-4bdb-b95c-7f9d5ddcd10c.mp3" length="30768936" type="audio/mpeg"/><itunes:duration>32:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Katelyn Ilkani, the CoFounder, President and CRO for Battleship (formerly known as Scopedive). Speaking with Ryan Corey, the CEO of Cybrary, Katelyn explains the mission of Battleship and how it was started. For more information on Battleship you can check them out here: https://battleshipsecurity.com/
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 8 | International Cyber Warfare: How Real is the Threat? Part 2</title><itunes:title>401 Access Denied Ep. 8 | International Cyber Warfare: How Real is the Threat? Part 2</itunes:title><description><![CDATA[<p>Welcome to part 2 of our international cyber warfare episode with special guest Josh Lospinoso. We continue with the discussion of zero-day vulnerabilities - including when to keep, use, and responsibly disclose them. In this episode, we’ll get into the ethical and legal challenges that need to be considered in cyber war operations.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Welcome to part 2 of our international cyber warfare episode with special guest Josh Lospinoso. We continue with the discussion of zero-day vulnerabilities - including when to keep, use, and responsibly disclose them. In this episode, we’ll get into the ethical and legal challenges that need to be considered in cyber war operations.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">95c2a0f3-7dd8-4f2a-ab88-30f03bf61e0b</guid><itunes:image href="https://artwork.captivate.fm/3f0ecc4e-969f-4101-8255-6107c5b9a75e/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 12 Aug 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fee9d73a-5566-4252-9f25-a3f0b87bba99/audio-149539-13106-29857-a329f244-c0ca-4b99-9d2a-1bbc48e8266c.mp3" length="33624253" type="audio/mpeg"/><itunes:duration>35:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><itunes:summary>Welcome to part 2 of our international cyber warfare episode with special guest Josh Lospinoso. We continue with the discussion of zero-day vulnerabilities - including when to keep, use, and responsibly disclose them. In this episode, we’ll get into the ethical and legal challenges that need to be considered in cyber war operations.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Journey through BSides | The Cybrary Podcast Ep. 30</title><itunes:title>Journey through BSides | The Cybrary Podcast Ep. 30</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Cindy Jones, the SR Product Security Specialist at Thermo Fisher and the President of BSides Las Vegas. CIndy explains how she got started with BSides and how the conferences come together.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Cindy Jones, the SR Product Security Specialist at Thermo Fisher and the President of BSides Las Vegas. CIndy explains how she got started with BSides and how the conferences come together.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">d25c2ba5-cc16-4fd0-a5e0-4ffa45e88ca2</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 05 Aug 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc87f802-59d7-4410-a06c-23db6353dfe9/audio-149541-13106-29857-ae024f9d-c3ca-4d5d-9bde-acf6dea89fd5.mp3" length="35759432" type="audio/mpeg"/><itunes:duration>37:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Cindy Jones, the SR Product Security Specialist at Thermo Fisher and the President of BSides Las Vegas. CIndy explains how she got started with BSides and how the conferences come together.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 7 | International Cyber Warfare: How Real is the Threat? Part 1</title><itunes:title>401 Access Denied Ep. 7 | International Cyber Warfare: How Real is the Threat? Part 1</itunes:title><description><![CDATA[<p>Join Joseph Carson from Thycotic, Mike Gruen from Cybrary and special guest Josh Lospinoso, former Cyber Officer of the US Army for part 1 of our 2-part episode on international cyber war. What does it take to recognize cyber misconduct as an act of war? How do we even attribute transgressions to the right players as modern technologies make cyber operations harder to detect and defend against?</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Join Joseph Carson from Thycotic, Mike Gruen from Cybrary and special guest Josh Lospinoso, former Cyber Officer of the US Army for part 1 of our 2-part episode on international cyber war. What does it take to recognize cyber misconduct as an act of war? How do we even attribute transgressions to the right players as modern technologies make cyber operations harder to detect and defend against?</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">1fa52c73-98a8-42f7-be6f-f5b9eeba45e2</guid><itunes:image href="https://artwork.captivate.fm/e50cd840-340b-4d21-b791-3215d5ea9b2a/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 29 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/52b4fed1-faeb-4983-897d-b361379c7f7d/audio-149543-13106-29857-d0d6893b-e8ac-4fb8-8f5a-d5d69c3b9c86.mp3" length="28697206" type="audio/mpeg"/><itunes:duration>29:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><itunes:summary>Join Joseph Carson from Thycotic, Mike Gruen from Cybrary and special guest Josh Lospinoso, former Cyber Officer of the US Army for part 1 of our 2-part episode on international cyber war. What does it take to recognize cyber misconduct as an act of war? How do we even attribute transgressions to the right players as modern technologies make cyber operations harder to detect and defend against?</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 29 Tim Winkler | Scale Recruiting at Startups</title><itunes:title>Ep. 29 Tim Winkler | Scale Recruiting at Startups</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Tim Winkler, the Founder and CEO of Hatch IT. Speaking with MIke Gruen, the CISO, and Katie Wandtke, the Head of People from Cybrary, Tim explains the mission of Hatch IT and how they are changing the recruiting space.&nbsp;</p><p>For more information on Hatch IT, visit <a href="https://www.hatchit.io/" rel="noopener noreferrer" target="_blank">https://www.hatchit.io/</a></p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Tim Winkler, the Founder and CEO of Hatch IT. Speaking with MIke Gruen, the CISO, and Katie Wandtke, the Head of People from Cybrary, Tim explains the mission of Hatch IT and how they are changing the recruiting space.&nbsp;</p><p>For more information on Hatch IT, visit <a href="https://www.hatchit.io/" rel="noopener noreferrer" target="_blank">https://www.hatchit.io/</a></p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">73c8bdab-0f28-4f7c-a84d-204045aad69c</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 29 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8038060f-c6fe-4fd7-aa22-1bfba0b9a795/audio-149542-13106-29857-bc85cbdd-b790-40a1-892c-47b6c80382e3.mp3" length="48349475" type="audio/mpeg"/><itunes:duration>50:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Tim Winkler, the Founder and CEO of Hatch IT. Speaking with MIke Gruen, the CISO, and Katie Wandtke, the Head of People from Cybrary, Tim explains the mission of Hatch IT and how they are changing the recruiting space. 
For more information on Hatch IT, visit https://www.hatchit.io/
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 28 Will Markow | Burning Questions with Burning Glass</title><itunes:title>Ep. 28 Will Markow | Burning Questions with Burning Glass</itunes:title><description><![CDATA[<p>In this episode of the cybrary podcast we sit down with Will Markow, the Managing Director for Burning Glass Technologies. Speaking with Leif Jackson, the VP of Content and Community at Cybrary, they discuss "Cyberseek," a website looking to close the cybersecurity talent gap with interactive tools and data.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the cybrary podcast we sit down with Will Markow, the Managing Director for Burning Glass Technologies. Speaking with Leif Jackson, the VP of Content and Community at Cybrary, they discuss "Cyberseek," a website looking to close the cybersecurity talent gap with interactive tools and data.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">23a2e976-2a3a-488e-aa0d-d968e394f8ee</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 22 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6328454-227f-4274-bc14-d733735f09ab/audio-149544-13106-29857-2c89e036-d49c-4795-b1c4-0c4d1c548f1a.mp3" length="22939368" type="audio/mpeg"/><itunes:duration>23:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the cybrary podcast we sit down with Will Markow, the Managing Director for Burning Glass Technologies. Speaking with Leif Jackson, the VP of Content and Community at Cybrary, they discuss &quot;Cyberseek,&quot; a website looking to close the cybersecurity talent gap with interactive tools and data.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 6 | Diary of a Cybersecurity Grad with Emma Heffernan</title><itunes:title>401 Access Denied Podcast Ep. 6 | Diary of a Cybersecurity Grad with Emma Heffernan</itunes:title><description><![CDATA[<p>Joseph Carson from Delinea is joined today by Emma Heffernan, one of the most recognized new cybersec professionals in the industry. She'll share her experience as a recent graduate turned Pentester and speaker as she navigates her way through various industry roles. Also, you'll hear ideas for learning new skills and sharing your expertise with others to further your industry knowledge. </p>]]></description><content:encoded><![CDATA[<p>Joseph Carson from Delinea is joined today by Emma Heffernan, one of the most recognized new cybersec professionals in the industry. She'll share her experience as a recent graduate turned Pentester and speaker as she navigates her way through various industry roles. Also, you'll hear ideas for learning new skills and sharing your expertise with others to further your industry knowledge. </p>]]></content:encoded><link><![CDATA[https://delinea.com/events/podcasts]]></link><guid isPermaLink="false">7ab3ebb9-baa0-4997-bf53-e783dcd8fdc2</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 15 Jul 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/140b35ad-65bc-4afc-a51d-eeae485be825/401-Access-Denied-Ep-06-Joe-Carson-Diary-of-a-Cybersecurity-Gra.mp3" length="34829936" type="audio/mpeg"/><itunes:duration>36:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><itunes:author>Delinea</itunes:author></item><item><title>Ep. 27 Liz Wharton | Airports &amp; Ransomware</title><itunes:title>Ep. 27 Liz Wharton | Airports &amp; Ransomware</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Liz Wharton, the Chief of Staff for Scythe. In our conversation Liz goes over the intricacies of running the world's busiest airport from a Cyber perspective as well as what it's like to be on the frontline of a citywide ransomware attack that took place in Atlanta in March 2018.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Liz Wharton, the Chief of Staff for Scythe. In our conversation Liz goes over the intricacies of running the world's busiest airport from a Cyber perspective as well as what it's like to be on the frontline of a citywide ransomware attack that took place in Atlanta in March 2018.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">605f83ac-e87c-496a-abc1-9907da9a8ca5</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 15 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a75f52a1-9612-41ea-8dc6-da496265244f/audio-149545-13106-29857-2e047dab-a638-4aaa-9b23-fa9470b3773d.mp3" length="39567043" type="audio/mpeg"/><itunes:duration>41:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Liz Wharton, the Chief of Staff for Scythe. In our conversation Liz goes over the intricacies of running the world&apos;s busiest airport from a Cyber perspective as well as what it&apos;s like to be on the frontline of a citywide ransomware attack that took place in Atlanta in March 2018.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 26 Kevin Davis | Armored Things &amp; Crowd Intelligence</title><itunes:title>Ep. 26 Kevin Davis | Armored Things &amp; Crowd Intelligence</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">f0737575-0b4e-494d-b292-9d0ce886dd37</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 08 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fb45d373-0d0d-4654-93eb-b09053ea783c/audio-149547-13106-29857-1151e9c5-1892-4b76-abcd-2afd42d8c494.mp3" length="26407928" type="audio/mpeg"/><itunes:duration>27:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Ep. 26 Kevin Davis | Armored Things &amp; Crowd Intelligence</title><itunes:title>Ep. 26 Kevin Davis | Armored Things &amp; Crowd Intelligence</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">9029a10b-5f38-4a18-b01c-672108c7274d</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 08 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fb45d373-0d0d-4654-93eb-b09053ea783c/audio-149547-13106-29857-1151e9c5-1892-4b76-abcd-2afd42d8c494.mp3" length="26407928" type="audio/mpeg"/><itunes:duration>27:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Kevin Davis, the Chief Security Officer for Armored Things. Speaking with Cybrary Cofounder Ralph Sita, Kevin goes into detail about what Armored Things is working on and how their Crowd Intelligence is already being implemented around the country.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 5 | What the Heck is Least Privilege Security Anyway?</title><itunes:title>401 Access Denied Ep. 5 | What the Heck is Least Privilege Security Anyway?</itunes:title><description><![CDATA[<p>Least Privilege has become a pervasive term in cyber security these days. But what does Least Privilege actually mean? How has Zero Trust transformed into building trust and adaptive security that helps employees do their jobs efficiently and securely? Join Joseph Carson, Chief Security Scientist from Thycotic and author of “Least Privilege for Dummies,” along with Mike Gruen from Cybrary as they dive into the topic of Least Privilege and how it can transform an organization with more automation.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Least Privilege has become a pervasive term in cyber security these days. But what does Least Privilege actually mean? How has Zero Trust transformed into building trust and adaptive security that helps employees do their jobs efficiently and securely? Join Joseph Carson, Chief Security Scientist from Thycotic and author of “Least Privilege for Dummies,” along with Mike Gruen from Cybrary as they dive into the topic of Least Privilege and how it can transform an organization with more automation.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">fce1750a-9d3a-46d8-ac87-d54e39798f65</guid><itunes:image href="https://artwork.captivate.fm/883878ce-f148-4dff-b474-8ad7608beccf/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 01 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/005f6845-0773-4969-8524-f1012c106117/audio-149549-13106-29857-ddb108df-9e42-4f5e-861c-a4d389e8fc2f.mp3" length="27770165" type="audio/mpeg"/><itunes:duration>28:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><itunes:summary>Least Privilege has become a pervasive term in cyber security these days. But what does Least Privilege actually mean? How has Zero Trust transformed into building trust and adaptive security that helps employees do their jobs efficiently and securely? Join Joseph Carson, Chief Security Scientist from Thycotic and author of “Least Privilege for Dummies,” along with Mike Gruen from Cybrary as they dive into the topic of Least Privilege and how it can transform an organization with more automation.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 25 Josh Lospinoso | Encryption and Backdoors Pt 2</title><itunes:title>Ep. 25 Josh Lospinoso | Encryption and Backdoors Pt 2</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">493dc77b-c31b-499a-a318-a42823b05697</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 01 Jul 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3608dc19-e918-4ef1-b2b0-b6d759e20455/audio-149548-13106-29857-9852e49a-4910-4d0c-9208-655753b5391f.mp3" length="34502326" type="audio/mpeg"/><itunes:duration>35:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 24 Josh Lospinoso | Encryption and Backdoors Pt 1</title><itunes:title>Ep. 24 Josh Lospinoso | Encryption and Backdoors Pt 1</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary, and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary, and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">1ba6d7f2-e0a2-4f4a-8814-6225784b364a</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 24 Jun 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bbdbc0dc-6333-41fb-8421-75d41fade370/audio-149550-13106-29857-dd0cc37e-0ded-47c9-b409-508c3bf01b48.mp3" length="41548425" type="audio/mpeg"/><itunes:duration>43:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Josh Lospinoso, the CSO of Shift5. Speaking with Mike Gruen, the CISO of Cybrary, and Jonathan Meyers, the Head of Infrastructure for Cybrary, they talk about a wide range of subjects including encryption and government backdoors.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>401 Access Denied Podcast Ep. 4 | The 2020 Verizon Data Breach Investigations Report</title><itunes:title>401 Access Denied Ep. 4 | The 2020 Verizon Data Breach Investigations Report</itunes:title><description><![CDATA[<p>Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they deep dive into Verizon’s 2020 Data Breach Investigations Report. We’ll share the good news of what the industry has been doing well this year and we’ll also share the not-so-good news. Ransomware, malware, credential stuffing, employee cyber education, and much more will be discussed. Plus, we’ll give a rundown of the measures you should have in place to protect your organization against these threats starting today.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they deep dive into Verizon’s 2020 Data Breach Investigations Report. We’ll share the good news of what the industry has been doing well this year and we’ll also share the not-so-good news. Ransomware, malware, credential stuffing, employee cyber education, and much more will be discussed. Plus, we’ll give a rundown of the measures you should have in place to protect your organization against these threats starting today.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">b4640f67-9f22-4ebe-8245-342dfc14c19f</guid><itunes:image href="https://artwork.captivate.fm/cfcb6253-c4d8-41e2-926b-c98afc3397d3/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 17 Jun 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6d4e73d3-3c8e-48b6-b380-21d617776760/audio-149551-13106-29857-5d445b33-78e0-4c57-9b36-8f6f1478a4db.mp3" length="39583513" type="audio/mpeg"/><itunes:duration>41:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><itunes:summary>Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they deep dive into Verizon’s 2020 Data Breach Investigations Report. We’ll share the good news of what the industry has been doing well this year and we’ll also share the not-so-good news. Ransomware, malware, credential stuffing, employee cyber education, and much more will be discussed. Plus, we’ll give a rundown of the measures you should have in place to protect your organization against these threats starting today.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>COVID Chronicles Ep. 5 | Capital One Breach</title><itunes:title>COVID Chronicles Ep.05 | Capital One Breach</itunes:title><description><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode, we will hear from Arif Basha the Managing Principle at IAS Consulting, Steven Adair the President of Volexity and Tara Swaminatha Partner at Zero Day Law.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode, we will hear from Arif Basha the Managing Principle at IAS Consulting, Steven Adair the President of Volexity and Tara Swaminatha Partner at Zero Day Law.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">731fada9-56cd-4e24-8a61-4d2a188128ed</guid><itunes:image href="https://artwork.captivate.fm/263bd18d-d260-4072-89cd-49f7d66f49e1/thumbnail-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 17 Jun 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c1ea9222-ae5d-431f-be3e-ae30584e34eb/audio-149552-13106-29857-ff669dca-bb5d-4a63-9bf3-077cc73d33de.mp3" length="52955766" type="audio/mpeg"/><itunes:duration>52:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode, we will hear from Arif Basha the Managing Principle at IAS Consulting, Steven Adair the President of Volexity and Tara Swaminatha Partner at Zero Day Law.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>COVID Chronicles Ep. 4 | Innovating and Moving Fast</title><itunes:title>COVID Chronicles Ep.4 | Innovating and Moving Fast</itunes:title><description><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a conversaton about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Chuck Bubeck, the Executive Director of the Maryland Innovation Center, Kevin Crain, the CISO of the University of Maryland Medical System and John Ward, the Director of Global Safety and Security for Marriott.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a conversaton about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Chuck Bubeck, the Executive Director of the Maryland Innovation Center, Kevin Crain, the CISO of the University of Maryland Medical System and John Ward, the Director of Global Safety and Security for Marriott.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">71727e54-d9ed-4a7f-b39e-797f33cceaf7</guid><itunes:image href="https://artwork.captivate.fm/b2def6a4-b112-4aae-be8e-b01f526fc6a7/thumbnail-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 10 Jun 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c91751b2-c91f-4b1b-80a2-203e6a142bf2/audio-149553-13106-29857-139ce6c0-dfbb-4a61-b492-13f4cdc824d0.mp3" length="67901755" type="audio/mpeg"/><itunes:duration>01:08:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a conversaton about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Chuck Bubeck, the Executive Director of the Maryland Innovation Center, Kevin Crain, the CISO of the University of Maryland Medical System and John Ward, the Director of Global Safety and Security for Marriott.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 3 | Getting Back to Work: The New Pandemic Anxiety</title><itunes:title>401 Access Denied Ep. 3 | Getting Back to Work: The New Pandemic Anxiety</itunes:title><description><![CDATA[<p>As many countries around the world are reopening and people are going back to work, countless new challenges arise for both the employer and employee.&nbsp;</p><p>• How do businesses ensure employee safety without invading their privacy around health issues?&nbsp;</p><p>• How do businesses ensure that devices that have been used outside of their network for several months are now safe, especially as shift work means employees could be going in and out of the network repeatedly?&nbsp;</p><p><br></p><p>• And as workers, what new privacy issues should we worry about as we go back to shared desks and community spaces?&nbsp;</p><p><br></p><p>• Plus, is my company really doing thermal scans?!&nbsp;</p><p><br></p><p>Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they discuss these problems, and more.&nbsp;</p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>As many countries around the world are reopening and people are going back to work, countless new challenges arise for both the employer and employee.&nbsp;</p><p>• How do businesses ensure employee safety without invading their privacy around health issues?&nbsp;</p><p>• How do businesses ensure that devices that have been used outside of their network for several months are now safe, especially as shift work means employees could be going in and out of the network repeatedly?&nbsp;</p><p><br></p><p>• And as workers, what new privacy issues should we worry about as we go back to shared desks and community spaces?&nbsp;</p><p><br></p><p>• Plus, is my company really doing thermal scans?!&nbsp;</p><p><br></p><p>Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they discuss these problems, and more.&nbsp;</p><p><br></p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">1df6c813-3f86-474e-9e77-a749841bd24c</guid><itunes:image href="https://artwork.captivate.fm/1f155923-befb-4344-9c0f-cc9b253d365b/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 03 Jun 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/300113b8-e6c5-48d2-93f1-611b21a0bd9a/audio-149556-13106-29857-aa20cd86-16ad-40ed-b4be-36608ccd33a3.mp3" length="28746112" type="audio/mpeg"/><itunes:duration>29:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><itunes:summary>As many countries around the world are reopening and people are going back to work, countless new challenges arise for the employer and employee.

• How do businesses ensure employee safety without invading their privacy?
• How do businesses ensure that devices used outside of their network are safe?
• What new privacy issues should we worry about as we go back to shared desks and community spaces?

Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they discuss these problems, and</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>COVID Chronicles Ep. 2 | Under Armour, West Point and the Best Plans</title><itunes:title>COVID Chronicles Ep.02 | Under Armour, West Point and the Best Plans</itunes:title><description><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Matt Dunlop, the CISO of Under Armour, Jim Meyer, the Managing Director for Coordinated Response, and COL Tanya Estes, Professor at The United States Military Academy at West Point.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Matt Dunlop, the CISO of Under Armour, Jim Meyer, the Managing Director for Coordinated Response, and COL Tanya Estes, Professor at The United States Military Academy at West Point.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">f7c32261-0da9-4aa7-8a8b-f2c8d45bf8e7</guid><itunes:image href="https://artwork.captivate.fm/04ed1422-10d3-4ed3-9b32-4b34bb868d72/thumbnail-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 03 Jun 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab38300b-7bbd-491b-9e30-be3abd7f1c58/audio-149554-13106-29857-21146fc5-b7b8-492a-afab-e9cdc3dbbbf8.mp3" length="55937181" type="audio/mpeg"/><itunes:duration>55:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Matt Dunlop, the CISO of Under Armour, Jim Meyer, the Managing Director for Coordinated Response, and COL Tanya Estes, Professor at The United States Military Academy at West Point.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>COVID Chronicles Ep. 3 | All SOC Episode</title><itunes:title>COVID Chronicles Ep.3 | All SOC Episode</itunes:title><description><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a discussion about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Rebecca Weaver, the Director of SOC Operations at Ironnet Cybersecurity, Xavier Salinas, the VP of Threat Operations at Blackpoint, and Ernie Pritchard, the Director of Information Security at HealthSouth.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a discussion about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Rebecca Weaver, the Director of SOC Operations at Ironnet Cybersecurity, Xavier Salinas, the VP of Threat Operations at Blackpoint, and Ernie Pritchard, the Director of Information Security at HealthSouth.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">aa937b43-65c5-4b66-9dc2-32ac31bce3d8</guid><itunes:image href="https://artwork.captivate.fm/20ccb9da-51b1-4570-b66e-b447410d937e/thumbnail-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 03 Jun 2020 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/21993033-8c0a-4109-bd06-9d4d6a3b5bf9/audio-149555-13106-29857-77c3d64a-b9c6-418c-a305-c288d45f5638.mp3" length="48195984" type="audio/mpeg"/><itunes:duration>50:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this special episode of the Cybrary Podcast we bring you the COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry in a discussion about how the Covid-19 Pandemic is affecting them. In this episode we will hear from Rebecca Weaver, the Director of SOC Operations at Ironnet Cybersecurity, Xavier Salinas, the VP of Threat Operations at Blackpoint, and Ernie Pritchard, the Director of Information Security at HealthSouth.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>COVID Chronicles Ep. 1 | What Does the Future Look Like?</title><itunes:title>COVID Chronicles Ep. 1| What does the future look like?</itunes:title><description><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you our COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this special episode of the Cybrary Podcast we bring you our COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">90700974-e073-4b15-a48c-77dd6d7e624a</guid><itunes:image href="https://artwork.captivate.fm/85ffda56-5bcc-4429-a58c-3a83fd432903/image-square-big.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 20 May 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/26043c83-9642-442f-9fda-ae091ec3905c/audio-149557-13106-29857-4ce1a8f8-be3c-439d-84fb-de33ef29f048.mp3" length="53906291" type="audio/mpeg"/><itunes:duration>53:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this special episode of the Cybrary Podcast we bring you our COVID Chronicles. Hosting this series is Brian Dykstra, the CEO of Atlantic Data Forensics, who will be joined by guests from across the industry about how the Covid-19 Pandemic is affecting them.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 2 | Top 8 Must-Read Cybersecurity Books</title><itunes:title>401 Access Denied Ep. 2 | Top 8 Must-Read Cybersecurity Books</itunes:title><description><![CDATA[<p>As many of us are job searching or looking for a break from our evening Netflix routines, it’s a good time to share our top 8 cyber security books that will help you learn new skills and techniques whether you are trying to break into the industry or prepare for the next level of your career. Understand the history of the industry and hone your core skill set with books that can influence your career. Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they share their favorite books that stand the test of time.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>As many of us are job searching or looking for a break from our evening Netflix routines, it’s a good time to share our top 8 cyber security books that will help you learn new skills and techniques whether you are trying to break into the industry or prepare for the next level of your career. Understand the history of the industry and hone your core skill set with books that can influence your career. Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they share their favorite books that stand the test of time.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">b527a90b-6c0a-4001-89a1-500e0db44f8d</guid><itunes:image href="https://artwork.captivate.fm/a7d8f52d-5cf7-47ec-b302-24a127cfa5bc/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 20 May 2020 12:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/de10de4f-898b-4f11-a3eb-2b892b0588cc/audio-149558-13106-29857-a547f4d1-abd0-4ac5-a676-dc70f9ecaffc.mp3" length="28905896" type="audio/mpeg"/><itunes:duration>29:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><itunes:summary>As many of us are job searching or looking for a break from our evening Netflix routines, it’s a good time to share our top 8 cyber security books that will help you learn new skills and techniques whether you are trying to break into the industry or prepare for the next level of your career. Join Joseph Carson from Thycotic and Mike Gruen from Cybrary as they share their favorite books that stand the test of time.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 23 LaToya Staten | Connected2Tech and Finding Your Role</title><itunes:title>Ep. 23 LaToya Staten | Connected2Tech and Finding Your Role</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with LaToya Staten from Connected2Tech. LaToya uses the Cybrary platform to help employers and job seekers in filling the roles that are available. LaToya also works with middle and high school age students to help them gain experience in the IT and Cyber field and showing them what roles are available and how they can attain them.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with LaToya Staten from Connected2Tech. LaToya uses the Cybrary platform to help employers and job seekers in filling the roles that are available. LaToya also works with middle and high school age students to help them gain experience in the IT and Cyber field and showing them what roles are available and how they can attain them.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">596c519b-f29d-4707-ac34-56f31550b428</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 13 May 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cf06291b-aabc-4618-a93c-71930f527c0a/audio-149559-13106-29857-09f6e247-a247-4199-a42b-04cdde8a117e.mp3" length="44246378" type="audio/mpeg"/><itunes:duration>46:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with LaToya Staten from Connected2Tech. LaToya uses the Cybrary platform to help employers and job seekers in filling the roles that are available. LaToya also works with middle and high school age students to help them gain experience in the IT and Cyber field and showing them what roles are available and how they can attain them.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>401 Access Denied Podcast Ep. 1 | Busting Password Myths</title><itunes:title>401 Access Denied Ep. 1 | Busting Password Myths</itunes:title><description><![CDATA[<p>With World Password Day upon us, individuals of all backgrounds and varying levels of cybersecurity hygiene will be confronted with the same question - are my current personal (or corporate) security measures enough? Today's episode will take listeners through a journey of best practices, horror stories, debunked myths, visions of a passwordless future, misconceptions, and just how challenging it really is to crack them.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>With World Password Day upon us, individuals of all backgrounds and varying levels of cybersecurity hygiene will be confronted with the same question - are my current personal (or corporate) security measures enough? Today's episode will take listeners through a journey of best practices, horror stories, debunked myths, visions of a passwordless future, misconceptions, and just how challenging it really is to crack them.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><strong>Follow Joe on Twitter </strong></p><p><br></p><p>~<a href="https://twitter.com/joe_carson" rel="noopener noreferrer" target="_blank">@joe_carson</a>&nbsp;</p><p><br></p><p><strong>Follow us on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Cybrary Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://twitter.com/Thycotic" rel="noopener noreferrer" target="_blank">Thycotic Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">Facebook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/c/CybraryIt" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">Cybrary LinkedIN</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/thycotic-software-ltd/" rel="noopener noreferrer" target="_blank">Thycotic LinkedIn</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">35b54515-3abe-4544-953d-67307db17dd1</guid><itunes:image href="https://artwork.captivate.fm/1c013d42-f1d5-4616-84fe-705da767ac0b/401-podcast-72-dpi-square-big.jpg"/><dc:creator><![CDATA[Delinea]]></dc:creator><pubDate>Wed, 06 May 2020 17:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bf8dae3f-ce6f-4a9f-9576-3682df8c2dbf/audio-149560-13106-29857-d5f5ae2d-c8b1-4f14-8c3b-9a73dc4dcb13.mp3" length="33183334" type="audio/mpeg"/><itunes:duration>34:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><itunes:summary>With World Password Day upon us, individuals of all backgrounds and varying levels of cybersecurity hygiene will be confronted with the same question – are my current personal (or corporate) security measures enough? Today&apos;s episode will take listeners through a journey of best practices, horror stories, debunked myths, visions of a password-less future, misconceptions, and just how challenging it really is to crack them.</itunes:summary><itunes:author>Delinea</itunes:author></item><item><title>Ep. 22 Diversity and Inclusion in Tech</title><itunes:title>Ep. 22 Diversity and Inclusion in Tech</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Solene, the marketing director of Knogin, Cami Ragano, the Senior Director of Enterprise Marketing, Amanda Davi, the Director of Business Development and Danyelle Wilson, the Customer Success Manager all from Cybrary. Together, they discuss the importance of inclusion and diversity in tech, touching on crucial topics like the importance of women having access to mentorship opportunities and how individuals can help promote diversity in the workplace.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Solene, the marketing director of Knogin, Cami Ragano, the Senior Director of Enterprise Marketing, Amanda Davi, the Director of Business Development and Danyelle Wilson, the Customer Success Manager all from Cybrary. Together, they discuss the importance of inclusion and diversity in tech, touching on crucial topics like the importance of women having access to mentorship opportunities and how individuals can help promote diversity in the workplace.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">7fe5bbc9-39c0-4249-913b-c8517f624f49</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 06 May 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/441ef161-a33d-4b57-b73c-685977e9938a/audio-149561-13106-29857-f65210be-c505-49be-b5af-c5375fd6572a.mp3" length="31853364" type="audio/mpeg"/><itunes:duration>33:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 21 Ken Gilmour | Creating a Security Conscious Culture</title><itunes:title>Ep. 21 Ken Gilmour | Creating a Security Conscious Culture</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin and Ryan Corey, the CEO of Cybrary. Ken and Ryan discuss the importance of having a security-conscious company culture and how that needs to be something that is thought of early on and possibly rewarding the employees who emulate these ideals.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin and Ryan Corey, the CEO of Cybrary. Ken and Ryan discuss the importance of having a security-conscious company culture and how that needs to be something that is thought of early on and possibly rewarding the employees who emulate these ideals.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">2c2b9c4f-3f9a-4526-b435-8ba103e55870</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 29 Apr 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9e71d220-0fbc-4dbc-a32b-0e7f10bceeb4/audio-149562-13106-29857-ab80ceb7-6149-4728-a5a6-69d7fb911777.mp3" length="20630326" type="audio/mpeg"/><itunes:duration>21:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin and Ryan Corey, the CEO of Cybrary. Ken and Ryan discuss the importance of having a security-conscious company culture and how that needs to be something that is thought of early on and possibly rewarding the employees who emulate these ideals.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 20 Cathryn Paine | Blood Sweat and Tears with HR</title><itunes:title>Ep. 20 | Cathryn Paine | Blood Sweat and Tears with HR</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Cathryn Paine, the Director of Talent Management and Organizational Development for Anzu Partners. Speaking with Katie Wandtke, Cybrary's Head of People, they discuss the difficulties that poor communication can lead to and how creating and maintaining thoughtful business connections can always benefit you.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Cathryn Paine, the Director of Talent Management and Organizational Development for Anzu Partners. Speaking with Katie Wandtke, Cybrary's Head of People, they discuss the difficulties that poor communication can lead to and how creating and maintaining thoughtful business connections can always benefit you.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">e06a1e2b-58be-47e0-9ccc-7cefb595e8ad</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 22 Apr 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f8eb8203-7f1c-42d5-a7b1-eda0b7cee8be/audio-149563-13106-29857-f9b983f9-70ef-4943-a13c-8fd2271fdccd.mp3" length="34496122" type="audio/mpeg"/><itunes:duration>35:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Cathryn Paine, the Director of Talent Management and Organizational Development for Anzu Partners. Speaking with Katie Wandtke, Cybrary&apos;s Head of People, they discuss the difficulties that poor communication can lead to and how creating and maintaining thoughtful business connections can always benefit you.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 19 Ken Gilmour and Solene | Retaining Sought After Talent</title><itunes:title>Ep. 19 | Ken Gilmour and Solene | Retaining Sought After Talent</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin, Solene, the marketing director of Knogin, and Katie Wandtke, the Head of People for Cybrary. We discussed how to engage and retain highly sought after talent in the tech field. I really enjoyed this episode and learning about how other companies and people view different benefits and perks differently.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin, Solene, the marketing director of Knogin, and Katie Wandtke, the Head of People for Cybrary. We discussed how to engage and retain highly sought after talent in the tech field. I really enjoyed this episode and learning about how other companies and people view different benefits and perks differently.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">20b374b8-b575-4862-bb22-b0ec731dd77d</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 15 Apr 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ed01e151-ad43-41c1-9504-c0e5d7aa21ee/audio-149564-13106-29857-fafe87e1-a320-47e8-a05e-b8ed2e9946ce.mp3" length="40045898" type="audio/mpeg"/><itunes:duration>41:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin, Solene, the marketing director of Knogin, and Katie Wandtke, the Head of People for Cybrary. We discussed how to engage and retain highly sought after talent in the tech field. I really enjoyed this episode and learning about how other companies and people view different benefits and perks differently.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 18 Ken Gilmour | Creating an Effective Cybersecurity Strategy</title><itunes:title>Ep. 18 - Ken Gilmour | Creating an Effective Cybersecurity Strategy</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin. Speaking with Thomas Horlacher, the Head of Creative Services, and Mike Gruen, the VP of Engineering at Cybrary, we discuss the importance of having a sustainable and long term cybersecurity strategy for your company. We also touch on breaches and what that can do to the image of a company.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin. Speaking with Thomas Horlacher, the Head of Creative Services, and Mike Gruen, the VP of Engineering at Cybrary, we discuss the importance of having a sustainable and long term cybersecurity strategy for your company. We also touch on breaches and what that can do to the image of a company.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">2916fea1-b36c-4a72-8cf5-6e24fcaf98b5</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 08 Apr 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3358529e-3942-4b93-a490-c62da5f48dca/audio-149565-13106-29857-9c389e19-b9a4-418f-aa97-b4aa0f69f232.mp3" length="22819085" type="audio/mpeg"/><itunes:duration>23:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Ken Gilmour, the CEO of Knogin. Speaking with Thomas Horlacher, the Head of Creative Services, and Mike Gruen, the VP of Engineering at Cybrary, we discuss the importance of having a sustainable and long term cybersecurity strategy for your company. We also touch on breaches and what that can do to the image of a company.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Melwood and the AbilIT Program</title><itunes:title>Melwood and the AbilIT Program</itunes:title><description><![CDATA[<p>In this episode of The Cybrary Podcast we hear from Scott Gibson, the Senior Vice President of People and Programs at Melwood. Speaking with Ryan Corey, the CEO of Cybrary, Scott goes into the amazing work that Melwood is doing for people of differing abilities and highlights their AbilIT Program that they have partnered with Cybrary on.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Cybrary Podcast we hear from Scott Gibson, the Senior Vice President of People and Programs at Melwood. Speaking with Ryan Corey, the CEO of Cybrary, Scott goes into the amazing work that Melwood is doing for people of differing abilities and highlights their AbilIT Program that they have partnered with Cybrary on.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">45ee799f-830a-48db-85bd-e3a5ccfcfd72</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Mon, 06 Apr 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f99111ab-feb3-4279-b531-5ff653e2566d/audio-149566-13106-29857-1f6e7b19-cc98-49d2-a747-1b2aa70a82d2.mp3" length="23571209" type="audio/mpeg"/><itunes:duration>24:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of The Cybrary Podcast we hear from Scott Gibson, the Senior Vice President of People and Programs at Melwood. Speaking with Ryan Corey, the CEO of Cybrary, Scott goes into the amazing work that Melwood is doing for people of differing abilities and highlights their AbilIT Program that they have partnered with Cybrary on.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Ep. 17 Evan Dornbush | Escalate and The Gamification of Learning</title><itunes:title>Ep.17 Evan Dornbush | Escalate and The Gamification of Learning</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Evan Dornbush, the CEO of Point3 Security. Speaking with Cybrary's VP of Engineering Mike Gruen and Head of Infrastructure Jonathan Meyers, Evan explains how Point3 is using gamification to help people learn through CTF's and other hands on activities.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Evan Dornbush, the CEO of Point3 Security. Speaking with Cybrary's VP of Engineering Mike Gruen and Head of Infrastructure Jonathan Meyers, Evan explains how Point3 is using gamification to help people learn through CTF's and other hands on activities.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">79e1cd89-4c47-432b-a0e9-5039e35ff9d3</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 01 Apr 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ef56f2f1-4008-400f-a758-8b4f33a13b20/audio-149567-13106-29857-2a07e674-acd2-4c1b-bacf-1178a16e406f.mp3" length="54223088" type="audio/mpeg"/><itunes:duration>56:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Evan Dornbush, the CEO of Point3 Security. Speaking with Cybrary&apos;s VP of Engineering Mike Gruen and Head of Infrastructure Jonathan Meyers, Evan explains how Point3 is using gamification to help people learn through CTF&apos;s and other hands on activities.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Joe Carson | Now that Everyone’s Home</title><itunes:title>Joe Carson | Now that Everyone’s Home</itunes:title><description><![CDATA[<p>In this episode of The Cybrary Podcast we hear from Joe Carson, the Chief Security Scientist for Thycotic . Speaking with Mike Gruen, Cybrary's VP of Engineering, they talk about WFH best practices and the unique issues that arise when your family is home as well.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Cybrary Podcast we hear from Joe Carson, the Chief Security Scientist for Thycotic . Speaking with Mike Gruen, Cybrary's VP of Engineering, they talk about WFH best practices and the unique issues that arise when your family is home as well.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">00a32138-95ee-4fff-8d76-da2f3c61413e</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 01 Apr 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/528fadde-fa88-49ae-a930-9ead95a68e92/audio-149568-13106-29857-7f19e55a-227d-4768-9f93-abf1a5f30fb1.mp3" length="52738967" type="audio/mpeg"/><itunes:duration>54:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of The Cybrary Podcast we hear from Joe Carson, the Chief Security Scientist for Thycotic . Speaking with Mike Gruen, Cybrary&apos;s VP of Engineering, they talk about WFH best practices and the unique issues that arise when your family is home as well.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Ep. 16 John Liu, Jimmy Whitaker, Uday Kamath | Deep Learning for NLP and Speech Recognition</title><itunes:title>Ep.16 John Liu, Jimmy Whitaker, Uday Kamath | Deep Learning for NLP and Speech Recognition</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Uday Kamath the Chief Analytics Officer at Digital Reasoning, Jimmy Whitaker the Director of Applied Research (Audio) at Digital Reasoning and John Liu, the CEO of Intelluron. Speaking with Leif Jackson, Cybrary's VP of Content and Community, they discuss their book Deep Learning for NLP and Speech Recognition, which includes case studies and implementation of machine learning that are beneficial to both researchers and engineers alike.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Uday Kamath the Chief Analytics Officer at Digital Reasoning, Jimmy Whitaker the Director of Applied Research (Audio) at Digital Reasoning and John Liu, the CEO of Intelluron. Speaking with Leif Jackson, Cybrary's VP of Content and Community, they discuss their book Deep Learning for NLP and Speech Recognition, which includes case studies and implementation of machine learning that are beneficial to both researchers and engineers alike.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">17b5e069-8a36-4348-a382-88db9918ad20</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 25 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d4371b24-2943-4e26-8f3a-16c9def74551/audio-149569-13106-29857-22263261-442f-4d8b-a838-25b87e042a11.mp3" length="21607681" type="audio/mpeg"/><itunes:duration>22:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Uday Kamath the Chief Analytics Officer at Digital Reasoning, Jimmy Whitaker the Director of Applied Research (Audio) at Digital Reasoning and John Liu, the CEO of Intelluron. Speaking with Leif Jackson, Cybrary&apos;s VP of Content and Community, they discuss their book Deep Learning for NLP and Speech Recognition, which includes case studies and implementation of machine learning that are beneficial to both researchers and engineers alike.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 14 Chris Kubecka | Saudi Aramco Hacks</title><itunes:title>Ep. 14 Chris Kubecka | Saudi Aramco Hacks</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Saudi Aramco Hacks took place and what effect it has had on their business.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Saudi Aramco Hacks took place and what effect it has had on their business.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">7502fe07-3afd-40ac-941f-9803ab4f65bc</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 18 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5b93d547-2f42-4a20-97ce-3520bc2b4f93/audio-149570-13106-29857-0c6f7ece-e68b-4d88-86ac-0bd9ec8100e6.mp3" length="12019626" type="audio/mpeg"/><itunes:duration>12:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Saudi Aramco Hacks took place and what effect it has had on their business.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 15 Chris Kubecka | The Coronavirus and Best Tech Practices</title><itunes:title>Ep. 15 Chris Kubecka | The Coronavirus and Best Tech Practices</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Coronavirus has impacted the industry and describes some of the best security practices for companies to follow.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Coronavirus has impacted the industry and describes some of the best security practices for companies to follow.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">df587cf9-f3d8-497c-bff1-e56adaed38f9</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 18 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/92ced7fe-87da-498e-9416-f469f6ee1017/audio-149571-13106-29857-114d9745-e5a0-4a3e-900b-6cb7c587eca8.mp3" length="12700071" type="audio/mpeg"/><itunes:duration>13:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Chris Kubecka, the CEO of HypaSec. Speaking with Leif Jackson, the VP of Content and Community for Cybrary, Chris explains how the Coronavirus has impacted the industry and describes some of the best security practices for companies to follow.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>RSA 2020 Special with David Meltzer and Tim Erlin from Tripwire | The Talent Gap and Sourcing the Right Candidates</title><itunes:title>RSA 2020 Special with David Meltzer and Tim Erlin from Tripwire |  The Talent Gap and Sourcing the Right Candidates</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with David Meltzer the CTO of Tripwire, and Tim Erlin the Vice President of Product Management and Strategy at Tripwire. Speaking with myself Thomas Horlacher the Head of Creative Services at Cybrary, David and Tim give me their thoughts on the talent gap in the Cybersecurity industry.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with David Meltzer the CTO of Tripwire, and Tim Erlin the Vice President of Product Management and Strategy at Tripwire. Speaking with myself Thomas Horlacher the Head of Creative Services at Cybrary, David and Tim give me their thoughts on the talent gap in the Cybersecurity industry.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">d8c9b8c7-5913-4c25-a45f-5f0dadf1a4c8</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Thu, 12 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d328feff-3e6a-4946-b080-f650636e6810/audio-149573-13106-29857-372877ef-fe6a-418d-a487-7b4268888a63.mp3" length="8938613" type="audio/mpeg"/><itunes:duration>09:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with David Meltzer the CTO of Tripwire, and Tim Erlin the Vice President of Product Management and Strategy at Tripwire. Speaking with myself Thomas Horlacher the Head of Creative Services at Cybrary, David and Tim give me their thoughts on the talent gap in the Cybersecurity industry.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Cybrary RSA Conference Battle Royale Episode #4</title><itunes:title>Cybrary RSA Conference Battle Royale Episode #4</itunes:title><description><![CDATA[<p>Welcome to the Fourth episode of The Cybrary Battle Royale Podcast Series, led by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Daniel Clemons, Founder of Shadow Dragon, Jon Brickey the Cybersecurity Evangelist and Senior VP of Mastercard, and Ron Gula the President and Co-Founder of Gula Tech Adventures. Brian leads this All-Star live discussion recorded during an event at RSA about Investing and ROI on a conference floor, and how building relationships and niche connections are more important.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Welcome to the Fourth episode of The Cybrary Battle Royale Podcast Series, led by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Daniel Clemons, Founder of Shadow Dragon, Jon Brickey the Cybersecurity Evangelist and Senior VP of Mastercard, and Ron Gula the President and Co-Founder of Gula Tech Adventures. Brian leads this All-Star live discussion recorded during an event at RSA about Investing and ROI on a conference floor, and how building relationships and niche connections are more important.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">a0622a5e-1171-4dfc-b29c-ee3dccbb2217</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Thu, 12 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/597be3b5-ccfa-4cf1-8c4b-782387d27e9e/audio-149572-13106-29857-8eeb004c-a8ed-4e03-ab91-87c6552fca82.mp3" length="25464545" type="audio/mpeg"/><itunes:duration>26:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome to the Fourth episode of The Cybrary Battle Royale Podcast Series, led by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Daniel Clemons, Founder of Shadow Dragon, Jon Brickey the Cybersecurity Evangelist and Senior VP of Mastercard, and Ron Gula the President and Co-Founder of Gula Tech Adventures. Brian leads this All-Star live discussion recorded during an event at RSA about Investing and ROI on a conference floor, and how building relationships and niche connections are more important.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>RSA 2020 Special with Grant McCracken and Michael Skelton from Bugcrowd | There is no Talent Gap, there is an Opportunity Gap</title><itunes:title>RSA 2020 Special with Grant McCracken and Michael Skelton from Bugcrowd |  There is no Talent Gap, there is an Opportunity Gap</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Grant McCracken the Senior Director of Program and Security Operations at Bugcrowd along with Michael Skelton the Global Head of Security Operations and Researcher Enablement at Bugcrowd. Speaking with myself Thomas Horlacher, the Head of Creative Services at Cybrary, we discuss the current talent gap in the industry and whether there is more of an opportunity gap.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Grant McCracken the Senior Director of Program and Security Operations at Bugcrowd along with Michael Skelton the Global Head of Security Operations and Researcher Enablement at Bugcrowd. Speaking with myself Thomas Horlacher, the Head of Creative Services at Cybrary, we discuss the current talent gap in the industry and whether there is more of an opportunity gap.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">9a7b3753-f7eb-45e7-924c-d308a01c8ef5</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 11 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/406c763e-b6db-4445-9297-61b640bc46ea/audio-149575-13106-29857-8b26bd81-9e72-466b-b35d-fc10435231d0.mp3" length="17957654" type="audio/mpeg"/><itunes:duration>18:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Grant McCracken the Senior Director of Program and Security Operations at Bugcrowd along with Michael Skelton the Global Head of Security Operations and Researcher Enablement at Bugcrowd. Speaking with myself Thomas Horlacher, the Head of Creative Services at Cybrary, we discuss the current talent gap in the industry and whether there is more of an opportunity gap.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Cybrary RSA Conference Battle Royale Episode #3</title><itunes:title>Cybrary RSA Conference Battle Royale Episode #3</itunes:title><description><![CDATA[<p>Welcome to the Third episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Jeff DeFrancesca the Director of Cybersecurity Services at Sayers, Joey Johnson the CISO Premise Health, and Mike Finkel the CEO of Sparksoft. Brian leads this All-Star live discussion recorded during an event at RSA about how skipping the showroom floor has become normal along with the expense of showing at a con and the importance of making sure you actually set up the tools that you're purchasing.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Welcome to the Third episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Jeff DeFrancesca the Director of Cybersecurity Services at Sayers, Joey Johnson the CISO Premise Health, and Mike Finkel the CEO of Sparksoft. Brian leads this All-Star live discussion recorded during an event at RSA about how skipping the showroom floor has become normal along with the expense of showing at a con and the importance of making sure you actually set up the tools that you're purchasing.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">76681e16-3884-44ed-9829-ccc9131f997e</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Wed, 11 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e873d073-0496-43cf-9f5f-bfb7ea634716/audio-149574-13106-29857-6a2ead6b-88fb-4cff-bfa9-be9dff2a5ed2.mp3" length="43981382" type="audio/mpeg"/><itunes:duration>45:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome to the Third episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Jeff DeFrancesca the Director of Cybersecurity Services at Sayers, Joey Johnson the CISO Premise Health, and Mike Finkel the CEO of Sparksoft. Brian leads this All-Star live discussion recorded during an event at RSA about how skipping the showroom floor has become normal along with the expense of showing at a con and the importance of making sure you actually set up the tools that you&apos;re purchasing.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Cybrary RSA Conference Battle Royale Episode #2</title><itunes:title>Cybrary RSA Conference Battle Royale Episode #2</itunes:title><description><![CDATA[<p>Welcome to the Second episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, John Hall VP at CBRE, Linda Martinez the Director of Security and Privacy at Protiviti, and Philip Mayrhofer the CEO of Maltego. Brian leads this All Star live discussion recoded during an event at RSA about how seeing the smaller companies on the floor can be more beneficial than the larger booths.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Welcome to the Second episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, John Hall VP at CBRE, Linda Martinez the Director of Security and Privacy at Protiviti, and Philip Mayrhofer the CEO of Maltego. Brian leads this All Star live discussion recoded during an event at RSA about how seeing the smaller companies on the floor can be more beneficial than the larger booths.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">bb9d9022-8795-472b-9e80-335d1268c902</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Tue, 10 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ac8771a7-76c6-4a6a-b67d-007a8f48ffa3/audio-149576-13106-29857-7008c78e-bbb9-4195-ba06-1988784b3902.mp3" length="23034809" type="audio/mpeg"/><itunes:duration>23:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome to the Second episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, John Hall VP at CBRE, Linda Martinez the Director of Security and Privacy at Protiviti, and Philip Mayrhofer the CEO of Maltego. Brian leads this All Star live discussion recoded during an event at RSA about how seeing the smaller companies on the floor can be more beneficial than the larger booths.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Davis Hake, Co-Founder and VP of Business Development for Arceo RSA 2020</title><itunes:title>Davis Hake, Co-Founder and VP of Business Development for Arceo RSA 2020</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Davis Hake the Co-Founder and VP of Business Development for Arceo. Speaking with myself, Thomas Horlacher the Head of Creative Services for Cybrary, Davis gives me his thoughts on the current talent gap facing the cybersecurity industry.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Davis Hake the Co-Founder and VP of Business Development for Arceo. Speaking with myself, Thomas Horlacher the Head of Creative Services for Cybrary, Davis gives me his thoughts on the current talent gap facing the cybersecurity industry.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">6571aa1d-9abb-46ed-9528-fd170501e6e0</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Tue, 10 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fcd8eaf6-daa7-48b4-9e54-b764652e8925/audio-149577-13106-29857-f6319082-61df-4169-87a4-e3a64698bf6f.mp3" length="17368711" type="audio/mpeg"/><itunes:duration>18:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Davis Hake the Co-Founder and VP of Business Development for Arceo. Speaking with myself, Thomas Horlacher the Head of Creative Services for Cybrary, Davis gives me his thoughts on the current talent gap facing the cybersecurity industry.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Cybrary RSA Conference Battle Royale Episode #1</title><itunes:title>Cybrary RSA Conference Battle Royale Episode #1</itunes:title><description><![CDATA[<p>Welcome to the first episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Chuck Bubeck the Executive Director of the Maryland Innovation Center, Stephen Zalewski the Deputy CISO of Levi's, and Brian McMahon the CEO of Bandura Cyber. Brian leads this All Star live discussion recoded during an event at RSA about what excites them about the conference and what they wish they would have seen on the showroom floor.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Welcome to the first episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Chuck Bubeck the Executive Director of the Maryland Innovation Center, Stephen Zalewski the Deputy CISO of Levi's, and Brian McMahon the CEO of Bandura Cyber. Brian leads this All Star live discussion recoded during an event at RSA about what excites them about the conference and what they wish they would have seen on the showroom floor.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">8543cd35-d787-4975-bc61-130800e05cab</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Mon, 09 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8bd98a09-1900-4acd-a03f-90ff6687f1d0/audio-149578-13106-29857-8df80e83-80d5-4468-b390-df52de6420ea.mp3" length="20804568" type="audio/mpeg"/><itunes:duration>21:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Welcome to the first episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, Chuck Bubeck the Executive Director of the Maryland Innovation Center, Stephen Zalewski the Deputy CISO of Levi&apos;s, and Brian McMahon the CEO of Bandura Cyber. Brian leads this All Star live discussion recoded during an event at RSA about what excites them about the conference and what they wish they would have seen on the showroom floor.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Women Unite Over CTF RSA 2020</title><itunes:title>Women Unite Over CTF RSA 2020</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Chloe the VP of of Strategy for Point3 Security at Point3's Women Unite Over CTF Event at RSA2020. Chloe explains how Point3 started the Women Unite Over CTF event as a way to be more inclusive within the cybersecurity community, and how the skill levels of the event range from beginner to more advanced.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast we sit down with Chloe the VP of of Strategy for Point3 Security at Point3's Women Unite Over CTF Event at RSA2020. Chloe explains how Point3 started the Women Unite Over CTF event as a way to be more inclusive within the cybersecurity community, and how the skill levels of the event range from beginner to more advanced.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">102ed22f-461b-4044-94cd-9c278cfc4317</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Mon, 09 Mar 2020 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0927b5b3-883c-42fc-bb06-fa71b9f442de/audio-149579-13106-29857-4f3dbf18-6777-4db0-89df-66092d337c7e.mp3" length="9272527" type="audio/mpeg"/><itunes:duration>09:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast we sit down with Chloe the VP of of Strategy for Point3 Security at Point3&apos;s Women Unite Over CTF Event at RSA2020. Chloe explains how Point3 started the Women Unite Over CTF event as a way to be more inclusive within the cybersecurity community, and how the skill levels of the event range from beginner to more advanced.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Ep. 13 Saul Costa | Data Science with Next Tech</title><itunes:title>Ep. 13 Saul Costa | Data Science with Next Tech</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Saul Costa the founder and CEO of Next Tech. Speaking with Leif Jackson the VP of Content and Community for Cybrary Saul talks about what Next Tech is up to and which programming language he thinks you should learn first.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Saul Costa the founder and CEO of Next Tech. Speaking with Leif Jackson the VP of Content and Community for Cybrary Saul talks about what Next Tech is up to and which programming language he thinks you should learn first.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">249cac79-4250-483b-9be4-da99058db187</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 04 Mar 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/517e37fb-93cc-4f8e-b3cf-a9068b166d7c/audio-149580-13106-29857-4406a885-aab3-420e-b92b-d8836995370c.mp3" length="26832240" type="audio/mpeg"/><itunes:duration>27:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Saul Costa the founder and CEO of Next Tech. Speaking with Leif Jackson the VP of Content and Community for Cybrary Saul talks about what Next Tech is up to and which programming language he thinks you should learn first.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 12 Advisory Board | The Advisors Have Arrived!</title><itunes:title>Ep.12 Advisory Board | The Advisors Have Arrived!</itunes:title><description><![CDATA[<p>In This episode of The Cybrary Podcast we are happy to welcome Cybrarys new Advisory Board. The members include Chris Kubecka the CEO of HypaSec, Chris Hodson the CISO of Tanium, Vishal Gupta the Global CTO and SVP of Unisys, and Ed Amoroso the CEO of Tag Cyber. It was hard to contain all this knowledge in one show but we are glad to have them on the Cybrary Team!</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In This episode of The Cybrary Podcast we are happy to welcome Cybrarys new Advisory Board. The members include Chris Kubecka the CEO of HypaSec, Chris Hodson the CISO of Tanium, Vishal Gupta the Global CTO and SVP of Unisys, and Ed Amoroso the CEO of Tag Cyber. It was hard to contain all this knowledge in one show but we are glad to have them on the Cybrary Team!</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">683c5dd2-f963-452f-b727-0cc1854d1f9b</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 26 Feb 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4d5de94d-8ed2-441f-a1b7-1f1d1cbc5251/audio-149581-13106-29857-1809d1c7-0fce-461f-b1fc-47eb10af7a3b.mp3" length="21947239" type="audio/mpeg"/><itunes:duration>22:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In This episode of The Cybrary Podcast we are happy to welcome Cybrarys new Advisory Board. The members include Chris Kubecka the CEO of HypaSec, Chris Hodson the CISO of Tanium, Vishal Gupta the Global CTO and SVP of Unisys, and Ed Amoroso the CEO of Tag Cyber. It was hard to contain all this knowledge in one show but we are glad to have them on the Cybrary Team!
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 11 Mike Weigand | Securing Planes, Trains and Tanks</title><itunes:title>Ep.11 Mike Weigand | Securing Planes, Trains and Tanks</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Mike Weigand the founder and CEO of Shift5. Speaking with Cybrarys head of infrastructure Jonathan Meyers and Joe Perry, Mike explains the mission of Shift5 and how they are working to secure commercial equipment. Mike and Jonathan also discuss their time at the United States Military Academy Westpoint.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Mike Weigand the founder and CEO of Shift5. Speaking with Cybrarys head of infrastructure Jonathan Meyers and Joe Perry, Mike explains the mission of Shift5 and how they are working to secure commercial equipment. Mike and Jonathan also discuss their time at the United States Military Academy Westpoint.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">42adcd3f-9ba7-4dcf-a38d-4a10f4e3ddbc</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 19 Feb 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/54a28c2e-04ee-4085-8838-b7529973fa92/audio-157244-13718-883-53f0386c-8eb8-44fe-8be0-8184faa73fd2.mp3" length="47804586" type="audio/mpeg"/><itunes:duration>49:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Mike Weigand the founder and CEO of Shift5. Speaking with Cybrarys head of infrastructure Jonathan Meyers and Joe Perry, Mike explains the mission of Shift5 and how they are working to secure commercial equipment. Mike and Jonathan also discuss their time at the United States Military Academy Westpoint.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 10 - Cybrary on The Road 02 - Evan Dornbush</title><itunes:title>Ep.10 - Cybrary on The Road 02 - Evan Dornbush</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Jonathan, the Head of Infrastructure for Cybrary and Evan Dornbush the Co-Founder and CEO of Point3 Security as they discuss how Point3 Security is using a gamified learning solution to help people and enterprises.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Jonathan, the Head of Infrastructure for Cybrary and Evan Dornbush the Co-Founder and CEO of Point3 Security as they discuss how Point3 Security is using a gamified learning solution to help people and enterprises.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">7073f8e2-64ba-46c0-923a-e0b01d4cd7d2</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 12 Feb 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/47472e81-b6c6-4005-b353-ea3ebdf00bf3/audio-157245-13718-883-617a3048-0ad7-489b-a3aa-6ee5bfc52882.mp3" length="8012333" type="audio/mpeg"/><itunes:duration>08:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Jonathan, the Head of Infrastructure for Cybrary and Evan Dornbush the Co-Founder and CEO of Point3 Security as they discuss how Point3 Security is using a gamified learning solution to help people and enterprises.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 9 Vishal Gupta and Stephen Boughner | AI, Machine Learning and You</title><itunes:title>Ep.09 Vishal Gupta and Stephen Boughner | AI, Machine Learning and You</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Vishal Gupta the Global CTO and Senior Vice President of Unisys and Stephen Boughner a Partner at NISP Law. Joined by Cybrarys VP of Content and Community Leif Jackson, they discuss how AI and Machine Learning are affecting the cybersecurity space.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Vishal Gupta the Global CTO and Senior Vice President of Unisys and Stephen Boughner a Partner at NISP Law. Joined by Cybrarys VP of Content and Community Leif Jackson, they discuss how AI and Machine Learning are affecting the cybersecurity space.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">202397d7-c705-4b0b-8726-81b9819ae822</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 05 Feb 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/29dcd303-6302-44c3-be6a-91f804026b91/audio-157246-13718-883-bd5a8c34-9f0c-4f62-bf5e-9cdf612105f0.mp3" length="49186216" type="audio/mpeg"/><itunes:duration>51:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Vishal Gupta the Global CTO and Senior Vice President of Unisys and Stephen Boughner a Partner at NISP Law. Joined by Cybrarys VP of Content and Community Leif Jackson, they discuss how AI and Machine Learning are affecting the cybersecurity space.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Road to RSA 2020 Ep.03 - Cybrary Community</title><itunes:title>Road to RSA 2020 Ep.03 - Cybrary Community</itunes:title><description><![CDATA[<p>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Sam from our Content and Community Team we speak about what he is looking to get out of RSA.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Sam from our Content and Community Team we speak about what he is looking to get out of RSA.</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">bc5fde56-27f8-4f57-a3f4-7693f98ccafc</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Tue, 04 Feb 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2565de14-1d48-4082-bee2-b1b0811c4f5f/audio-157247-13718-883-b17dacd6-eb9a-4d48-92fa-cfd87d54330e.mp3" length="10192966" type="audio/mpeg"/><itunes:duration>10:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Sam from our Content and Community Team we speak about what he is looking to get out of RSA.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Ep. 8 Cory Siskind | Global Workforce in the Cartel Era</title><itunes:title>Ep.08 Cory Siskind | Global Workforce in the Cartel Era</itunes:title><description><![CDATA[<p>In This episode of the Cybrary Podcast we sit down with Cory Siskind the CEO of Base Operations with Ryan Corey the CEO of Cybrary and Mike Gruen the CISO of Cybrary. Cory talks about Base Operations and how the company is working to help secure your global workforce.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In This episode of the Cybrary Podcast we sit down with Cory Siskind the CEO of Base Operations with Ryan Corey the CEO of Cybrary and Mike Gruen the CISO of Cybrary. Cory talks about Base Operations and how the company is working to help secure your global workforce.&nbsp;</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">540f12da-15db-4825-bdb6-562720ca78ea</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 29 Jan 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/567fc599-ab7d-4c65-aa3f-114465071f8b/audio-157248-13718-883-87ff1399-193f-46cc-991f-5ee7c04fdd56.mp3" length="31416869" type="audio/mpeg"/><itunes:duration>32:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In This episode of the Cybrary Podcast we sit down with Cory Siskind the CEO of Base Operations with Ryan Corey the CEO of Cybrary and Mike Gruen the CISO of Cybrary. Cory talks about Base Operations and how the company is working to help secure your global workforce. 
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Road to RSA 2020 Ep.02 - Sales and Customer Success</title><itunes:title>Road to RSA 2020 Ep.02 - Sales and Customer Success</itunes:title><description><![CDATA[<p>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Gunner, and Scott from the Cybrary Sales Team and Danyelle from Customer Success we speak about what each of them is looking forward to this year at RSA. As well as what a successful RSA looks like to them.&nbsp;</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Gunner, and Scott from the Cybrary Sales Team and Danyelle from Customer Success we speak about what each of them is looking forward to this year at RSA. As well as what a successful RSA looks like to them.&nbsp;</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">12ed3acc-2bce-49b4-a6e2-8a9398a5b663</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Tue, 28 Jan 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d03123a2-c429-455f-bb8f-272b973e7245/audio-157249-13718-883-da0fd631-97e5-4479-9b80-ffb920cd5e46.mp3" length="15050618" type="audio/mpeg"/><itunes:duration>15:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Gunner, and Scott from the Cybrary Sales Team and Danyelle from Customer Success we speak about what each of them is looking forward to this year at RSA. As well as what a successful RSA looks like to them. 
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Ep. 7 Jim Kowatch | Infosec learning and the growing EDU space</title><itunes:title>Ep.07 Jim Kowatch | Infosec learning and the growing EDU space</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Jim Kowatch the founder and President of infosec learning, a virtual lab platform that has focused on the EDU space. Joined by Cybrarys CEO Ryan Corey and Chief Product Officer Trevor Halstead Jim explains how infosec learning got started in the education sector and the changes they are helping to make.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Jim Kowatch the founder and President of infosec learning, a virtual lab platform that has focused on the EDU space. Joined by Cybrarys CEO Ryan Corey and Chief Product Officer Trevor Halstead Jim explains how infosec learning got started in the education sector and the changes they are helping to make.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">b261c391-4df3-4c0d-ac5c-73cbbbd79014</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 22 Jan 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1f0fba23-4e95-4d72-b5b2-f85ba25733e6/audio-157250-13718-883-c83ddeb1-2872-4dae-a18b-2b1826f14489.mp3" length="28232980" type="audio/mpeg"/><itunes:duration>29:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Jim Kowatch the founder and President of infosec learning, a virtual lab platform that has focused on the EDU space. Joined by Cybrarys CEO Ryan Corey and Chief Product Officer Trevor Halstead Jim explains how infosec learning got started in the education sector and the changes they are helping to make.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Road to RSA 2020 Ep.01 - Marketing and Biz Dev</title><itunes:title>Road to RSA 2020 Ep.01 - Marketing and Biz Dev</itunes:title><description><![CDATA[<p>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Cami and Amanda from Cybrary's Marketing and BizDev team we speak about what goes into planning a conference and the events that our team will be attending while at RSA.&nbsp;</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Cami and Amanda from Cybrary's Marketing and BizDev team we speak about what goes into planning a conference and the events that our team will be attending while at RSA.&nbsp;</p>
<p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p>
<p><strong>Check out Cybrary Now!!!</strong></p>
<p>~<a href="https://www.cybrary.it/" target="_self">Cybrary</a>&nbsp;</p>
<p><strong>Follow Thor on Twitter!</strong></p>
<p>~<a href="https://twitter.com/thorin_around" target="_self">@thorin_around</a>&nbsp;</p>
<p><strong>Follow Cybrary on Social!!</strong></p>
<p>~<a href="https://twitter.com/cybraryIT" target="_self">Twitter</a>&nbsp;</p>
<p>~<a href="https://www.instagram.com/cybrary.it/" target="_self">Instagram</a>&nbsp;</p>
<p>~<a href="https://www.facebook.com/cybraryit/" target="_self">FaceBook</a>&nbsp;</p>
<p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" target="_self">YouTube</a>&nbsp;</p>
<p>~<a href="https://www.linkedin.com/company/cybrary/" target="_self">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">d5eda1b0-082b-484f-98de-8e759ccd8667</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary Inc]]></dc:creator><pubDate>Tue, 21 Jan 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f2515044-b24b-44b5-900a-cf8aaf0b01cf/audio-157251-13718-883-794afc21-c80d-4a12-8a4c-7270e625a14c.mp3" length="14642352" type="audio/mpeg"/><itunes:duration>15:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this limited series episode of the Cybrary Podcast we look at RSA 2020 and what goes into planning and having a successful con. Sitting down with Cami and Amanda from Cybrary&apos;s Marketing and BizDev team we speak about what goes into planning a conference and the events that our team will be attending while at RSA. 
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary Inc</itunes:author></item><item><title>Ep. 6 - Cybrary on The Road 01 - Joe Loomis | CEO of Cybersponse</title><itunes:title>Ep.06 - Cybrary on The Road 01 - Joe Loomis | CEO of Cybersponse</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ryan Corey the Co-Founder and CEO of Cybrary as he speaks with Joe Loomis the Founder and CEO of Cybersponse as they discuss the IRC (Incident Response Consortium).</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Ryan Corey the Co-Founder and CEO of Cybrary as he speaks with Joe Loomis the Founder and CEO of Cybersponse as they discuss the IRC (Incident Response Consortium).</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">fdd5ce38-a3a3-43d4-91c2-416b75ebc0c9</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Wed, 15 Jan 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0ef6a808-b194-4886-89a8-b9439053aa4e/audio-157252-13718-883-3327dd50-9632-44ba-a462-a7a80bba9bb1.mp3" length="7261904" type="audio/mpeg"/><itunes:duration>07:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Ryan Corey the Co-Founder and CEO of Cybrary as he speaks with Joe Loomis the Founder and CEO of Cybersponse as they discuss the IRC (Incident Response Consortium).
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 5 Jeff Man | Road to Tribe of Hackers</title><itunes:title>Ep.05 Jeff Man | Road to Tribe of Hackers</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Jeff Man, currently working as a Senior Information Security Consultant Jeff needs no introduction to those within the hacking community. Speaking with Cybrarys Head of Infrastructure Jonathan Meyers, Jeff takes us from how he got his start in cybersecurity to contributing to the book Tribe of Hackers Cybersecurity advice from the best hackers in the world, on sale now.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Jeff Man, currently working as a Senior Information Security Consultant Jeff needs no introduction to those within the hacking community. Speaking with Cybrarys Head of Infrastructure Jonathan Meyers, Jeff takes us from how he got his start in cybersecurity to contributing to the book Tribe of Hackers Cybersecurity advice from the best hackers in the world, on sale now.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">7ed1e7f0-091a-4876-a83a-fac81f309054</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 03 Jan 2020 20:03:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8863c8b7-6cc8-4a1b-b721-7d3987f1d62e/audio-157253-13718-883-b2b3872d-1fe4-4fe3-b43a-452101fcada5.mp3" length="62315843" type="audio/mpeg"/><itunes:duration>01:04:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Jeff Man, currently working as a Senior Information Security Consultant Jeff needs no introduction to those within the hacking community. Speaking with Cybrarys Head of Infrastructure Jonathan Meyers, Jeff takes us from how he got his start in cybersecurity to contributing to the book Tribe of Hackers Cybersecurity advice from the best hackers in the world, on sale now.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 4 Casey Ellis | Bugcrowd and Responsible Disclosures</title><itunes:title>Ep.04 Casey Ellis | Bugcrowd and Responsible Disclosures</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Casey Ellis the Founder and CTO of Bugcrowd. Speaking with Cybrarys VP of Engineering Mike Gruen, Casey explains how Bugcrowd is a community for creating feedback loops between people who think differently and how the term responsible disclosure got its name.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Casey Ellis the Founder and CTO of Bugcrowd. Speaking with Cybrarys VP of Engineering Mike Gruen, Casey explains how Bugcrowd is a community for creating feedback loops between people who think differently and how the term responsible disclosure got its name.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">75bba7f9-7426-4f5a-af66-500f6155051f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 03 Jan 2020 20:02:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d357237b-0dad-41f3-aa03-d6cdf7f46320/audio-157254-13718-883-eaec8872-8988-454d-92eb-87f67db20518.mp3" length="56865517" type="audio/mpeg"/><itunes:duration>59:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Casey Ellis the Founder and CTO of Bugcrowd. Speaking with Cybrarys VP of Engineering Mike Gruen, Casey explains how Bugcrowd is a community for creating feedback loops between people who think differently and how the term responsible disclosure got its name.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 3 John Czupak | Sourcefire, SNORT and Threatquotient Oh My</title><itunes:title>Ep.03 John Czupak | Sourcefire, SNORT and Threatquotient Oh My</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with John Czupak the CEO of ThreatQuotient. Speaking with Cybrary CEO Ralph Sita and Myself Thomas Horlacher the Head of Creative Services, John discusses being at Sourcefire during the creation of the SNORT technology and how now at Threatquotient they are working to help with the issue of Alert Fatigue for security teams.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with John Czupak the CEO of ThreatQuotient. Speaking with Cybrary CEO Ralph Sita and Myself Thomas Horlacher the Head of Creative Services, John discusses being at Sourcefire during the creation of the SNORT technology and how now at Threatquotient they are working to help with the issue of Alert Fatigue for security teams.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">0e0307ea-7528-47b0-a339-925d1affb297</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 03 Jan 2020 20:01:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/48f25813-c4d8-4786-a979-4315bd8a8a2d/audio-157255-13718-883-3eb062a5-0dfa-42c6-851b-2c7fd05afd51.mp3" length="23068258" type="audio/mpeg"/><itunes:duration>24:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with John Czupak the CEO of ThreatQuotient. Speaking with Cybrary CEO Ralph Sita and Myself Thomas Horlacher the Head of Creative Services, John discusses being at Sourcefire during the creation of the SNORT technology and how now at Threatquotient they are working to help with the issue of Alert Fatigue for security teams.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 2 Chris Kubecka | Hack The World</title><itunes:title>Ep.02 Chris Kubecka | Hack The World</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Chris Kubecka the owner and CEO of HypaSec. Chris is an author of multiple books on computer science and penetration testing and has given countless talks across the globe on the subject. Speaking with Cybrarys VP of Content and Community Leif Jackson, they talk about her newest book Hack the world with OSINT.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we sit down with Chris Kubecka the owner and CEO of HypaSec. Chris is an author of multiple books on computer science and penetration testing and has given countless talks across the globe on the subject. Speaking with Cybrarys VP of Content and Community Leif Jackson, they talk about her newest book Hack the world with OSINT.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">fa4c38b2-7fd5-4f1b-8c75-3a055f8a884f</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 03 Jan 2020 20:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/99d2e46d-7558-4aab-b3a6-14f24647ae16/audio-157256-13718-883-d18af84e-e9b7-4ce8-9d2c-d3f2e33d99ee.mp3" length="34067151" type="audio/mpeg"/><itunes:duration>35:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we sit down with Chris Kubecka the owner and CEO of HypaSec. Chris is an author of multiple books on computer science and penetration testing and has given countless talks across the globe on the subject. Speaking with Cybrarys VP of Content and Community Leif Jackson, they talk about her newest book Hack the world with OSINT.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item><item><title>Ep. 1 Ron Gula | Gula Tech Adventures and Investing Best Practices</title><itunes:title>Ep.01 Ron Gula | Gula Tech Adventures and Investing Best Practices</itunes:title><description><![CDATA[<p>In this episode of the Cybrary Podcast, we are happy to welcome Ron Gula. Joined by Cybrarys own CEO Ryan Corey and President Ralph Sita. Ron Gula is the co-founder and former CEO of Tenable who now runs Gula Tech Adventures, an investment firm that focuses on cyber companies including Cybrary.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybrary Podcast, we are happy to welcome Ron Gula. Joined by Cybrarys own CEO Ryan Corey and President Ralph Sita. Ron Gula is the co-founder and former CEO of Tenable who now runs Gula Tech Adventures, an investment firm that focuses on cyber companies including Cybrary.</p><p><strong>Don't forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!</strong></p><p><br></p><p><strong>Check out Cybrary Now!!!</strong></p><p><br></p><p>~<a href="https://www.cybrary.it/" rel="noopener noreferrer" target="_blank">Cybrary</a>&nbsp;</p><p><br></p><p><strong>Follow Thor on Twitter!</strong></p><p><br></p><p>~<a href="https://twitter.com/thorin_around" rel="noopener noreferrer" target="_blank">@thorin_around</a>&nbsp;</p><p><br></p><p><strong>Follow Cybrary on Social!!</strong></p><p><br></p><p>~<a href="https://twitter.com/cybraryIT" rel="noopener noreferrer" target="_blank">Twitter</a>&nbsp;</p><p><br></p><p>~<a href="https://www.instagram.com/cybrary.it/" rel="noopener noreferrer" target="_blank">Instagram</a>&nbsp;</p><p><br></p><p>~<a href="https://www.facebook.com/cybraryit/" rel="noopener noreferrer" target="_blank">FaceBook</a>&nbsp;</p><p><br></p><p>~<a href="https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA" rel="noopener noreferrer" target="_blank">YouTube</a>&nbsp;</p><p><br></p><p>~<a href="https://www.linkedin.com/company/cybrary/" rel="noopener noreferrer" target="_blank">LinkedIn</a>&nbsp;&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybrary.sounder.fm]]></link><guid isPermaLink="false">7ca7ff33-aae0-48e9-b39d-4005cf0ed174</guid><itunes:image href="https://artwork.captivate.fm/8222e40f-72f5-4d7d-971c-14a70b6ebda4/p1xnAfcnwfhN7dAHNc4ERh6-.jpg"/><dc:creator><![CDATA[Cybrary]]></dc:creator><pubDate>Fri, 03 Jan 2020 19:03:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/51dc265f-a975-4a00-9548-462e97f1a9a9/audio-157257-13718-883-4cc716cc-bc9b-4e53-83e4-1b72691d9658.mp3" length="44271770" type="audio/mpeg"/><itunes:duration>46:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode of the Cybrary Podcast, we are happy to welcome Ron Gula. Joined by Cybrarys own CEO Ryan Corey and President Ralph Sita. Ron Gula is the co-founder and former CEO of Tenable who now runs Gula Tech Adventures, an investment firm that focuses on cyber companies including Cybrary.
Don&apos;t forget to rate, review &amp; subscribe to us on Apple Podcasts, Spotify, and YouTube!
Check out Cybrary Now!!!
~Cybrary 
Follow Thor on Twitter!
~@thorin_around 
Follow Cybrary on Social!!
~Twitter 
~Instagram 
~FaceBook 
~YouTube 
~LinkedIn</itunes:summary><itunes:author>Cybrary</itunes:author></item></channel></rss>