<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/absolutely-critical/" rel="self" type="application/rss+xml"/><title><![CDATA[Absolutely Critical]]></title><podcast:guid>6da2f62d-8e53-5ec2-b385-4c4fe88e70dd</podcast:guid><lastBuildDate>Wed, 25 Mar 2026 11:00:21 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Fortress Information Security]]></copyright><managingEditor>Fortress Information Security</managingEditor><itunes:summary><![CDATA[Absolutely Critical, a podcast by Fortress, goes inside how today’s leaders defend the systems, partners, and infrastructure their missions depend on from relentless cyber threats. Spanning government and commercial industries, the show explores what it takes to protect operations where disruption, compromise, or failure is not an option. Each episode delivers hard lessons, real strategies, and the technologies that stop cyber threats before they become mission failures.

Hosted by Lee Mangold, a cybersecurity leader with over 20 years of experience securing mission-critical systems for the U.S. Department of War, intelligence organizations, and some of the world’s largest enterprises.]]></itunes:summary><image><url>https://artwork.captivate.fm/1f875347-0372-4fd7-aab4-68f059d54e97/AC-Planes-3000x3000-2.png</url><title>Absolutely Critical</title><link><![CDATA[https://www.fortressinfosec.com/podcast]]></link></image><itunes:image href="https://artwork.captivate.fm/1f875347-0372-4fd7-aab4-68f059d54e97/AC-Planes-3000x3000-2.png"/><itunes:owner><itunes:name>Fortress Information Security</itunes:name></itunes:owner><itunes:author>Fortress Information Security</itunes:author><description>Absolutely Critical, a podcast by Fortress, goes inside how today’s leaders defend the systems, partners, and infrastructure their missions depend on from relentless cyber threats. Spanning government and commercial industries, the show explores what it takes to protect operations where disruption, compromise, or failure is not an option. Each episode delivers hard lessons, real strategies, and the technologies that stop cyber threats before they become mission failures.

Hosted by Lee Mangold, a cybersecurity leader with over 20 years of experience securing mission-critical systems for the U.S. Department of War, intelligence organizations, and some of the world’s largest enterprises.</description><link>https://www.fortressinfosec.com/podcast</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[A Podcast on the Front Lines of Cyber Supply Chain Defense]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>serial</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="News"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>When Risk Stops Being Red and Starts Being Real: Escaping Crayon‑Level Risk Models in High‑Stakes Environments</title><itunes:title>When Risk Stops Being Red and Starts Being Real: Escaping Crayon‑Level Risk Models in High‑Stakes Environments</itunes:title><description><![CDATA[<p>In this episode of the Absolutely Critical podcast, host Lee Mangold explores the often-avoided world of risk management with David White, Co-founder of Axio. While many organizations treat risk as a mere checkbox for auditors, David argues it must be a repeatable "machine" that drives executive decisions. They dive into the limitations of qualitative 5x5 matrices, often called the "lighter shade of red" problem, and explain why CISOs must adopt the language of finance to successfully compete for budget.</p><p>The conversation highlights practical strategies for simplifying quantification, avoiding the trap of "risk register bloat," and understanding the true meaning of financial resilience. David also shares a simple, high-impact method to start quantifying risk today without a massive budget or complex tools. Whether you are a CISO or a security practitioner, this episode provides the framework to move your program from guesswork to grounded financial insights.</p><p>You’ll learn more about:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>The Language of Business:</strong> Why "red" risks fail in boardrooms and how to translate security threats into dollar amounts.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Quantification Simplified:</strong> How to focus on "good enough" data for decision-making rather than pursuing unnecessary decimal-point precision.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>The 15-Slot Rule:</strong> Strategies for managing risk register bloat by making every entry "earn its space".</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Vulnerability vs. Risk:</strong> Defining the critical difference between a technical system weakness and a business impact.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>The Tabletop Tally:</strong> A practical method to calculate actual event costs during your next security drill.</li></ol><br/><p><strong>This podcast is for:</strong> CISOs, GRC professionals, and security leaders responsible for protecting critical infrastructure and human capital against evolving AI-driven threats.</p><p>Learn More About Fortress: <u><a href="https://www.fortressinfosec.com/" rel="noopener noreferrer" target="_blank">https://www.fortressinfosec.com/</a></u> </p><p>Connect With Lee: ​​<u><a href="https://www.linkedin.com/in/leemangold/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/leemangold/</a></u></p><p>Connect With David: <u><a href="https://www.linkedin.com/in/dwhite-axio/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dwhite-axio/</a></u> </p>]]></description><content:encoded><![CDATA[<p>In this episode of the Absolutely Critical podcast, host Lee Mangold explores the often-avoided world of risk management with David White, Co-founder of Axio. While many organizations treat risk as a mere checkbox for auditors, David argues it must be a repeatable "machine" that drives executive decisions. They dive into the limitations of qualitative 5x5 matrices, often called the "lighter shade of red" problem, and explain why CISOs must adopt the language of finance to successfully compete for budget.</p><p>The conversation highlights practical strategies for simplifying quantification, avoiding the trap of "risk register bloat," and understanding the true meaning of financial resilience. David also shares a simple, high-impact method to start quantifying risk today without a massive budget or complex tools. Whether you are a CISO or a security practitioner, this episode provides the framework to move your program from guesswork to grounded financial insights.</p><p>You’ll learn more about:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>The Language of Business:</strong> Why "red" risks fail in boardrooms and how to translate security threats into dollar amounts.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Quantification Simplified:</strong> How to focus on "good enough" data for decision-making rather than pursuing unnecessary decimal-point precision.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>The 15-Slot Rule:</strong> Strategies for managing risk register bloat by making every entry "earn its space".</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Vulnerability vs. Risk:</strong> Defining the critical difference between a technical system weakness and a business impact.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>The Tabletop Tally:</strong> A practical method to calculate actual event costs during your next security drill.</li></ol><br/><p><strong>This podcast is for:</strong> CISOs, GRC professionals, and security leaders responsible for protecting critical infrastructure and human capital against evolving AI-driven threats.</p><p>Learn More About Fortress: <u><a href="https://www.fortressinfosec.com/" rel="noopener noreferrer" target="_blank">https://www.fortressinfosec.com/</a></u> </p><p>Connect With Lee: ​​<u><a href="https://www.linkedin.com/in/leemangold/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/leemangold/</a></u></p><p>Connect With David: <u><a href="https://www.linkedin.com/in/dwhite-axio/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dwhite-axio/</a></u> </p>]]></content:encoded><link><![CDATA[https://www.fortressinfosec.com/podcast]]></link><guid isPermaLink="false">b64cf714-6095-4dc8-b0e4-cde26f44a773</guid><itunes:image href="https://artwork.captivate.fm/1f875347-0372-4fd7-aab4-68f059d54e97/AC-Planes-3000x3000-2.png"/><pubDate>Wed, 25 Mar 2026 07:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/b64cf714-6095-4dc8-b0e4-cde26f44a773.mp3" length="52680577" type="audio/mpeg"/><itunes:duration>36:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode></item><item><title>The Hidden Cost of Deepfakes: How AI Impersonation Disrupts Organizations</title><itunes:title>The Hidden Cost of Deepfakes: How AI Impersonation Disrupts Organizations</itunes:title><description><![CDATA[<p>The AI revolution has arrived, and the primary target isn't your software, it’s your human instincts. In this episode of Absolutely Critical, host Lee Mangold sits down with 25-year cybersecurity veteran James McQuiggan to explore the high-stakes world of AI-driven social engineering.</p><p>They break down the "wake-up call" story of a global organization that lost $25 million to a deepfake video call and discuss how attackers clone a voice with just 10 seconds of audio. James also provides a framework for defense, from implementing family "code words" to leveraging AI in GRC (Governance, Risk, and Compliance) without losing human oversight.</p><p>You’ll learn more about:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Human Vulnerability: Why attackers prioritize "soft targets" over zero-day exploits.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The $25M Deepfake: Anatomy of a multi-layered impersonation attack.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI in Governance: Using generative AI to baseline policies and automate audit prep.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Polite Paranoia: Practical strategies to verify identity in a synthetic world.</li></ol><br/><p><strong>This podcast is for:</strong> CISOs, GRC professionals, and security leaders responsible for protecting critical infrastructure and human capital against evolving AI-driven threats.</p><p>Learn More About Fortress: <u><a href="https://www.fortressinfosec.com/" rel="noopener noreferrer" target="_blank">https://www.fortressinfosec.com/</a></u></p><p>Connect With Lee: ​​<u><a href="https://www.linkedin.com/in/leemangold/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/leemangold/</a></u></p><p>Connect With James: <u><a href="https://www.linkedin.com/in/jmcquiggan/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jmcquiggan/</a></u></p>]]></description><content:encoded><![CDATA[<p>The AI revolution has arrived, and the primary target isn't your software, it’s your human instincts. In this episode of Absolutely Critical, host Lee Mangold sits down with 25-year cybersecurity veteran James McQuiggan to explore the high-stakes world of AI-driven social engineering.</p><p>They break down the "wake-up call" story of a global organization that lost $25 million to a deepfake video call and discuss how attackers clone a voice with just 10 seconds of audio. James also provides a framework for defense, from implementing family "code words" to leveraging AI in GRC (Governance, Risk, and Compliance) without losing human oversight.</p><p>You’ll learn more about:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Human Vulnerability: Why attackers prioritize "soft targets" over zero-day exploits.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The $25M Deepfake: Anatomy of a multi-layered impersonation attack.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI in Governance: Using generative AI to baseline policies and automate audit prep.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Polite Paranoia: Practical strategies to verify identity in a synthetic world.</li></ol><br/><p><strong>This podcast is for:</strong> CISOs, GRC professionals, and security leaders responsible for protecting critical infrastructure and human capital against evolving AI-driven threats.</p><p>Learn More About Fortress: <u><a href="https://www.fortressinfosec.com/" rel="noopener noreferrer" target="_blank">https://www.fortressinfosec.com/</a></u></p><p>Connect With Lee: ​​<u><a href="https://www.linkedin.com/in/leemangold/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/leemangold/</a></u></p><p>Connect With James: <u><a href="https://www.linkedin.com/in/jmcquiggan/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jmcquiggan/</a></u></p>]]></content:encoded><link><![CDATA[https://www.fortressinfosec.com/podcast]]></link><guid isPermaLink="false">c09f417e-2285-4639-bf43-05d6c669d4e0</guid><itunes:image href="https://artwork.captivate.fm/1f875347-0372-4fd7-aab4-68f059d54e97/AC-Planes-3000x3000-2.png"/><pubDate>Wed, 25 Feb 2026 07:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c09f417e-2285-4639-bf43-05d6c669d4e0.mp3" length="43896785" type="audio/mpeg"/><itunes:duration>30:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode></item><item><title>Absolutely Critical by Fortress</title><itunes:title>Absolutely Critical by Fortress</itunes:title><description><![CDATA[<p><strong>Absolutely Critical, </strong>a podcast by Fortress, goes inside how today’s leaders defend the systems, partners, and infrastructure their missions depend on from relentless cyber threats. Spanning government and commercial industries, the show explores what it takes to protect operations where disruption, compromise, or failure is not an option. Each episode delivers hard lessons, real strategies, and the technologies that stop cyber threats before they become mission failures.</p><p>Hosted by <strong>Lee Mangold,</strong> a cybersecurity leader with over 20 years of experience securing mission-critical systems for the U.S. Department of War, intelligence organizations, and some of the world’s largest enterprises.</p>]]></description><content:encoded><![CDATA[<p><strong>Absolutely Critical, </strong>a podcast by Fortress, goes inside how today’s leaders defend the systems, partners, and infrastructure their missions depend on from relentless cyber threats. Spanning government and commercial industries, the show explores what it takes to protect operations where disruption, compromise, or failure is not an option. Each episode delivers hard lessons, real strategies, and the technologies that stop cyber threats before they become mission failures.</p><p>Hosted by <strong>Lee Mangold,</strong> a cybersecurity leader with over 20 years of experience securing mission-critical systems for the U.S. Department of War, intelligence organizations, and some of the world’s largest enterprises.</p>]]></content:encoded><link><![CDATA[https://www.fortressinfosec.com/podcast]]></link><guid isPermaLink="false">8f9edcdc-70cf-4686-a5a1-c094cfdd3a15</guid><itunes:image href="https://artwork.captivate.fm/1f875347-0372-4fd7-aab4-68f059d54e97/AC-Planes-3000x3000-2.png"/><pubDate>Tue, 24 Feb 2026 06:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8f9edcdc-70cf-4686-a5a1-c094cfdd3a15.mp3" length="2156880" type="audio/mpeg"/><itunes:duration>01:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>trailer</itunes:episodeType></item></channel></rss>