<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/behind-the-breach/" rel="self" type="application/rss+xml"/><title><![CDATA[Behind the Breach]]></title><podcast:guid>756fe0f2-4c38-52f7-9711-2ead46d0cc6a</podcast:guid><lastBuildDate>Wed, 15 Apr 2026 22:11:18 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Cowbell]]></copyright><managingEditor>Cowbell</managingEditor><itunes:summary><![CDATA[Behind the Breach takes you inside the moments that define a cyber incident.  Each episode walks through a real or simulated breach step by step — from detection to containment to recovery — with insights from incident response experts on what actually happens when systems go down and decisions matter most.  Designed for insurance brokers, business leaders, and anyone responsible for managing cyber risk, the series explores not just how breaches unfold, but what organizations can do to respond with clarity and control.]]></itunes:summary><image><url>https://artwork.captivate.fm/d035e16b-b893-42ca-a4c6-0063e3ab1aef/CB-PodcastThumbnail-2800px.png</url><title>Behind the Breach</title><link><![CDATA[https://behind-the-breach.captivate.fm]]></link></image><itunes:image href="https://artwork.captivate.fm/d035e16b-b893-42ca-a4c6-0063e3ab1aef/CB-PodcastThumbnail-2800px.png"/><itunes:owner><itunes:name>Cowbell</itunes:name></itunes:owner><itunes:author>Cowbell</itunes:author><description>Behind the Breach takes you inside the moments that define a cyber incident.  Each episode walks through a real or simulated breach step by step — from detection to containment to recovery — with insights from incident response experts on what actually happens when systems go down and decisions matter most.  Designed for insurance brokers, business leaders, and anyone responsible for managing cyber risk, the series explores not just how breaches unfold, but what organizations can do to respond with clarity and control.</description><link>https://behind-the-breach.captivate.fm</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Real cyber incidents, unpacked for brokers and business leaders.]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>serial</itunes:type><itunes:category text="Business"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Inside the First 24 Hours of a Breach</title><itunes:title>Inside the First 24 Hours of a Breach</itunes:title><description><![CDATA[<p>When a ransomware attack hits, the first 24 hours shape how an organization responds.</p><p>In this episode of <em>Behind the Breach</em>, we walk through a simulated cyber incident in real time — following a fictional company from initial detection through containment, investigation, and the path toward stability.</p><p>Joined by Cowbell’s Resiliency Services leaders, Matthieu Chan Tsin and Joe Hoosech, this episode explores what actually happens inside an organization during a breach — not in theory, but in practice.</p><p>You’ll hear:</p><ul><li>What the earliest signs of an attack look like</li><li>How teams move from detection to containment</li><li>The role of incident response planning in the first hours</li><li>How forensic investigations begin</li><li>What stability looks like after the initial disruption</li></ul><br/><p>This is a narrative walkthrough designed to help brokers and business leaders better understand how cyber incidents unfold — and how response takes shape in real time.</p>]]></description><content:encoded><![CDATA[<p>When a ransomware attack hits, the first 24 hours shape how an organization responds.</p><p>In this episode of <em>Behind the Breach</em>, we walk through a simulated cyber incident in real time — following a fictional company from initial detection through containment, investigation, and the path toward stability.</p><p>Joined by Cowbell’s Resiliency Services leaders, Matthieu Chan Tsin and Joe Hoosech, this episode explores what actually happens inside an organization during a breach — not in theory, but in practice.</p><p>You’ll hear:</p><ul><li>What the earliest signs of an attack look like</li><li>How teams move from detection to containment</li><li>The role of incident response planning in the first hours</li><li>How forensic investigations begin</li><li>What stability looks like after the initial disruption</li></ul><br/><p>This is a narrative walkthrough designed to help brokers and business leaders better understand how cyber incidents unfold — and how response takes shape in real time.</p>]]></content:encoded><link><![CDATA[https://behind-the-breach.captivate.fm]]></link><guid isPermaLink="false">c9357837-e533-46c6-95fe-3ba776ef665c</guid><itunes:image href="https://artwork.captivate.fm/d035e16b-b893-42ca-a4c6-0063e3ab1aef/CB-PodcastThumbnail-2800px.png"/><pubDate>Wed, 15 Apr 2026 16:30:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/c9357837-e533-46c6-95fe-3ba776ef665c.mp3" length="18132736" type="audio/mpeg"/><itunes:duration>12:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season></item></channel></rss>