<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/cybersecurity-chronicles/" rel="self" type="application/rss+xml"/><title><![CDATA[Cybersecurity Chronicles]]></title><podcast:guid>0df38ce3-6851-55c5-9044-c08206801b84</podcast:guid><lastBuildDate>Mon, 17 Nov 2025 19:02:33 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2025 Netswitch Technology Management]]></copyright><managingEditor>Netswitch Technology Management</managingEditor><itunes:summary><![CDATA[Sponsored by Netswitch Technology Management - https://www.netswitch.net/]]></itunes:summary><image><url>https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png</url><title>Cybersecurity Chronicles</title><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/]]></link></image><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><itunes:owner><itunes:name>Netswitch Technology Management</itunes:name></itunes:owner><itunes:author>Netswitch Technology Management</itunes:author><description>Sponsored by Netswitch Technology Management - https://www.netswitch.net/</description><link>https://cybersecurity-chronicles.captivate.fm/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[News, views and stories from the cyber front line.]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Business"><itunes:category text="Management"/></itunes:category><itunes:category text="Technology"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Right of Boom: What Happens When Cybersecurity Prevention Fails</title><itunes:title>Right of Boom: What Happens When Cybersecurity Prevention Fails</itunes:title><description><![CDATA[<p>If your organization treats cybersecurity as something IT "handles," you're already behind. The regulators know it. The plaintiffs' attorneys know it. And when the breach happens, your board will discover it the expensive way.</p><h3>WHY YOU SHOULD LISTEN</h3><p>Krishan Thakker, a seasoned executive legal advisor, delivers the uncomfortable truths that consultants won't tell you and vendors can't sell you:</p><ul><li><strong>Language Translation:</strong> How to speak executive language when technical severity doesn't resonate</li><li><strong>Reverse Engineering Risk:</strong> Starting with worst-case scenarios (including criminal liability) to drive urgency</li><li><strong>Responsibility vs. Accountability:</strong> Why these aren't the same concept and how HR must map the distinction</li><li><strong>The Growth Trap:</strong> How the urge to scale fast creates predictable cycles of reactive security spending</li></ul><br/><p>Stop asking your technologists to "figure it out." Start asking your legal team if you have litigation hold protocols that can activate within hours. Ask your compliance officer if responsibilities and accountabilities are clearly mapped across functions. </p><p>Because when Krishan Thakker gets the call, these questions have already been answered n depositions, regulatory inquiries, and shareholder lawsuits.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>If your organization treats cybersecurity as something IT "handles," you're already behind. The regulators know it. The plaintiffs' attorneys know it. And when the breach happens, your board will discover it the expensive way.</p><h3>WHY YOU SHOULD LISTEN</h3><p>Krishan Thakker, a seasoned executive legal advisor, delivers the uncomfortable truths that consultants won't tell you and vendors can't sell you:</p><ul><li><strong>Language Translation:</strong> How to speak executive language when technical severity doesn't resonate</li><li><strong>Reverse Engineering Risk:</strong> Starting with worst-case scenarios (including criminal liability) to drive urgency</li><li><strong>Responsibility vs. Accountability:</strong> Why these aren't the same concept and how HR must map the distinction</li><li><strong>The Growth Trap:</strong> How the urge to scale fast creates predictable cycles of reactive security spending</li></ul><br/><p>Stop asking your technologists to "figure it out." Start asking your legal team if you have litigation hold protocols that can activate within hours. Ask your compliance officer if responsibilities and accountabilities are clearly mapped across functions. </p><p>Because when Krishan Thakker gets the call, these questions have already been answered n depositions, regulatory inquiries, and shareholder lawsuits.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/right-of-boom-what-happens-when-cybersecurity-prevention-fails]]></link><guid isPermaLink="false">6568813c-a881-4531-a9e9-a394411c060c</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 17 Nov 2025 13:30:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/6568813c-a881-4531-a9e9-a394411c060c.mp3" length="74849353" type="audio/mpeg"/><itunes:duration>38:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode></item><item><title>Firefighting to Foresight: Rethinking Cyber Risk for the Real World</title><itunes:title>Firefighting to Foresight: Rethinking Cyber Risk for the Real World</itunes:title><description><![CDATA[<p>Stanley Li speaks with veteran security executive <strong>Steve Maciejewski</strong> (aka “Steve Mack”) to unpack the harsh realities and hopeful opportunities of managing cyber risk in today’s complex digital landscape.</p><p>Drawing from decades of experience as a CISO across public and private sectors, Steve explains why traditional compliance checklists and siloed toolsets aren’t enough. Together, they explore the cultural and operational shifts needed to move from reactive security to proactive, risk-informed governance.</p><blockquote>“Everyone has reports and dashboards, but most can’t explain</blockquote><blockquote> how a breach would truly impact operations,” he said. “You need more </blockquote><blockquote>than a SOC report or a compliance checklist. You need a business-driven </blockquote><blockquote>risk view.”</blockquote><p>Listen to Learn:</p><ul><li>Why running security with <strong>spreadsheets and slide decks</strong> needs to stop</li><li>How to <strong>bridge the boardroom-to-basement communication gap</strong></li><li>The role of <strong>business impact analysis</strong> in building resilience</li><li>Why SMBs should think in terms of <strong>risk avoidance, transfer, or acceptance</strong></li><li>What to <strong>demand from cloud providers</strong> - even when budgets are tight</li></ul><br/><p>Whether you’re leading security for a fast-growing startup or a nonprofit, this conversation will deliver real-world strategies to shift your organization from cyber risk firefighting to sustainable, data-driven cyber risk governance.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>Stanley Li speaks with veteran security executive <strong>Steve Maciejewski</strong> (aka “Steve Mack”) to unpack the harsh realities and hopeful opportunities of managing cyber risk in today’s complex digital landscape.</p><p>Drawing from decades of experience as a CISO across public and private sectors, Steve explains why traditional compliance checklists and siloed toolsets aren’t enough. Together, they explore the cultural and operational shifts needed to move from reactive security to proactive, risk-informed governance.</p><blockquote>“Everyone has reports and dashboards, but most can’t explain</blockquote><blockquote> how a breach would truly impact operations,” he said. “You need more </blockquote><blockquote>than a SOC report or a compliance checklist. You need a business-driven </blockquote><blockquote>risk view.”</blockquote><p>Listen to Learn:</p><ul><li>Why running security with <strong>spreadsheets and slide decks</strong> needs to stop</li><li>How to <strong>bridge the boardroom-to-basement communication gap</strong></li><li>The role of <strong>business impact analysis</strong> in building resilience</li><li>Why SMBs should think in terms of <strong>risk avoidance, transfer, or acceptance</strong></li><li>What to <strong>demand from cloud providers</strong> - even when budgets are tight</li></ul><br/><p>Whether you’re leading security for a fast-growing startup or a nonprofit, this conversation will deliver real-world strategies to shift your organization from cyber risk firefighting to sustainable, data-driven cyber risk governance.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/how-risk-informed-governance-builds-true-cyber-resilience]]></link><guid isPermaLink="false">d2c40827-cc6c-43f9-a3b5-f06d28943e1a</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 18 Jul 2025 16:45:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/d2c40827-cc6c-43f9-a3b5-f06d28943e1a.mp3" length="43732297" type="audio/mpeg"/><itunes:duration>30:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode></item><item><title>Forget Your Firewalls: One Shocking Truth About Your Cyber Risk</title><itunes:title>Forget Your Firewalls: One Shocking Truth About Your Cyber Risk</itunes:title><description><![CDATA[<p>On the latest episode, hear a discussion about cyber risk management needing to look beyond IT. </p><p>The hosts, Stanley Lee and Sean Mahoney, explore the complexities of cybersecurity, emphasizing the importance of understanding cyber risks that extend beyond traditional IT frameworks. </p><p>They highlight the critical role of employee awareness and the need for organizations to adapt their security measures in response to evolving threats.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>On the latest episode, hear a discussion about cyber risk management needing to look beyond IT. </p><p>The hosts, Stanley Lee and Sean Mahoney, explore the complexities of cybersecurity, emphasizing the importance of understanding cyber risks that extend beyond traditional IT frameworks. </p><p>They highlight the critical role of employee awareness and the need for organizations to adapt their security measures in response to evolving threats.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/forget-your-firewalls-one-shocking-truth-about-your-cyber-risk]]></link><guid isPermaLink="false">30ed1e88-65ae-4739-b0c8-48c40f0008ec</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 16 Jun 2025 17:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/30ed1e88-65ae-4739-b0c8-48c40f0008ec.mp3" length="84116233" type="audio/mpeg"/><itunes:duration>58:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode></item><item><title>End Compliance Theatre: How Automation Can Save Your Business</title><itunes:title>End Compliance Theatre: How Automation Can Save Your Business</itunes:title><description><![CDATA[<p>In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn't just a good idea – it's essential for your business's survival and future.</p><p>Drawing on real-world examples of crippling ransomware attacks, they break down the immense financial and operational costs of extended downtime, from lost revenue and unexpected expenses to damaged brand reputation and customer churn. Bernard Mendoza shares the stark reality of budgeting for unpredictable recovery costs, while Sean Mahoney recounts a personal survival story highlighting the chaos and expense of manual recovery efforts.</p><p>Steve Piggott introduces the power of automated DR, explaining how platforms like Continuity Patrol can drastically reduce recovery times from days or weeks to minutes. Learn how automation frees up valuable IT resources for strategic work and provides the confidence needed for rapid, effective recovery. The discussion also covers how automated DR supports regulatory compliance and instills confidence in investors and boards.</p><p>Tune in to understand why investing in automated disaster recovery is a proactive, strategic move that can protect your bottom line, your brand, and your competitive edge in today's volatile cyber landscape.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn't just a good idea – it's essential for your business's survival and future.</p><p>Drawing on real-world examples of crippling ransomware attacks, they break down the immense financial and operational costs of extended downtime, from lost revenue and unexpected expenses to damaged brand reputation and customer churn. Bernard Mendoza shares the stark reality of budgeting for unpredictable recovery costs, while Sean Mahoney recounts a personal survival story highlighting the chaos and expense of manual recovery efforts.</p><p>Steve Piggott introduces the power of automated DR, explaining how platforms like Continuity Patrol can drastically reduce recovery times from days or weeks to minutes. Learn how automation frees up valuable IT resources for strategic work and provides the confidence needed for rapid, effective recovery. The discussion also covers how automated DR supports regulatory compliance and instills confidence in investors and boards.</p><p>Tune in to understand why investing in automated disaster recovery is a proactive, strategic move that can protect your bottom line, your brand, and your competitive edge in today's volatile cyber landscape.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/end-compliance-theatre-how-automation-can-save-your-business]]></link><guid isPermaLink="false">0fc5b3c2-4ad9-4749-ad74-58de3cfcb413</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Sun, 11 May 2025 09:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/0fc5b3c2-4ad9-4749-ad74-58de3cfcb413.mp3" length="44113033" type="audio/mpeg"/><itunes:duration>30:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode></item><item><title>Will Quantum Computers Steal Your Job or Save the World an Expert Explains</title><itunes:title>Will Quantum Computers Steal Your Job or Save the World an Expert Explains</itunes:title><description><![CDATA[<p>In this episode of Cybersecurity Chronicles, host <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a> sits down with quantum computing expert <a href="https://www.linkedin.com/in/john-omalley-55573891/" rel="noopener noreferrer" target="_blank">John O’Malley</a> to talk about the world of quantum computing. </p><p>John worked with the NIST Post Quantum Encryption Standards Committee, after having previously led Change Healthcare's Identity and Access Management (before the breach).</p><p>They delve into the current state of quantum technology, its potential applications in various industries, and the challenges that lie ahead. From cybersecurity advancements to the future integration of quantum computing in everyday business operations, this conversation provides a comprehensive overview of how quantum computing is set to revolutionize the tech landscape.</p><p>The topic was chosen following the recent NIST release of the long-awaited <a href="https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization" rel="noopener noreferrer" target="_blank">post-quantum encryption standards</a>.</p><p>Key Takeaways:</p><ol><li><strong>Basics of Quantum Computing</strong>: Quantum computers use qubits that can represent both 0 and 1 simultaneously, enabling complex calculations beyond classical computers.</li><li><strong>Current and Future Applications</strong>: Quantum computing promises advancements in cybersecurity, medication development, and electric car batteries, with broader integration expected in 5-10 years.</li><li><strong>Challenges and Preparations</strong>: High power requirements and sub-zero temperatures are major hurdles. Businesses should start preparing by mapping encryption strategies and training teams.</li></ol><br/><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>In this episode of Cybersecurity Chronicles, host <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a> sits down with quantum computing expert <a href="https://www.linkedin.com/in/john-omalley-55573891/" rel="noopener noreferrer" target="_blank">John O’Malley</a> to talk about the world of quantum computing. </p><p>John worked with the NIST Post Quantum Encryption Standards Committee, after having previously led Change Healthcare's Identity and Access Management (before the breach).</p><p>They delve into the current state of quantum technology, its potential applications in various industries, and the challenges that lie ahead. From cybersecurity advancements to the future integration of quantum computing in everyday business operations, this conversation provides a comprehensive overview of how quantum computing is set to revolutionize the tech landscape.</p><p>The topic was chosen following the recent NIST release of the long-awaited <a href="https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization" rel="noopener noreferrer" target="_blank">post-quantum encryption standards</a>.</p><p>Key Takeaways:</p><ol><li><strong>Basics of Quantum Computing</strong>: Quantum computers use qubits that can represent both 0 and 1 simultaneously, enabling complex calculations beyond classical computers.</li><li><strong>Current and Future Applications</strong>: Quantum computing promises advancements in cybersecurity, medication development, and electric car batteries, with broader integration expected in 5-10 years.</li><li><strong>Challenges and Preparations</strong>: High power requirements and sub-zero temperatures are major hurdles. Businesses should start preparing by mapping encryption strategies and training teams.</li></ol><br/><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/will-quantum-computers-steal-your-job-or-save-the-world-an-expert-explains]]></link><guid isPermaLink="false">682baa6b-9a49-49d9-9769-25beccfaeaee</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 04 Oct 2024 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1e2040e1-8197-4ec2-92ab-153cbd819aa4/John-Omalley-CC-Podcast.mp3" length="59356297" type="audio/mpeg"/><itunes:duration>41:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode></item><item><title>Feeding the Gators: Why SMBs Get Hacked &amp; Big Guys Get Away</title><itunes:title>Feeding the Gators: Why SMBs Get Hacked &amp; Big Guys Get Away</itunes:title><description><![CDATA[<p>Sean Mahoney of Netswitch is joined by Wil Lassalle, of JLS, Tech to talk about a headline story and share some insights about preventing a similar event from occurring for your SMB.</p><p>The guys explore why small businesses are more susceptible to cyberattacks than larger corporations. They talk about the perception among cybercriminals that small businesses have weaker defenses and are easier targets. Additionally, they discuss the potential unfairness of the current system, where large corporations face lighter consequences (like fines) for data breaches despite causing significant financial losses.</p><p>Learn <strong><em>WHY</em></strong>:</p><ul><li>Small businesses are <strong>more vulnerable</strong> to cyberattacks than large corporations</li><li>SMBs are perceived as <strong>easier targets</strong></li><li>Big guys <strong>get away w</strong>ith just a fine</li></ul><br/><p><a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney, VP Netswitch, Inc.</a></p><p><a href="https://WillLassalle,vCISOJLS,Tech" rel="noopener noreferrer" target="_blank">Will Lassalle, vCISO JLS, Tech</a></p><p>Learn more about Security And Risk Assessments from <a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank">Netswitch, Inc.</a></p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>Sean Mahoney of Netswitch is joined by Wil Lassalle, of JLS, Tech to talk about a headline story and share some insights about preventing a similar event from occurring for your SMB.</p><p>The guys explore why small businesses are more susceptible to cyberattacks than larger corporations. They talk about the perception among cybercriminals that small businesses have weaker defenses and are easier targets. Additionally, they discuss the potential unfairness of the current system, where large corporations face lighter consequences (like fines) for data breaches despite causing significant financial losses.</p><p>Learn <strong><em>WHY</em></strong>:</p><ul><li>Small businesses are <strong>more vulnerable</strong> to cyberattacks than large corporations</li><li>SMBs are perceived as <strong>easier targets</strong></li><li>Big guys <strong>get away w</strong>ith just a fine</li></ul><br/><p><a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney, VP Netswitch, Inc.</a></p><p><a href="https://WillLassalle,vCISOJLS,Tech" rel="noopener noreferrer" target="_blank">Will Lassalle, vCISO JLS, Tech</a></p><p>Learn more about Security And Risk Assessments from <a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank">Netswitch, Inc.</a></p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/feeding-the-gators-why-smbs-get-hacked-big-guys-get-away]]></link><guid isPermaLink="false">c7e9e234-e310-4f20-8862-ce8f0290e1ff</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 17 Jun 2024 19:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4cd35e8f-9452-48d6-9cdf-6efbc188d67e/Another-one-bite-the-dust-Santander-and-Ticketmaster.mp3" length="49400137" type="audio/mpeg"/><itunes:duration>34:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode></item><item><title>An Insider&apos;s Guide to Cracking the Cyber Compliance Code in Latin America</title><itunes:title>An Insider&apos;s Guide to Cracking the Cyber Compliance Code in Latin America</itunes:title><description><![CDATA[<p>In this episode, Will Lassalle, co-founder of Simplix, a platform designed to assist businesses in complying with cyber regulations in Latin America, discusses the challenges and opportunities surrounding cyber compliance in the region.</p><p>We then delve into the evolving cyber regulatory landscape in Latin America, highlighting the region's efforts to catch up with global data privacy laws and cyber regulations.</p><p>We emphasize the pressing need for businesses to enhance their cyber hygiene and mitigate the risks associated with breaches and ransomware attacks, particularly for those working with US or European companies that must adhere to their stringent requirements.</p><p>Host: <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a>, VP <a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank">Netswitch, Inc</a>.</p><p>Guest: <a href="https://www.linkedin.com/in/wlassalle/" rel="noopener noreferrer" target="_blank">Will Lassalle</a>, Founder <a href="https://simplix.io/" rel="noopener noreferrer" target="_blank">Simplix.io</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, Will Lassalle, co-founder of Simplix, a platform designed to assist businesses in complying with cyber regulations in Latin America, discusses the challenges and opportunities surrounding cyber compliance in the region.</p><p>We then delve into the evolving cyber regulatory landscape in Latin America, highlighting the region's efforts to catch up with global data privacy laws and cyber regulations.</p><p>We emphasize the pressing need for businesses to enhance their cyber hygiene and mitigate the risks associated with breaches and ransomware attacks, particularly for those working with US or European companies that must adhere to their stringent requirements.</p><p>Host: <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a>, VP <a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank">Netswitch, Inc</a>.</p><p>Guest: <a href="https://www.linkedin.com/in/wlassalle/" rel="noopener noreferrer" target="_blank">Will Lassalle</a>, Founder <a href="https://simplix.io/" rel="noopener noreferrer" target="_blank">Simplix.io</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/navigating-the-cyber-compliance-landscape-in-latin-america]]></link><guid isPermaLink="false">45b54259-9dfd-4b91-91b5-61aba54521ba</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 06 Jun 2024 17:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7a6aef12-1fa0-4962-b406-d7d6d46e3631/LatAm-CRG-with-Will-Lassalle.mp3" length="56282269" type="audio/mpeg"/><itunes:duration>39:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode></item><item><title>Cyber Resilience Secrets: A Roadmap for LatAm Businesses</title><itunes:title>Cyber Resilience Secrets: A Roadmap for LatAm Businesses</itunes:title><description><![CDATA[<p>In this episode, we discuss the importance of cyber resilience and business continuity planning for businesses in Latin America. The key points covered include:</p><ul><li>Latin companies increasingly targeted as <strong>entry points </strong>to larger partners/suppliers</li><li>Conducting thorough <strong>business impact analysis (BIA) is critical</strong> first step</li><li><strong>Develop strategies/plans</strong> to maintain core functions during disruptions</li><li>Regularly test and <strong>update resilience plans</strong> as operations change</li><li>Pre-establish agreements with external support services for <strong>faster response</strong></li><li>Use <strong>multi-language documentation</strong> for organizational understanding</li><li>Customize <strong>resilience plans</strong> to each business's unique risks/impacts/priorities</li><li><strong>Investing in resilience</strong> enables innovation, efficiency, competitiveness</li></ul><br/><p>We share the secrets of how to invest in cyber resilience to enable innovation, improve efficiency and become a stronger competitive company. </p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>In this episode, we discuss the importance of cyber resilience and business continuity planning for businesses in Latin America. The key points covered include:</p><ul><li>Latin companies increasingly targeted as <strong>entry points </strong>to larger partners/suppliers</li><li>Conducting thorough <strong>business impact analysis (BIA) is critical</strong> first step</li><li><strong>Develop strategies/plans</strong> to maintain core functions during disruptions</li><li>Regularly test and <strong>update resilience plans</strong> as operations change</li><li>Pre-establish agreements with external support services for <strong>faster response</strong></li><li>Use <strong>multi-language documentation</strong> for organizational understanding</li><li>Customize <strong>resilience plans</strong> to each business's unique risks/impacts/priorities</li><li><strong>Investing in resilience</strong> enables innovation, efficiency, competitiveness</li></ul><br/><p>We share the secrets of how to invest in cyber resilience to enable innovation, improve efficiency and become a stronger competitive company. </p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/cyber-resilience-secrets-a-roadmap-for-latam-businesses]]></link><guid isPermaLink="false">423d4139-7ffd-4098-abdf-ead595109f5e</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Wed, 15 May 2024 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9d452fce-8ddd-4517-961e-248be3ae7783/LatAm-Cybersecurity-Chronicles-with-Rob-Zegarra.mp3" length="45891145" type="audio/mpeg"/><itunes:duration>31:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode></item><item><title>Secret Santa: A Modern Day Insider Threat</title><itunes:title>Secret Santa: A Modern Day Insider Threat</itunes:title><description><![CDATA[<p>In this episode of the Cybersecurity Chronicles, Sean Mahoney with Netswitch, and Tamara Lauterback, Sr. Cybersecurity and GRC Analyst with Guthrie discuss the evolution of cyber risk, focusing on the concept of insider threat. </p><p>They explore how seemingly innocent actions can pose significant risks in the digital landscape. The conversation also touches on the role of AI and machine learning in shaping modern threats, the importance of continuous cybersecurity education, and the challenges of maintaining security in a rapidly advancing technological environment.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybersecurity Chronicles, Sean Mahoney with Netswitch, and Tamara Lauterback, Sr. Cybersecurity and GRC Analyst with Guthrie discuss the evolution of cyber risk, focusing on the concept of insider threat. </p><p>They explore how seemingly innocent actions can pose significant risks in the digital landscape. The conversation also touches on the role of AI and machine learning in shaping modern threats, the importance of continuous cybersecurity education, and the challenges of maintaining security in a rapidly advancing technological environment.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/secret-santa-a-modern-day-insider-threat]]></link><guid isPermaLink="false">46204cb1-24fc-4951-be72-7ddd144b21dc</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Wed, 20 Dec 2023 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b0273efc-5a52-486a-b104-cb8910980f68/Tamara-Take-2.mp3" length="28020745" type="audio/mpeg"/><itunes:duration>19:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode></item><item><title>From SOC to GRC: Unraveling Cyber Risk Management</title><itunes:title>From SOC to GRC: Unraveling Cyber Risk Management</itunes:title><description><![CDATA[<p>In this episode of the Cyber Security Chronicles, join <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a>, <a href="https://www.linkedin.com/in/netswitchstanleyli/" rel="noopener noreferrer" target="_blank">Stanley Li</a>, CEO and Founder of Netswitch, and special guest <a href="https://www.linkedin.com/in/tamaralauterbach/" rel="noopener noreferrer" target="_blank">Tamara Lauterbach</a>, a senior Cybersecurity &amp; GRC Analyst at Guthrie. </p><p>Tamara shares her unique journey from the technical side of cybersecurity to the Governance, Risk Management, and Compliance (GRC) side. She discusses her early career in a Security Operations Center (SOC), where she developed a passion for insider threat analysis. This led her to transition into the GRC field, where she found her skills and experience were highly applicable. </p><p>The conversation covers the importance of acceptable use policies, the need for continuous education and awareness in cybersecurity, and the role of GRC in managing cyber risk. </p><p>This episode provides valuable insights for anyone interested in the intersection of technical cybersecurity and GRC. </p><p>Tune in to learn more about the evolving landscape of cybersecurity and the crucial role of GRC in protecting organizations. Don’t miss out on this enlightening discussion!</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cyber Security Chronicles, join <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a>, <a href="https://www.linkedin.com/in/netswitchstanleyli/" rel="noopener noreferrer" target="_blank">Stanley Li</a>, CEO and Founder of Netswitch, and special guest <a href="https://www.linkedin.com/in/tamaralauterbach/" rel="noopener noreferrer" target="_blank">Tamara Lauterbach</a>, a senior Cybersecurity &amp; GRC Analyst at Guthrie. </p><p>Tamara shares her unique journey from the technical side of cybersecurity to the Governance, Risk Management, and Compliance (GRC) side. She discusses her early career in a Security Operations Center (SOC), where she developed a passion for insider threat analysis. This led her to transition into the GRC field, where she found her skills and experience were highly applicable. </p><p>The conversation covers the importance of acceptable use policies, the need for continuous education and awareness in cybersecurity, and the role of GRC in managing cyber risk. </p><p>This episode provides valuable insights for anyone interested in the intersection of technical cybersecurity and GRC. </p><p>Tune in to learn more about the evolving landscape of cybersecurity and the crucial role of GRC in protecting organizations. Don’t miss out on this enlightening discussion!</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/unraveling-cyber-risk-management-from-soc-to-grc]]></link><guid isPermaLink="false">1869c8d7-5ab1-4b21-a33d-85ce8c66ea99</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 08 Dec 2023 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2c109b68-f1b0-47e8-bc3f-270fe6adc8d6/Tamara-Lauterback-cybersecurity-and-GRC.mp3" length="66955081" type="audio/mpeg"/><itunes:duration>34:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode></item><item><title>Sons fo Hope: Critical Insights on the Alarming State of Cybersecurity Practices</title><itunes:title>Sons fo Hope: Critical Insights on the Alarming State of Cybersecurity Practices</itunes:title><description><![CDATA[<p>Sean Mahoney and Will Lassalle catch up on the current state of cybersecurity, recent data breaches, the impact of regulations, and where opportunities for the future seem to be regarding compliance and cyber risk.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>Sean Mahoney and Will Lassalle catch up on the current state of cybersecurity, recent data breaches, the impact of regulations, and where opportunities for the future seem to be regarding compliance and cyber risk.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/sons-fo-hope-critical-insights-on-the-alarming-state-of-cybersecurity-practices]]></link><guid isPermaLink="false">643fab51-c018-4e66-a0d7-d4867695770f</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 30 Nov 2023 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/58678ae9-28b5-45de-bf86-7b8cd0f029d4/Sean-and-Will-The-Sons-of-Hope.mp3" length="50061961" type="audio/mpeg"/><itunes:duration>34:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode></item><item><title>Armageddon in Education - Fortifying Your Defenses</title><itunes:title>Armageddon in Education - Fortifying Your Defenses</itunes:title><description><![CDATA[<p><strong><em>Proactively Defend Against the Onslaught of Cybercrime by Fortifying Your Defenses with Cyber Risk Assessment and Insurance</em></strong></p><p>The rise of cybercrime poses an increasing challenge for all levels of education. Criminals are constantly adapting their tactics to target faculty, staff, students, and alumni. With the surge in payloadless malware, business email compromise, and various email-based attacks, safeguarding your institution from these threats is now of paramount significance.</p><p>Cyber Insurance may be the last line of defense for many organizations, but in education, it may be the first line due to the limited resources of educational institutions.</p><p>Listen to Sean Mahoney and Stanley Li talk with Jake Charen, (Risk Architect at Lakeside</p><p>Insurance) about the risks in educational organizations, how to cost-effectively mitigate those risks and learn ways to reduce your ever-increasing cyber liability premiums. </p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p><strong><em>Proactively Defend Against the Onslaught of Cybercrime by Fortifying Your Defenses with Cyber Risk Assessment and Insurance</em></strong></p><p>The rise of cybercrime poses an increasing challenge for all levels of education. Criminals are constantly adapting their tactics to target faculty, staff, students, and alumni. With the surge in payloadless malware, business email compromise, and various email-based attacks, safeguarding your institution from these threats is now of paramount significance.</p><p>Cyber Insurance may be the last line of defense for many organizations, but in education, it may be the first line due to the limited resources of educational institutions.</p><p>Listen to Sean Mahoney and Stanley Li talk with Jake Charen, (Risk Architect at Lakeside</p><p>Insurance) about the risks in educational organizations, how to cost-effectively mitigate those risks and learn ways to reduce your ever-increasing cyber liability premiums. </p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/school-districts]]></link><guid isPermaLink="false">f02cdabf-ffdf-4c7a-989f-f223559fa145</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Sat, 12 Aug 2023 20:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d380b629-ac26-4ae0-8e14-f0da0f13852f/School-Districts-Under-Attack-Final.mp3" length="42774985" type="audio/mpeg"/><itunes:duration>29:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode></item><item><title>Headline Making Data Breach of Global Organization Has Lessons for SME&apos;s - Learn Before You&apos;re the Cause of the Next One</title><itunes:title>Headline Making Data Breach of Global Organization Has Lessons for SME&apos;s - Learn Before You&apos;re the Cause of the Next One</itunes:title><description><![CDATA[<p>The various T-Mobile data breaches serve as a stark reminder of the critical importance of supply chain security in today's interconnected business landscape. </p><p>While the incident primarily affected a global telecommunications company, the lessons derived from this breach can be invaluable for small and medium-sized enterprises (SMEs) as they strive to become secure supply chain partners. </p><p>By understanding and implementing key lessons, SMEs can strengthen their security measures, safeguard sensitive information, and foster trust among their partners and customers.</p><p>Will Lassalle and Sean Mahoney share some important insights and offer valuable solutions for executives to look into and see how they may fit into their organizations.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>The various T-Mobile data breaches serve as a stark reminder of the critical importance of supply chain security in today's interconnected business landscape. </p><p>While the incident primarily affected a global telecommunications company, the lessons derived from this breach can be invaluable for small and medium-sized enterprises (SMEs) as they strive to become secure supply chain partners. </p><p>By understanding and implementing key lessons, SMEs can strengthen their security measures, safeguard sensitive information, and foster trust among their partners and customers.</p><p>Will Lassalle and Sean Mahoney share some important insights and offer valuable solutions for executives to look into and see how they may fit into their organizations.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/headline-making-data-breach-of-global-organization-has-lessons-for-smes-learn-before-youre-the-cause-of-the-next-one]]></link><guid isPermaLink="false">baa591e1-d6f9-484f-95ed-d1ce9dea597f</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 25 May 2023 18:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/aee100c3-3506-48e6-96a8-c9838c5cfe08/2023-May-Podcast-Will-Sean.mp3" length="66573385" type="audio/mpeg"/><itunes:duration>34:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode></item><item><title>Cyber Risks Mitigation &amp; Transfer - Founder to Founder Perspective on Cyber Liability Protections and What You Can Do To Protect Yourself</title><itunes:title>Cyber Risks Mitigation &amp; Transfer - Founder to Founder Perspective on Cyber Liability Protections and What You Can Do To Protect Yourself</itunes:title><description><![CDATA[<p>There's no escaping cyber risks these days. </p><p>But what can you do to mitigate and transfer them? </p><p>Listen to this episode for a Founder-to-Founder conversation as they share their perspectives on cyber risk &amp; protecting their small businesses.</p><p>You'll learn about different types of cyber risks, how to assess and protect against them, and some tips for preparing for cyber liability insurance to prevent a cyber incident from destroying your business.</p><p>Michael  McCarron, Founder &amp; CEO of Lakeside Insurance, and Stanley Li, Founder &amp; CEO of Netswitch Technology Management share their perspectives on the topic.</p><p><a href="https://www.linkedin.com/in/michael-mccarron-a056a09/" rel="noopener noreferrer" target="_blank">Michael  McCarron</a> and Lakeside's talented risk advisors partner with clients, as trusted risk advisors, they look to help:</p><p>✔Manage Risk</p><p>✔Mitigate Risk</p><p>✔Reduce Total Cost of Risk</p><p>To drive mutually profitable growth. </p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>There's no escaping cyber risks these days. </p><p>But what can you do to mitigate and transfer them? </p><p>Listen to this episode for a Founder-to-Founder conversation as they share their perspectives on cyber risk &amp; protecting their small businesses.</p><p>You'll learn about different types of cyber risks, how to assess and protect against them, and some tips for preparing for cyber liability insurance to prevent a cyber incident from destroying your business.</p><p>Michael  McCarron, Founder &amp; CEO of Lakeside Insurance, and Stanley Li, Founder &amp; CEO of Netswitch Technology Management share their perspectives on the topic.</p><p><a href="https://www.linkedin.com/in/michael-mccarron-a056a09/" rel="noopener noreferrer" target="_blank">Michael  McCarron</a> and Lakeside's talented risk advisors partner with clients, as trusted risk advisors, they look to help:</p><p>✔Manage Risk</p><p>✔Mitigate Risk</p><p>✔Reduce Total Cost of Risk</p><p>To drive mutually profitable growth. </p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/cyber-risks-mitigation-transfer-founder-to-founder-perspective-on-cyber-liability-protections]]></link><guid isPermaLink="false">72ce0e12-9362-4e1a-83fe-64a2c3f190bd</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 05 Dec 2022 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/65526e88-38a2-4a29-8e36-859b5c569d9d/Founder-to-Founder.mp3" length="38715337" type="audio/mpeg"/><itunes:duration>26:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode></item><item><title>Stop Guessing About Cyber Liability, What Risks Executives NEED to Know About the Latest Changes</title><itunes:title>Stop Guessing About Cyber Liability, What Risks Executives NEED to Know About the Latest Changes</itunes:title><description><![CDATA[<p>Data breaches are becoming more and more common, and they are costly—the average cost of a data breach is now $3.86 million. Regulations and compliance will only increase this cost. Businesses need to take steps to protect themselves, and one way to do this is by purchasing cyber liability insurance. </p><p>Join Hosts Sean Mahoney and Stanley Li and their guest Jake Charen, Senior Rick Architect of Lakeside Insurance to learn:</p><ul><li>What is cyber liability insurance?</li><li>Why should executives consider having a cyber liability?&nbsp; Is it worth the investment?</li><li>After the Travelers and ICS suit, what is the trend in the insurance industry regarding coverage?</li><li>How you can reduce your risk of a data breach without cyber liability insurance?</li></ul><br/><p>www.netswitch.net</p>]]></description><content:encoded><![CDATA[<p>Data breaches are becoming more and more common, and they are costly—the average cost of a data breach is now $3.86 million. Regulations and compliance will only increase this cost. Businesses need to take steps to protect themselves, and one way to do this is by purchasing cyber liability insurance. </p><p>Join Hosts Sean Mahoney and Stanley Li and their guest Jake Charen, Senior Rick Architect of Lakeside Insurance to learn:</p><ul><li>What is cyber liability insurance?</li><li>Why should executives consider having a cyber liability?&nbsp; Is it worth the investment?</li><li>After the Travelers and ICS suit, what is the trend in the insurance industry regarding coverage?</li><li>How you can reduce your risk of a data breach without cyber liability insurance?</li></ul><br/><p>www.netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/new-rules-you-need-to-know-now-about-cyber-liability-after-recent-lawsuits]]></link><guid isPermaLink="false">2a5f1909-0dae-4702-b3ac-fc73a099b8c8</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Wed, 02 Nov 2022 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/876ea46c-7a96-40ab-b1ef-1f826726b21e/Why-20Every-20Business-20Needs-20Cyber-20Liability-20Insurance.mp3" length="52495645" type="audio/mpeg"/><itunes:duration>36:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode></item><item><title>Your Supply Chain Is A Risk, Why? - How To Not Be The Weakest Link</title><itunes:title>Your Supply Chain Is A Risk, Why? - How To Not Be The Weakest Link</itunes:title><description><![CDATA[<p>Business today faces the great resignation and migration of employees, and that can be a lot of institutional knowledge about your supply chain leaving.  The risk from your vendors grows every day and how do you know which ones are cognizant and which ones are unknowing.</p><p>Pam Hamingson, Director of Compliance with Fortrex joins Sean Mahoney to talk about Third Party Risk Management [TPRM] and the growing level of risk your supply chain brings.  The increasing number of regulations expect you to know about your vendors and their security practices.</p><ul><li>How do you know what data security your vendors do?</li><li>What should <em>you</em> do to remain in compliance when they are not?</li><li>When regulations change, how fast can you update GRC?</li><li>If your vendors are a cyber risk to you, what can you do?</li></ul><br/><p>Risk monitoring solutions that are implemented and maintained by regulatory experts and cyber professionals can help you be assured of your compliance and that you have a secure supply chain.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></description><content:encoded><![CDATA[<p>Business today faces the great resignation and migration of employees, and that can be a lot of institutional knowledge about your supply chain leaving.  The risk from your vendors grows every day and how do you know which ones are cognizant and which ones are unknowing.</p><p>Pam Hamingson, Director of Compliance with Fortrex joins Sean Mahoney to talk about Third Party Risk Management [TPRM] and the growing level of risk your supply chain brings.  The increasing number of regulations expect you to know about your vendors and their security practices.</p><ul><li>How do you know what data security your vendors do?</li><li>What should <em>you</em> do to remain in compliance when they are not?</li><li>When regulations change, how fast can you update GRC?</li><li>If your vendors are a cyber risk to you, what can you do?</li></ul><br/><p>Risk monitoring solutions that are implemented and maintained by regulatory experts and cyber professionals can help you be assured of your compliance and that you have a secure supply chain.</p><p>Mentioned in this episode:</p><p><strong>Podcast Outro Bumper</strong></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/tprm-hamingson]]></link><guid isPermaLink="false">9d384131-a90c-4a25-97b3-2fd93e57f07c</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 14 Jul 2022 12:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/25386eee-2d3c-4d5d-9884-2703cc7a7bb4/2022-20June-20with-20Pam-20Hamingson.mp3" length="31161684" type="audio/mpeg"/><itunes:duration>37:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode></item><item><title>The Only Affordable Risk is the One You Avoided - A Legal Perspective for Compliance and Risk</title><itunes:title>The Only Affordable Risk is the One You Avoided - A Legal Perspective for Compliance and Risk</itunes:title><description><![CDATA[<p>Tara Trantham joins Sean Mahoney of Netswitch to talk about steps regulated and non-regulated businesses should be and can be doing to ensure they are more secure. &nbsp;Learn steps you can take as an SMB to reduce cyber risk and secure your business’s future.</p><p>Tara Trantham is CEO &amp; Founder of TJ44 Consulting, they are compliance, risk management, and creditors rights services experts and with Tara’s background as an attorney and General Counsel in the Financial Service sector, you have that important perspective as well when it comes to dealing with compliance in a regulated industry.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Tara Trantham joins Sean Mahoney of Netswitch to talk about steps regulated and non-regulated businesses should be and can be doing to ensure they are more secure. &nbsp;Learn steps you can take as an SMB to reduce cyber risk and secure your business’s future.</p><p>Tara Trantham is CEO &amp; Founder of TJ44 Consulting, they are compliance, risk management, and creditors rights services experts and with Tara’s background as an attorney and General Counsel in the Financial Service sector, you have that important perspective as well when it comes to dealing with compliance in a regulated industry.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/tara-trantham]]></link><guid isPermaLink="false">19766513-1a36-48fb-8820-a39a206fd122</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Sat, 28 May 2022 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b0bf5681-fff1-4031-9b7c-7abc6f9f2126/2022-20May-20Tara-20Trantham.mp3" length="33850526" type="audio/mpeg"/><itunes:duration>23:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode></item><item><title>Don’t Let a Disaster Ruin Your Business</title><itunes:title>Don’t Let a Disaster Ruin Your Business</itunes:title><description><![CDATA[<p>Think about your business and everything that goes into defining who and what you are as that business. Your operations, the people you employ, the people and companies you serve. Your products or services. All the fruits of your labor and the reputation you’ve built.</p><p>Disasters, like ransomware, wildfires, or pandemics often can’t be predicted but will impact your business and affect your employees and customers.  Proper planning can ensure your business is back up and running so it lasts.</p><p>In this episode, <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a> talks with <a href="https://www.linkedin.com/in/roberto-rob-zegarra-3482933/" rel="noopener noreferrer" target="_blank">Rob Zegarra</a>, Instructor at <a href="https://drii.org/" rel="noopener noreferrer" target="_blank">Disaster Recovery Institute</a>, talk about simple and inexpensive steps you can take to lessen the effects of your next unforeseen disaster.</p>]]></description><content:encoded><![CDATA[<p>Think about your business and everything that goes into defining who and what you are as that business. Your operations, the people you employ, the people and companies you serve. Your products or services. All the fruits of your labor and the reputation you’ve built.</p><p>Disasters, like ransomware, wildfires, or pandemics often can’t be predicted but will impact your business and affect your employees and customers.  Proper planning can ensure your business is back up and running so it lasts.</p><p>In this episode, <a href="https://www.linkedin.com/in/mahoneysean/" rel="noopener noreferrer" target="_blank">Sean Mahoney</a> talks with <a href="https://www.linkedin.com/in/roberto-rob-zegarra-3482933/" rel="noopener noreferrer" target="_blank">Rob Zegarra</a>, Instructor at <a href="https://drii.org/" rel="noopener noreferrer" target="_blank">Disaster Recovery Institute</a>, talk about simple and inexpensive steps you can take to lessen the effects of your next unforeseen disaster.</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/dont-let-a-disaster-ruin-your-business]]></link><guid isPermaLink="false">9d0dbe73-0a70-4ee5-9cb5-57575d10063b</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 05 May 2022 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4b27083f-05c6-4d99-8dcf-7ae7104cc165/CC-20Podcast-20MP3.mp3" length="44125790" type="audio/mpeg"/><itunes:duration>22:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode></item><item><title>Data Science, AI &amp; Cybersecurity With Special Guest Dr Stylianos Kampakis</title><itunes:title>Data Science, AI &amp; Cybersecurity With Special Guest Dr Stylianos Kampakis</itunes:title><description><![CDATA[<p>Sean Mahoney &amp; Stanley Li of Netswitch are joined by special guest Dr. Stylianos Kampakis, CEO of Tesseract Academy to discuss what is data science &amp; why it's making the greatest impact for small and mid-size businesses. Plus, the growing influence of blockchain for data ownership and integrity. To learn more about Dr. Kampakis, visit http://tesseract.academy</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>Sean Mahoney &amp; Stanley Li of Netswitch are joined by special guest Dr. Stylianos Kampakis, CEO of Tesseract Academy to discuss what is data science &amp; why it's making the greatest impact for small and mid-size businesses. Plus, the growing influence of blockchain for data ownership and integrity. To learn more about Dr. Kampakis, visit http://tesseract.academy</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/data-science-ai-cybersecurity]]></link><guid isPermaLink="false">f95f85b7-0d74-4cc2-ad44-7160845626dc</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 24 Feb 2022 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5d8a01b6-1e03-41d8-b901-c791020dec4c/cc-ep36-stelios-v1.mp3" length="33658506" type="audio/mpeg"/><itunes:duration>23:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode></item><item><title>With Special Guest Doug Kreitzberg, CIPP</title><itunes:title>With Special Guest Doug Kreitzberg, CIPP</itunes:title><description><![CDATA[<p>Doug Kreitzberg is the CEO and Founder of Beehive Cyber and is a Certified Information Privacy Professional / Europe and United States.&nbsp;Doug joins Sean&nbsp;Mahoney&nbsp;of Netswitch to discuss the importance of cyber insurance and how it can help a company survive a ransomware attack, how premiums can be reduced, and what you should do BEFORE you get a cyber insurance quote.</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>Doug Kreitzberg is the CEO and Founder of Beehive Cyber and is a Certified Information Privacy Professional / Europe and United States.&nbsp;Doug joins Sean&nbsp;Mahoney&nbsp;of Netswitch to discuss the importance of cyber insurance and how it can help a company survive a ransomware attack, how premiums can be reduced, and what you should do BEFORE you get a cyber insurance quote.</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/with-special-guest-doug-kreitzberg-cipp]]></link><guid isPermaLink="false">2e754a5a-2a73-48e5-87a6-34b055a364b2</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 20 Jan 2022 11:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ddaf4523-4a6e-4934-8121-b3b2ecaf77f9/cc-ep35.mp3" length="38715394" type="audio/mpeg"/><itunes:duration>26:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode></item><item><title>Your Cybersecurity Program Has Started, How Do You Measure or Monitor for ROI?</title><itunes:title>Your Cybersecurity Program Has Started, How Do You Measure or Monitor for ROI?</itunes:title><description><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch interview Mary Siero, who is a CISSP/CISM as well as an Instructor with the MIS Training Institute.</p><p>On the call Sean, Stanley and Mary ask the question: 'Now you've started the path to improve your security and lower your risk,  how do you measure success and ROI of your cybersecurity solutions?'</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch interview Mary Siero, who is a CISSP/CISM as well as an Instructor with the MIS Training Institute.</p><p>On the call Sean, Stanley and Mary ask the question: 'Now you've started the path to improve your security and lower your risk,  how do you measure success and ROI of your cybersecurity solutions?'</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/with-guest-expert-mary-siero]]></link><guid isPermaLink="false">81da540f-da37-4207-9a25-5b71a719cca3</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 22 Nov 2021 11:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/58e9c741-7467-4915-aba1-a1c7cda2edf4/cc-ep-34-with-mary-siero.mp3" length="37035825" type="audio/mpeg"/><itunes:duration>25:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode></item><item><title>Despite the Money Poured into Cybersecurity, We’re Less Secure Than Ever - With Guest Fred Doyle, CISSP</title><itunes:title>Despite the Money Poured into Cybersecurity, We’re Less Secure Than Ever - With Guest Fred Doyle, CISSP</itunes:title><description><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch talk with guest expert Fred Doyle, CISSP - CEO &amp; Founder of CubicPrism to discuss why despite the money poured into cybersecurity, we're less secure than ever. </p><p>Mr.&nbsp;Doyle&nbsp;has been a Senior Security Architect and is regularly being “sold” on the latest and greatest cybersecurity tools with ever-increasing capabilities, but is there a value to them?</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch talk with guest expert Fred Doyle, CISSP - CEO &amp; Founder of CubicPrism to discuss why despite the money poured into cybersecurity, we're less secure than ever. </p><p>Mr.&nbsp;Doyle&nbsp;has been a Senior Security Architect and is regularly being “sold” on the latest and greatest cybersecurity tools with ever-increasing capabilities, but is there a value to them?</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/with-guest-expert-fred-doyle-cissp]]></link><guid isPermaLink="false">40c56a1a-ae6a-4b08-9afb-695d0e9e6d0e</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 12 Nov 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cc02a471-830f-4bbf-95c8-8229ca167d3b/cc-ep-33-with-fred-doyle.mp3" length="35487286" type="audio/mpeg"/><itunes:duration>24:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode></item><item><title>CMMC Is Not the Silver Bullet for Compliance with Guest Carter Schoenberg, CISSP (PART 2)</title><itunes:title>CMMC Is Not the Silver Bullet for Compliance with Guest Carter Schoenberg, CISSP (PART 2)</itunes:title><description><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch interview Carter Schoenberg, CISSP - Vice President, and Chief Cybersecurity Officer at SoundWay Consulting to discuss why CMMC, although important and a great advancement from where we are today, is not the silver bullet for making a company completely secure and compliant. </p><p>There are several other aspects to cyber security and compliance that companies of all sizes need to be aware of and consider as part of their overall strategy.</p><p>PART 2/2</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch interview Carter Schoenberg, CISSP - Vice President, and Chief Cybersecurity Officer at SoundWay Consulting to discuss why CMMC, although important and a great advancement from where we are today, is not the silver bullet for making a company completely secure and compliant. </p><p>There are several other aspects to cyber security and compliance that companies of all sizes need to be aware of and consider as part of their overall strategy.</p><p>PART 2/2</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/cmmc-carter-shoenberg-part2]]></link><guid isPermaLink="false">96832abc-b7c3-4442-8150-a9a1d49b0cd2</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 29 Oct 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/847a63f6-2110-4c26-98ef-b695da59b8f7/cc-ep-32.mp3" length="45141854" type="audio/mpeg"/><itunes:duration>23:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode></item><item><title>CMMC Is Not the Silver Bullet for Compliance with Guest Carter Schoenberg, CISSP (PART 1)</title><itunes:title>CMMC Is Not the Silver Bullet for Compliance with Guest Carter Schoenberg, CISSP (PART 1)</itunes:title><description><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch interview Carter Schoenberg, CISSP - Vice President, and Chief Cybersecurity Officer at SoundWay Consulting to discuss why CMMC, although important and a great advancement from where we are today, is not the silver bullet for making a company completely secure and compliant.&nbsp;</p><p>There are several other aspects to cyber security and compliance that companies of all sizes need to be aware of and consider as part of their overall strategy. </p><p>(PART 1)</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p><p class="ql-align-center"><br></p>]]></description><content:encoded><![CDATA[<p>In this episode, Sean Mahoney and Stanley Li of Netswitch interview Carter Schoenberg, CISSP - Vice President, and Chief Cybersecurity Officer at SoundWay Consulting to discuss why CMMC, although important and a great advancement from where we are today, is not the silver bullet for making a company completely secure and compliant.&nbsp;</p><p>There are several other aspects to cyber security and compliance that companies of all sizes need to be aware of and consider as part of their overall strategy. </p><p>(PART 1)</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p><p class="ql-align-center"><br></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/cmmc-carter-schoenberg-part1]]></link><guid isPermaLink="false">e4c72a87-915d-46c2-a133-3285726f1c53</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 21 Oct 2021 10:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4bd718a5-2380-4b40-84b2-7aec5de9dcd9/cc-ep-31.mp3" length="41536862" type="audio/mpeg"/><itunes:duration>21:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode></item><item><title>The One Easy Step To Recover From Ransomware Everyone Ignores</title><itunes:title>The One Easy Step To Recover From Ransomware Everyone Ignores</itunes:title><description><![CDATA[<p>In this episode, Sean and Stanley discuss the US Senate's latest abysmal cybersecurity report citing "essentially the same failures" as a decade ago and reveals the one easy step to recover from ransomware... </p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>In this episode, Sean and Stanley discuss the US Senate's latest abysmal cybersecurity report citing "essentially the same failures" as a decade ago and reveals the one easy step to recover from ransomware... </p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/the-one-easy-step-to-recover-from-ransomware]]></link><guid isPermaLink="false">06c61378-a974-4385-b9d3-8cb308d00690</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Tue, 10 Aug 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/683ca1e8-9ffc-4a99-831e-56f7f8c094c1/the-one-easy-step-to-recover-from-ransomware-everyone-ignores.mp3" length="30455475" type="audio/mpeg"/><itunes:duration>21:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode></item><item><title>CMMC 101 with Guest Expert Amira Armond of CMMCaudit.org</title><itunes:title>CMMC 101 with Guest Expert Amira Armond of CMMCaudit.org</itunes:title><description><![CDATA[<p>In this episode Amira Armond, the Chief Editor of CMMCaudit.org, joins Sean and Stanley to discuss all about CMMC - the Cybersecurity Maturity Model Certification - and its importance for the entire DoD supply chain.</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>In this episode Amira Armond, the Chief Editor of CMMCaudit.org, joins Sean and Stanley to discuss all about CMMC - the Cybersecurity Maturity Model Certification - and its importance for the entire DoD supply chain.</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/cmmc-101-with-guest-expert-amira-armond]]></link><guid isPermaLink="false">db2be001-25f1-45a7-b063-e4456507b459</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 22 Jul 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0cce199f-e061-41f4-963e-8555f2764b65/cmmc-101-with-guest-expert-amira-armond.mp3" length="46521409" type="audio/mpeg"/><itunes:duration>32:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode></item><item><title>Kaseya - The Ransomware Supply Chain Chaos Causing SaaS Vendors an Ethical Nightmare</title><itunes:title>Kaseya - The Ransomware Supply Chain Chaos Causing SaaS Vendors an Ethical Nightmare</itunes:title><description><![CDATA[<p>CISO Will Lassalle joins Sean Mahoney to discuss the catastrophic implications of the Kaseya ransomware disaster for 1500 SMBs.</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>CISO Will Lassalle joins Sean Mahoney to discuss the catastrophic implications of the Kaseya ransomware disaster for 1500 SMBs.</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/kaseya-ransomware-supply-chain-chaos]]></link><guid isPermaLink="false">11475a1f-3882-4f72-b9c4-adef87933b26</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Tue, 13 Jul 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f8578536-12d4-4b3d-a230-80dd3799e4fb/the-kaseya-conundrum.mp3" length="31196517" type="audio/mpeg"/><itunes:duration>21:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode></item><item><title>The Great FBI Bitcoin Recovery Heist - With CISO Will Lassalle</title><itunes:title>The Great FBI Bitcoin Recovery Heist - With CISO Will Lassalle</itunes:title><description><![CDATA[<p>In this episode CISO Will Lassalle returns with Sean Mahoney to discuss the latest issues, topics and fallout in the world of Cyber Risk, Governance &amp; Compliance... including the mysterious FBI bitcoin recovery 'heist'</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></description><content:encoded><![CDATA[<p>In this episode CISO Will Lassalle returns with Sean Mahoney to discuss the latest issues, topics and fallout in the world of Cyber Risk, Governance &amp; Compliance... including the mysterious FBI bitcoin recovery 'heist'</p><p>Sponsored by Netswitch Technology Management - netswitch.net</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/the-great-fbi-bitcoin-recovery-heist]]></link><guid isPermaLink="false">e88da505-3358-46b5-9da0-f6ced2a75274</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 08 Jul 2021 10:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d4d1b3f8-a657-419b-8902-ec8e3cc4b329/fbi-recovery.mp3" length="29122883" type="audio/mpeg"/><itunes:duration>20:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode></item><item><title>With Special Guest CISO Will Lassalle - Cybersecurity and the Death Star</title><itunes:title>With Special Guest CISO Will Lassalle - Cybersecurity and the Death Star</itunes:title><description><![CDATA[<p>In this episode CISO Will Lassalle returns alongside Sean and Stanley to discuss the latest issues, topics and fallout in the world of Cyber Risk, Governance &amp; Compliance... PLUS what Cybersecurity has in common with the Death Star...</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>In this episode CISO Will Lassalle returns alongside Sean and Stanley to discuss the latest issues, topics and fallout in the world of Cyber Risk, Governance &amp; Compliance... PLUS what Cybersecurity has in common with the Death Star...</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/will-lassalle-cybersecurity-and-the-death-star]]></link><guid isPermaLink="false">26cf8fa6-ce92-4b9a-8163-1515d2d552c4</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 10 Jun 2021 12:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/96a1aaf3-1b1a-4111-af32-d174d4fb1c12/will-lassalle-cybersecurity-and-the-death-star.mp3" length="27126431" type="audio/mpeg"/><itunes:duration>18:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode></item><item><title>Ransomware and the Colonial Pipeline Attack</title><itunes:title>Ransomware and the Colonial Pipeline Attack</itunes:title><description><![CDATA[<p>Sean Mahoney and Stanley Li from Netswitch discuss the Colonial Pipeline ransomware attack as well as the implications for critical infrastructure and the B2C supply chain.</p>]]></description><content:encoded><![CDATA[<p>Sean Mahoney and Stanley Li from Netswitch discuss the Colonial Pipeline ransomware attack as well as the implications for critical infrastructure and the B2C supply chain.</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/ransomware-and-the-colonial-pipeline-attack]]></link><guid isPermaLink="false">77f59151-96ee-406b-b2b0-8932af5e3b71</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 14 May 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ff034115-1c3f-4e07-b163-7d9431fa08e1/ransomware-and-the-colonial-pipeline.mp3" length="28955838" type="audio/mpeg"/><itunes:duration>20:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode></item><item><title>Ransomware And Nation State Attacks - What They Mean For Us All</title><itunes:title>Ransomware And Nation State Attacks - What They Mean For Us All</itunes:title><description><![CDATA[<p>Ransomware and nation-state attacks are two of the biggest security threats out there, but what do they mean for you? That's exactly what Stanley Li and Sean Mahoney from Netswitch discuss on this latest episode...</p>]]></description><content:encoded><![CDATA[<p>Ransomware and nation-state attacks are two of the biggest security threats out there, but what do they mean for you? That's exactly what Stanley Li and Sean Mahoney from Netswitch discuss on this latest episode...</p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/ransomware-and-nation-state-attacks-what-they-mean-for-us-all]]></link><guid isPermaLink="false">9032bfbe-2eaf-4dd1-9322-7463d58e7785</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 19 Apr 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0130f095-5ba3-4d1d-91d7-51d8213ad106/media-original-2e266d7e658146beb06c89cc330df2d9-converted.mp3" length="25894386" type="audio/mpeg"/><itunes:duration>26:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/5c59f310-ea12-4230-99d0-8fb598c314e1/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5c59f310-ea12-4230-99d0-8fb598c314e1/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5c59f310-ea12-4230-99d0-8fb598c314e1/index.html" type="text/html"/></item><item><title>Special Guest Don Cox: A CISO&apos;s View Why AI &amp; Machine Learning are important for CyberRisk management</title><itunes:title>Special Guest Don Cox: A CISO&apos;s View Why AI &amp; Machine Learning are important for CyberRisk management</itunes:title><description><![CDATA[<p>In this episode CISO Don Cox returns alongside Sean and Stanley to discuss why AI and machine learning are so important for CyberRisk management, including:</p><p> -- Why automation is essential for cybersecurity readiness.</p><p>-- Why being able to fix problems autonomously is critical.</p><p>-- The lessons Don's learned from his 25-year background into investigating high-tech crimes.</p><p>-- Why automation is NOT about replacing employees.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>In this episode CISO Don Cox returns alongside Sean and Stanley to discuss why AI and machine learning are so important for CyberRisk management, including:</p><p> -- Why automation is essential for cybersecurity readiness.</p><p>-- Why being able to fix problems autonomously is critical.</p><p>-- The lessons Don's learned from his 25-year background into investigating high-tech crimes.</p><p>-- Why automation is NOT about replacing employees.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/special-guest-don-cox-a-cisos-view-why-ai-machine-learning-are-important-for-cyberrisk-management]]></link><guid isPermaLink="false">ae2b10d9-d465-44ac-b199-9aa858e8eb4e</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 18 Mar 2021 09:45:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/62afabb2-113a-4fc7-a979-b4c1d252eaae/special-guest-don-cox.mp3" length="43798613" type="audio/mpeg"/><itunes:duration>30:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode></item><item><title>MTTD and MTTR - The Only Two Risk Metrics You Need To Know</title><itunes:title>MTTD and MTTR - The Only Two Risk Metrics You Need To Know</itunes:title><description><![CDATA[<p>Stanley Li and Sean Mahoney of Netswitch discuss the TWO most important CyberRisk metrics you need to know and measure - MTTD and MTTR. </p><p>-- What are MTTD and MTTR and why are they so vital?</p><p>--Why the R in MTTR should be Resolve not Respond</p><p>--Case Study of the global hotel group with a 91% reduction in MTTD</p><p>--The #1 cause of all security incidents</p><p>--The open-source alternatives to expensive proprietary solutions</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Stanley Li and Sean Mahoney of Netswitch discuss the TWO most important CyberRisk metrics you need to know and measure - MTTD and MTTR. </p><p>-- What are MTTD and MTTR and why are they so vital?</p><p>--Why the R in MTTR should be Resolve not Respond</p><p>--Case Study of the global hotel group with a 91% reduction in MTTD</p><p>--The #1 cause of all security incidents</p><p>--The open-source alternatives to expensive proprietary solutions</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/mttd-and-mttr-the-only-two-risk-metrics-you-need-to-know]]></link><guid isPermaLink="false">dfce77a0-d676-43a1-b205-a6eca6617933</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 08 Mar 2021 10:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0d4f5c53-55a1-4078-84af-17698be9bced/ns1-2021-03-08-v1.mp3" length="36814515" type="audio/mpeg"/><itunes:duration>25:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode></item><item><title>Little Known SIEM Secrets with Seceon CEO Chandra Pandey</title><itunes:title>Little Known SIEM Secrets with Seceon CEO Chandra Pandey</itunes:title><description><![CDATA[<p>Stanley and Sean of Netswitch are joined by SECEON CEO and SIEM automation expert Chandra Pandey to discuss:</p><p>-- Why is dynamic machine learning &amp; AI automation so important to security?</p><p>-- How to cope with the dynamic threat model.</p><p>-- Why CyberRisk governance is driving the monitoring and reaction to security events.</p><p>-- How effective security automation software can be made affordable for SMBs.</p><p>-- Why Chandra's thousands of clients have not had ONE incident of ransomware being paid out.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Stanley and Sean of Netswitch are joined by SECEON CEO and SIEM automation expert Chandra Pandey to discuss:</p><p>-- Why is dynamic machine learning &amp; AI automation so important to security?</p><p>-- How to cope with the dynamic threat model.</p><p>-- Why CyberRisk governance is driving the monitoring and reaction to security events.</p><p>-- How effective security automation software can be made affordable for SMBs.</p><p>-- Why Chandra's thousands of clients have not had ONE incident of ransomware being paid out.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/little-known-siem-secrets-with-seceon-ceo-chandra-pandey]]></link><guid isPermaLink="false">65fd0b92-c236-42fa-9e2d-c72b3c023dbe</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 22 Feb 2021 11:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d8c0d610-e81b-444a-baaa-13e9eb00e884/little-known-siem-secrets-with-guest-expert-chandra-pandey.mp3" length="44239351" type="audio/mpeg"/><itunes:duration>30:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode></item><item><title>Business Email Compromise: The Good, The Bad and The Ugly</title><itunes:title>Business Email Compromise: The Good, The Bad and The Ugly</itunes:title><description><![CDATA[<p>On this episode Stanley Li and Sean Mahoney of Netswitch discuss:</p><p>-- What is a Business Email Compromise (BEC)?</p><p>-- The bad &amp; ugly, the bad &amp; fortunate and the right way to handle one.</p><p>-- The Four steps to take if you think you're a victim of BEC</p><p>-- Why the supply chain is critical</p><p>-- what is phishing email simulation</p><p>-- Plus, Stanley's big confession!</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>On this episode Stanley Li and Sean Mahoney of Netswitch discuss:</p><p>-- What is a Business Email Compromise (BEC)?</p><p>-- The bad &amp; ugly, the bad &amp; fortunate and the right way to handle one.</p><p>-- The Four steps to take if you think you're a victim of BEC</p><p>-- Why the supply chain is critical</p><p>-- what is phishing email simulation</p><p>-- Plus, Stanley's big confession!</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/business-email-compromise-the-good-the-bad-and-the-ugly]]></link><guid isPermaLink="false">020c3392-bb08-498b-b034-84d1c44a69a5</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 08 Feb 2021 13:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9899aed1-3b51-451f-81a3-365dddd886d8/business-email-compromise-the-good-the-bad-and-the-ugly.mp3" length="33067302" type="audio/mpeg"/><itunes:duration>22:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode></item><item><title>CyberRisk Governance &amp; Compliance Starts With The Truth</title><itunes:title>CyberRisk Governance &amp; Compliance Starts With The Truth</itunes:title><description><![CDATA[<p>Stanley Li and Sean Mahoney from Netswitch are joined by guest expert Jeff Westeman CSPC. Jeff is President of Black Anvil, LLC and is a specialist in CMMC for DoD Contractors. They discuss:</p><p>-- How to make the business case for CMMC compliance </p><p>-- How to get IT tech and compliance controls in alignment</p><p>-- Why compliance is a cross-organizational issue, not just a technology one</p><p>-- How to prepare for vendor selection</p><p>-- Why you should never use your MSP to do your compliance gap analysis</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Stanley Li and Sean Mahoney from Netswitch are joined by guest expert Jeff Westeman CSPC. Jeff is President of Black Anvil, LLC and is a specialist in CMMC for DoD Contractors. They discuss:</p><p>-- How to make the business case for CMMC compliance </p><p>-- How to get IT tech and compliance controls in alignment</p><p>-- Why compliance is a cross-organizational issue, not just a technology one</p><p>-- How to prepare for vendor selection</p><p>-- Why you should never use your MSP to do your compliance gap analysis</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/cyberrisk-governance-compliance-starts-with-the-truth]]></link><guid isPermaLink="false">bd6c7c44-10d5-4dfd-9765-30c019288214</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 25 Jan 2021 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3d8cbcfc-2ea7-4233-bbb1-e8a7c80df420/cyberrisk-governance-and-compliance-starts-with-the-truth.mp3" length="38146133" type="audio/mpeg"/><itunes:duration>26:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><itunes:summary>Stanley Li and Sean Mahoney from Netswitch are joined by guest expert Jeff Westeman CSPC. Jeff is President of Black Anvil, LLC and is a specialist in CMMC for DoD Contractors. They discuss:
-- How to make the business case for CMMC compliance 
-- How to get IT tech and compliance controls in alignment
-- Why compliance is a cross-organizational issue, not just a technology one
-- How to prepare for vendor selection
-- Why you should never use your MSP to do your compliance gap analysis

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>Why Sunburst Means Its Time To Stop Pretending Your IT Professional Is A CyberRisk Expert</title><itunes:title>Why Sunburst Means Its Time To Stop Pretending Your IT Professional Is A CyberRisk Expert</itunes:title><description><![CDATA[<p>Stanley Li and Sean Mahoney discuss what the real implications of the Sunburst attack are for small and mid-size businesses, including:</p><p>-- How do we get management, risk and tech to collaborate?</p><p>-- How do you monitor cloud infrastructure and work with multiple third parties?</p><p>-- How do you integrate different toolsets to monitor the cyber kill chain?</p><p>-- Why its essential to use behavioral tools like SIEMs and where do you start?</p><p>-- What exactly is a supply chain attack?</p><p>-- How 'Are you SOC-2 compliant?' has become the new #1 vendor interview question. </p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Stanley Li and Sean Mahoney discuss what the real implications of the Sunburst attack are for small and mid-size businesses, including:</p><p>-- How do we get management, risk and tech to collaborate?</p><p>-- How do you monitor cloud infrastructure and work with multiple third parties?</p><p>-- How do you integrate different toolsets to monitor the cyber kill chain?</p><p>-- Why its essential to use behavioral tools like SIEMs and where do you start?</p><p>-- What exactly is a supply chain attack?</p><p>-- How 'Are you SOC-2 compliant?' has become the new #1 vendor interview question. </p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/why-sunburst-means-its-time-to-stop-pretending-your-it-professional-is-a-cyberrisk-expert]]></link><guid isPermaLink="false">cfc8522d-b819-4743-b2a4-0e2aa595caec</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 15 Jan 2021 09:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f93d7d2e-fd12-4fb2-8594-8db9eb48713c/why-sunburst-means-its-time-to.mp3" length="37417004" type="audio/mpeg"/><itunes:duration>25:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><itunes:summary>Stanley Li and Sean Mahoney discuss what the real implications of the Sunburst attack are for small and mid-size businesses, including:
-- How do we get management, risk and tech to collaborate?
-- How do you monitor cloud infrastructure and work with multiple third parties?
-- How do you integrate different toolsets to monitor the cyber kill chain?
-- Why its essential to use behavioral tools like SIEMs and where do you start?
-- What exactly is a supply chain attack?
-- How &apos;Are you SOC-2 compliant?&apos; has become the new #1 vendor interview question. 

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>Special Guest Blake Strozdas - Automated Penetration Testing Expert</title><itunes:title>Special Guest Blake Strozdas - Automated Penetration Testing Expert</itunes:title><description><![CDATA[<p>Special guest expert Blake Strozdas from Pcysys joins Stanley Li and Sean Mahoney to share real-life insights and lessons-learned from conducting automated pentests, including:</p><p>-- Why Gartner says only 3-5% of vulnerabilities are actually exploitable.</p><p>-- Why automated pentesting tools are needed to help identify vulnerabilities that have the highest priority.</p><p>-- If a high-risk vulnerability is discovered, how best-of-breed automation tools will take action to nullify risk but not take down your live network.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Special guest expert Blake Strozdas from Pcysys joins Stanley Li and Sean Mahoney to share real-life insights and lessons-learned from conducting automated pentests, including:</p><p>-- Why Gartner says only 3-5% of vulnerabilities are actually exploitable.</p><p>-- Why automated pentesting tools are needed to help identify vulnerabilities that have the highest priority.</p><p>-- If a high-risk vulnerability is discovered, how best-of-breed automation tools will take action to nullify risk but not take down your live network.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/special-guest-blake-strozdas-automated-penetration-testing-expert]]></link><guid isPermaLink="false">388154f4-bf5c-4faa-b16d-6d9b6c0dbdf2</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Wed, 30 Dec 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b181a965-0981-4dad-928c-391720d17090/special-guest-blake-strozdas-automated-penetration-testing-expert.mp3" length="32455410" type="audio/mpeg"/><itunes:duration>22:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><itunes:summary>Special guest expert Blake Strozdas from Pcysys joins Stanley Li, Sean Mahoney to share real-life insights and lessons-learned from conducting automated pentests, including:

-- Why Gartner says only 3-5% of vulnerabilities are actually exploitable.

-- Why automated pentesting tools are needed to help identify vulnerabilities that have the highest priority.

-- If a high-risk vulnerability is discovered, how best-of-breed automation tools will take action to nullify risk but not take down your live network.

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>FireEye and WannaCry - What Are They And Why Are They A Big Deal?</title><itunes:title>FireEye and WannaCry - What Are They And Why Are They A Big Deal?</itunes:title><description><![CDATA[<p>Stanley Li and Sean Mahoney join James Watson to discuss the FireEye hacking incident plus what this means for the average small business in the weeks and months ahead, including:</p><p>-- What exactly was stolen from FireEye and what does it mean for small business owners?</p><p>-- Why the FBI has very unusually commented on an ongoing case.</p><p>-- How simulated testing is on the forefront of cybersecurity.</p><p>-- What are the typical costs of a cyber protection service?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Stanley Li and Sean Mahoney join James Watson to discuss the FireEye hacking incident plus what this means for the average small business in the weeks and months ahead, including:</p><p>-- What exactly was stolen from FireEye and what does it mean for small business owners?</p><p>-- Why the FBI has very unusually commented on an ongoing case.</p><p>-- How simulated testing is on the forefront of cybersecurity.</p><p>-- What are the typical costs of a cyber protection service?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/fireeye-and-wannacry-what-are-they-and-why-are-they-a-big-deal]]></link><guid isPermaLink="false">82687787-86d0-4f8f-9136-40ed138741fb</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Thu, 10 Dec 2020 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a4e9e5e6-30cc-4c57-99fe-af847c715715/fireye-and-wannacry.mp3" length="38026388" type="audio/mpeg"/><itunes:duration>26:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><itunes:summary>Stanley Li and Sean Mahoney join James Watson to discuss the FireEye hacking incident plus what this means for the average small business in the weeks and months ahead, including:

-- What exactly was stolen from FireEye and what does it mean for small business owners?
-- Why the FBI has very unusually commented on an ongoing case.
-- How simulated testing is on the forefront of cybersecurity.
-- What are the typical costs of a cyber protection service?

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>Cyber Crime and Data Insurance FAQs</title><itunes:title>Cyber Crime and Data Insurance FAQs</itunes:title><description><![CDATA[<p>Sean Mahoney and Stanley Li from Netswitch along with James Watson discuss everything you need to know about cyber insurance, including: </p><p>-- What does cyber insurance mean</p><p>-- Why do you need it?</p><p>-- Why is it different from every other insurance industry?</p><p>-- What are the 7 different types of cyber insurance?</p><p>-- How expensive is cyber insurance?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Sean Mahoney and Stanley Li from Netswitch along with James Watson discuss everything you need to know about cyber insurance, including: </p><p>-- What does cyber insurance mean</p><p>-- Why do you need it?</p><p>-- Why is it different from every other insurance industry?</p><p>-- What are the 7 different types of cyber insurance?</p><p>-- How expensive is cyber insurance?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/cyber-crime-and-data-insurance-101]]></link><guid isPermaLink="false">1f7985df-c883-45f7-bf3c-6f698174f5c7</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 07 Dec 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/03fc903f-6441-43ac-b597-f6433c6ffa1f/cyber-crime-and-data-insurance-101-what-you-need-to-know-and-why-you-should-care.mp3" length="31081787" type="audio/mpeg"/><itunes:duration>21:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><itunes:summary>Sean Mahoney and Stanley Li from Netswitch along with James Watson discuss everything you need to know about cyber insurance, including: 

-- What does cyber insurance mean
-- Why do you need it?
-- Why is it different from every other insurance industry?
-- What are the 7 different types of cyber insurance?
-- How expensive is cyber insurance?

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>The Return And Rise Of Ryuk Ransomware</title><itunes:title>The Return And Rise Of Ryuk Ransomware</itunes:title><description><![CDATA[<p>Stanley Li and Sean Mahoney from Netswitch are joined by James Watson to discuss the return and rise of Ryuk ransomware - one of the most dangerous types of targeted enterprise ransomware:</p><p>-- What exactly is Ryuk ransomware?</p><p>-- Which types of organizations are being targeted?</p><p>-- What is the typical value of a Ryuk ransomware demand?</p><p>-- What are the simple, low-cost ways organizations can protect themselves from Ryuk?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Stanley Li and Sean Mahoney from Netswitch are joined by James Watson to discuss the return and rise of Ryuk ransomware - one of the most dangerous types of targeted enterprise ransomware:</p><p>-- What exactly is Ryuk ransomware?</p><p>-- Which types of organizations are being targeted?</p><p>-- What is the typical value of a Ryuk ransomware demand?</p><p>-- What are the simple, low-cost ways organizations can protect themselves from Ryuk?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/the-return-and-rise-of-ryuk-ransomware]]></link><guid isPermaLink="false">9698fc41-a7c3-42bd-b342-e080c223f4b4</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 23 Nov 2020 11:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d5ba5644-ac38-4225-80b2-6bb868504f06/ns1-2020-11-23.mp3" length="29935743" type="audio/mpeg"/><itunes:duration>20:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><itunes:summary>Stanley Li and Sean Mahoney from Netswitch are joined by James Watson to discuss the return and rise of Ryuk ransomware - one of the most dangerous types of targeted enterprise ransomware:

-- What exactly is Ryuk ransomware?
-- Which types of organizations are being targeted?
-- What is the typical value of a Ryuk ransomware demand?
-- What are the simple, low-cost ways organizations can protect themselves from Ryuk?

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>Transforming Risk Management and Compliance - The Power of RegTech</title><itunes:title>Transforming Risk Management and Compliance - The Power of RegTech</itunes:title><description><![CDATA[<p>Stanley Li and Sean Mahoney from Netswitch discuss the increasing importance of 'RegTech' - where compliance meets technology:</p><p>-- What exactly is RegTech and SupTech? </p><p>-- How to bring visibility of both inside a single dashboard.</p><p>-- How today's world has multiple regulatory compliance standards, not just 1 or 2.</p><p>-- Why 'managing by spreadsheet' is no longer an option in this complex world.</p><p>-- A real-world story of the challenges facing one IT Integration architect manager.&nbsp;</p><p>-- Why communication with auditors can cause more issues than doing the compliance work itself.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Stanley Li and Sean Mahoney from Netswitch discuss the increasing importance of 'RegTech' - where compliance meets technology:</p><p>-- What exactly is RegTech and SupTech? </p><p>-- How to bring visibility of both inside a single dashboard.</p><p>-- How today's world has multiple regulatory compliance standards, not just 1 or 2.</p><p>-- Why 'managing by spreadsheet' is no longer an option in this complex world.</p><p>-- A real-world story of the challenges facing one IT Integration architect manager.&nbsp;</p><p>-- Why communication with auditors can cause more issues than doing the compliance work itself.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/transforming-risk-management-and-compliance-with-regtech]]></link><guid isPermaLink="false">942341be-3133-4702-b088-eab6f56d61c1</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Fri, 06 Nov 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/748b833a-2bd7-416d-ad94-19004b38f6c1/cybersecurity-chronicles-ep13-regtech.mp3" length="19947355" type="audio/mpeg"/><itunes:duration>13:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><itunes:summary>Stanley Li and Sean Mahoney from Netswitch discuss the increasing importance of &apos;RegTech&apos; - where compliance meets technology:
-- What exactly is RegTech and SupTech? 
-- How to bring visibility of both inside a single dashboard.
-- A real-world story of the challenges facing one IT Integration architect manager. 
-- Why communication with auditors can cause more issues than doing the compliance work itself.

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>The One Million Dollar Deleted Email</title><itunes:title>The One Million Dollar Deleted Email</itunes:title><description><![CDATA[<p>Sean Mahoney, Stanley Li and James Watson discuss a new case of a construction company that may incur a $1m cost because of a single email deleted by an employee 2 years ago.</p><p>-- Why Governance Risk and Compliance (GRC) is driving the agenda for security controls, policies and procedures for small and mid-size businesses.</p><p>-- How automation can be used to manage and mitigate enterprise risk.</p><p>-- Why managed service providers are evolving to combine support for network administration, security and risk management.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>Sean Mahoney, Stanley Li and James Watson discuss a new case of a construction company that may incur a $1m cost because of a single email deleted by an employee 2 years ago.</p><p>-- Why Governance Risk and Compliance (GRC) is driving the agenda for security controls, policies and procedures for small and mid-size businesses.</p><p>-- How automation can be used to manage and mitigate enterprise risk.</p><p>-- Why managed service providers are evolving to combine support for network administration, security and risk management.</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://cybersecurity-chronicles.captivate.fm/episode/netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/the-one-million-dollar-deleted-email]]></link><guid isPermaLink="false">de76a40a-56d6-4dad-9f37-99068ce96db3</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 26 Oct 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/29489422-82e3-4c32-a463-987359fa2d3f/cybersecurity-chronicles-ep12-the-million-dollar-deleted-email.mp3" length="26456860" type="audio/mpeg"/><itunes:duration>18:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><itunes:summary>Sean Mahoney, Stanley Li and James Watson discuss a new case of a construction company that may incur a $1m cost because of a single email deleted by an employee 2 years ago.

-- Why Governance Risk and Compliance (GRC) is driving the agenda for security controls, policies and procedures for small and mid-size businesses.

-- How automation can be used to manage and mitigate enterprise risk.

-- Why managed service providers are evolving to combine support for network administration, security and risk management.

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>Ransomware - The Cost Beyond Your Payment</title><itunes:title>Ransomware - The Cost Beyond Your Payment</itunes:title><description><![CDATA[<p>In this episode, Sean Mahoney, Stanley Li and James Watson discuss the latest US Dept of Treasury advisory on potential sanctions risks for facilitating ransomware payments.</p><p>Why the OFAC (Office of Foreign Assets Control) is watching.</p><p>The rumour about why Garmin didn't engage with their ransomware attackers directly.</p><p>The importance of ESG - Environmental and Social Governance</p><p>Canadian Internet Registration Authority report says 90% of people will avoid companies that have been breached.&nbsp;</p><p>The ethical dilemma - should hospitals pay ransomware?</p><p>The 3 things small and mid size businesses need to have in place to protect themselves from a Ransomware attack.</p><p>Ransomware used to be a 'last thought' from hackers after breaking into a network. Now its the primary source of 'easy money' for them.</p><p>The Hiscox report said 350 firms (16%) reported paying ransoms off the back of a malware or ransomware attack. Why the real numbers are much higher.</p><p>How researchers figured out how to put ransomware on a coffee maker.</p><p>There is good news..&nbsp;why tools and open-source resources have never been more cost-effective to protect infrastructure from attackers.</p><p>The #1 cheapest way to protect yourself from hackers.</p><p><em>Sponsored by Netswitch Technology Management - </em><a href="netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>In this episode, Sean Mahoney, Stanley Li and James Watson discuss the latest US Dept of Treasury advisory on potential sanctions risks for facilitating ransomware payments.</p><p>Why the OFAC (Office of Foreign Assets Control) is watching.</p><p>The rumour about why Garmin didn't engage with their ransomware attackers directly.</p><p>The importance of ESG - Environmental and Social Governance</p><p>Canadian Internet Registration Authority report says 90% of people will avoid companies that have been breached.&nbsp;</p><p>The ethical dilemma - should hospitals pay ransomware?</p><p>The 3 things small and mid size businesses need to have in place to protect themselves from a Ransomware attack.</p><p>Ransomware used to be a 'last thought' from hackers after breaking into a network. Now its the primary source of 'easy money' for them.</p><p>The Hiscox report said 350 firms (16%) reported paying ransoms off the back of a malware or ransomware attack. Why the real numbers are much higher.</p><p>How researchers figured out how to put ransomware on a coffee maker.</p><p>There is good news..&nbsp;why tools and open-source resources have never been more cost-effective to protect infrastructure from attackers.</p><p>The #1 cheapest way to protect yourself from hackers.</p><p><em>Sponsored by Netswitch Technology Management - </em><a href="netswitch.net" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/ransomware-the-cost-beyond-your-payment]]></link><guid isPermaLink="false">b19248ce-0b31-4324-aa2a-eea0c63d2040</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 19 Oct 2020 14:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c57ede66-a648-49c2-8242-57bd5b0be47a/cybersecurity-chronicles-ep11-ransomware-the-cost-beyond-your-payment.mp3" length="27407926" type="audio/mpeg"/><itunes:duration>19:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode></item><item><title>Managed Detection and Response or a Managed Security Service Provider?</title><itunes:title>Managed Detection and Response or a Managed Security Service Provider?</itunes:title><description><![CDATA[<p>On this episode Don Cox, former CISO at Mednax, Inc joins Stanley Li and Sean Mahoney of Netswitch to discuss the key differences between a Managed Detection and Response (MDR) Service compared to a Managed Security Service Provider (MSSP). </p><p>Topics include:</p><p>- What is MDR and what is an MSSP?</p><p>- How does the MDR model differ from an MSSP?</p><p>- Why would I use MDR?</p><p>- Can MSSPs provide MDR?</p><p>- What types of organizations typically use MDR?</p><p>- Can I replace my MSSP with MDR?</p><p>- Would I ever use MDR and an MSSP?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>On this episode Don Cox, former CISO at Mednax, Inc joins Stanley Li and Sean Mahoney of Netswitch to discuss the key differences between a Managed Detection and Response (MDR) Service compared to a Managed Security Service Provider (MSSP). </p><p>Topics include:</p><p>- What is MDR and what is an MSSP?</p><p>- How does the MDR model differ from an MSSP?</p><p>- Why would I use MDR?</p><p>- Can MSSPs provide MDR?</p><p>- What types of organizations typically use MDR?</p><p>- Can I replace my MSSP with MDR?</p><p>- Would I ever use MDR and an MSSP?</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/managed-detection-and-response-v-managed-security-service-providers]]></link><guid isPermaLink="false">2ecff980-7e3f-4b52-b858-1e91aa9c2457</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 05 Oct 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f2c683f7-22d4-46d6-a4b6-e180ddc3c6b3/ns1-2020-10-01-v1.mp3" length="28566509" type="audio/mpeg"/><itunes:duration>19:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><itunes:summary>On this episode Don Cox, former CISO at Mednax, Inc joins Stanley Li and Sean Mahoney of Netswitch to discuss the key differences between a Managed Detection and Response (MDR) Service compared to a Managed Security Service Provider (MSSP).</itunes:summary></item><item><title>Why All CIOs &amp; CISOs Will End Up Working For Risk Managers</title><itunes:title>Why All CIOs &amp; CISOs Will End Up Working For Risk Managers</itunes:title><description><![CDATA[<p>-Why risk management and technology are totally different skill sets.</p><p>-The #1 problem involving products, vendors, compliance and security. </p><p>-The 2 top questions CEOs are asking right now about risk.</p><p>-What Covid-19 means for global security budgets.</p><p>-Who's becoming the real driver of technology decisions today.</p><p>-Why risk is a business problem, not an IT one.</p><p>-Why the roles of CIOs and CFOs are broadening to include risk.</p><p>-The first question risk managers always ask (hint - its not about tech).</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></description><content:encoded><![CDATA[<p>-Why risk management and technology are totally different skill sets.</p><p>-The #1 problem involving products, vendors, compliance and security. </p><p>-The 2 top questions CEOs are asking right now about risk.</p><p>-What Covid-19 means for global security budgets.</p><p>-Who's becoming the real driver of technology decisions today.</p><p>-Why risk is a business problem, not an IT one.</p><p>-Why the roles of CIOs and CFOs are broadening to include risk.</p><p>-The first question risk managers always ask (hint - its not about tech).</p><p><em>Sponsored by Netswitch Technology Management -&nbsp;</em><a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank"><em>netswitch.net</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/why-all-cios-cisos-will-end-up-working-for-risk-managers]]></link><guid isPermaLink="false">96b25c7b-27e4-4e1c-a6ad-6eea55d5a653</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 28 Sep 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0f5dd584-feae-462f-82f1-90f3dbb1ce90/cybersecurity-chronicles-ep09-why-all-cios-cisos-will-end-up-working-for-risk-managers.mp3" length="24428086" type="audio/mpeg"/><itunes:duration>16:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode></item><item><title>Penetration Testing: A Managed Service Or Only Once Per Year?</title><itunes:title>Penetration Testing: A Managed Service Or Only Once Per Year?</itunes:title><description><![CDATA[<p>In this episode Stanley Li and Sean Mahoney from Netswitch are joined by James Watson to discuss exactly what is Penetration Testing as a Service (PTaaS) and the increasing trend for businesses to move away from once-a-year pen tests to more regular, monthly ones instead.</p><p><strong>Episode highlights:</strong></p><p>- 15 years ago, when manual vulnerability scanning and assessments were the only options.</p><p>- Why manual plus automated testing combined is essential to get the highest quality results from pen tests.</p><p>- The new CVE 2020 1472 vulnerability Microsoft recently announced that won't be patched until 2021, and what this means for your testing schedule.</p><p>- Why insecure configurations created by your IT admins could be increasing your risk more than you realise.</p><p>- How the increasing number of regulatory and certification requirements have changed the testing landscape.</p><p>- Why companies now have to demonstrate they're consistently pro-active in testing their networks.</p><p>- Why the increase in remote working has only amplified these issues.</p><p>- Why penetration testing as a service is much more affordable than annual tests of years gone by.</p><p>- Which types of companies are particularly increasing their testing frequency.</p><p>- Why vulnerability assessments alone will not protect you from Ransomware attacks.</p><p>- What data penetration tests can identify that vulnerability assessments are unable to.</p><p>- How to effectively manage security risk if you're a small business with a limited budget.</p><p>- How an international hotel group client has increased their vulnerability assessment frequency from annually to monthly.</p><p>- Why they jumped at the chance to deploy Penetration Testing as a Service.</p><p>- How the old way of manual penetration testing could take over a month.</p><p>- Why the new combination of automation and manual effort can now perform the testing and deliver a report with remediation in just one business week.</p><p>- Why this means more time can be spent on remediation efforts and less on the testing itself.</p><p>- Why consistency is the key to effectively managing your cyber risk in an increasingly insecure world.</p><p><strong><em>Sponsored by Netswitch Technology Management -&nbsp;</em></strong><a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank"><strong><em>netswitch.net</em></strong></a></p>]]></description><content:encoded><![CDATA[<p>In this episode Stanley Li and Sean Mahoney from Netswitch are joined by James Watson to discuss exactly what is Penetration Testing as a Service (PTaaS) and the increasing trend for businesses to move away from once-a-year pen tests to more regular, monthly ones instead.</p><p><strong>Episode highlights:</strong></p><p>- 15 years ago, when manual vulnerability scanning and assessments were the only options.</p><p>- Why manual plus automated testing combined is essential to get the highest quality results from pen tests.</p><p>- The new CVE 2020 1472 vulnerability Microsoft recently announced that won't be patched until 2021, and what this means for your testing schedule.</p><p>- Why insecure configurations created by your IT admins could be increasing your risk more than you realise.</p><p>- How the increasing number of regulatory and certification requirements have changed the testing landscape.</p><p>- Why companies now have to demonstrate they're consistently pro-active in testing their networks.</p><p>- Why the increase in remote working has only amplified these issues.</p><p>- Why penetration testing as a service is much more affordable than annual tests of years gone by.</p><p>- Which types of companies are particularly increasing their testing frequency.</p><p>- Why vulnerability assessments alone will not protect you from Ransomware attacks.</p><p>- What data penetration tests can identify that vulnerability assessments are unable to.</p><p>- How to effectively manage security risk if you're a small business with a limited budget.</p><p>- How an international hotel group client has increased their vulnerability assessment frequency from annually to monthly.</p><p>- Why they jumped at the chance to deploy Penetration Testing as a Service.</p><p>- How the old way of manual penetration testing could take over a month.</p><p>- Why the new combination of automation and manual effort can now perform the testing and deliver a report with remediation in just one business week.</p><p>- Why this means more time can be spent on remediation efforts and less on the testing itself.</p><p>- Why consistency is the key to effectively managing your cyber risk in an increasingly insecure world.</p><p><strong><em>Sponsored by Netswitch Technology Management -&nbsp;</em></strong><a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank"><strong><em>netswitch.net</em></strong></a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/penetration-testing-a-managed-service-or-only-once-per-year]]></link><guid isPermaLink="false">22dca46b-60cc-423d-9487-df7c519a1e57</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 21 Sep 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ba9b24ce-c771-443a-85ad-3f100192c7c8/cybersecurity-chronicles-ep08-penetration-testing.mp3" length="26301379" type="audio/mpeg"/><itunes:duration>18:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><itunes:summary>In this episode Stanley Li and Sean Mahoney from Netswitch are joined by James Watson to discuss exactly what is Penetration Testing as a Service (PTaaS) and the increasing trend for businesses to move away from once-a-year pen tests to more regular, monthly ones instead.

Episode highlights:

- 15 years ago, when manual vulnerability scanning and assessments were the only options.
- The market opportunity we missed out on 15 years ago, and the lessons we learned as a result.
- Why manual plus automated testing combined is essential to get the highest quality results from pen tests.
- The new CVE 2020 1472 vulnerability Microsoft recently announced that won&apos;t be patched until 2021, and what this means for your testing schedule.
- Why insecure configurations created by your IT admins could be increasing your risk more than you realise.
- How the increasing number of regulatory and certification requirements have changed the testing landscape.
- Why companies now have to demonstrate they&apos;re consistently pro-active in testing their networks.
- Why the increase in remote working has only amplified these issues.
- Why penetration testing as a service is much more affordable than annual tests of years gone by.
- Which types of companies are particularly increasing their testing frequency.
- Why vulnerability assessments alone will not protect you from Ransomware attacks.
- What data penetration tests can identify that vulnerability assessments are unable to.
- How to effectively manage security risk if you&apos;re a small business with a limited budget.
- How an international hotel group client has increased their vulnerability assessment frequency from annually to monthly.
- Why they jumped at the chance to use our Penetration Testing as a Service approach.
- How the old way of manual penetration testing could take over a month.
- Why the new combination of automation and manual effort can now perform the testing and deliver a report with remediation in just one business week.
- Why this means more time can be spent on remediation efforts and less on the testing itself.
- Why consistency is the key to effectively managing your cyber risk in an increasingly insecure world.

Sponsored by Netswitch Technology Management - netswitch.net</itunes:summary></item><item><title>Penetration Testing FAQs</title><itunes:title>Penetration Testing FAQs</itunes:title><description><![CDATA[<p>In this episode Sean Mahoney is joined by Stanley Li and Professor Michael Lassiter from Netswitch to discuss some of the most commonly asked questions about penetration tests, which include:</p><ul><li>How do I know a pen test is effective?&nbsp;&nbsp;</li><li>How do we set the goals of the pen test?&nbsp;Will you make recommendations to the business?</li><li>How can we trust your automated tool?&nbsp;</li><li>Do I need a black box test for PCI-DSS or HIPAA compliance?</li><li>When you send the post pen test report to us, what are supposed to do with it?&nbsp;</li><li>How long should it take to do the remediation work?</li><li>Do we have to remedy the vulns or do you?</li><li>How do we know the vulns found in the pen test are corrected properly?</li><li>My vendor (or customer) wants to see the pen test results as part of their supply chain review.&nbsp;Should I share it with them?</li></ul><br/><p>Sponsored by Netswitch Technology Management -&nbsp;<a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></description><content:encoded><![CDATA[<p>In this episode Sean Mahoney is joined by Stanley Li and Professor Michael Lassiter from Netswitch to discuss some of the most commonly asked questions about penetration tests, which include:</p><ul><li>How do I know a pen test is effective?&nbsp;&nbsp;</li><li>How do we set the goals of the pen test?&nbsp;Will you make recommendations to the business?</li><li>How can we trust your automated tool?&nbsp;</li><li>Do I need a black box test for PCI-DSS or HIPAA compliance?</li><li>When you send the post pen test report to us, what are supposed to do with it?&nbsp;</li><li>How long should it take to do the remediation work?</li><li>Do we have to remedy the vulns or do you?</li><li>How do we know the vulns found in the pen test are corrected properly?</li><li>My vendor (or customer) wants to see the pen test results as part of their supply chain review.&nbsp;Should I share it with them?</li></ul><br/><p>Sponsored by Netswitch Technology Management -&nbsp;<a href="https://netswitch.net/" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/penetration-testing-faqs]]></link><guid isPermaLink="false">57854b88-120d-44ec-ac90-3c5e2ecb6e6a</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 14 Sep 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/68a69dd8-bae9-45e3-9150-8b9634ceff89/cybersecurity-chronicles-ep07-penetration-testing-faqs.mp3" length="27959005" type="audio/mpeg"/><itunes:duration>19:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode></item><item><title>Vulnerability Assessments And Penetration Testing 201</title><itunes:title>Vulnerability Assessments And Penetration Testing 201</itunes:title><description><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></description><content:encoded><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/vulnerability-assessments-and-penetration-testing-201]]></link><guid isPermaLink="false">b3a1c66f-ee0f-4427-95c5-8d7e92c42814</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 31 Aug 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ea1267ac-e1b4-4dce-80f8-942acf3c78c5/cybersecurity-chronicles-ep06-vulnerability-assessments-and-penetration-testing-201.mp3" length="32061693" type="audio/mpeg"/><itunes:duration>22:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode></item><item><title>Vulnerability Assessments And Penetration Testing 101</title><itunes:title>Vulnerability Assessments And Penetration Testing 101</itunes:title><description><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></description><content:encoded><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/vulnerability-assessments-and-penetration-testing-101]]></link><guid isPermaLink="false">50439226-6d1c-4d21-8233-ffe181a44eba</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 24 Aug 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7898400f-c215-4f85-bd75-5af5324cd3ff/cybersecurity-chronicles-ep05-vulnerability-assessments-and-penetration-testing-101.mp3" length="49703750" type="audio/mpeg"/><itunes:duration>34:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode></item><item><title>Multi-Layered Defense And Platform As A Service</title><itunes:title>Multi-Layered Defense And Platform As A Service</itunes:title><description><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></description><content:encoded><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/multi-layered-defense-and-platform-as-a-service]]></link><guid isPermaLink="false">943a0ea3-08ea-47c0-8b5b-a773342c2fdf</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 17 Aug 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/65a27f5a-3e93-4d62-8242-233be8964211/cybersecurity-chronicles-ep04-multi-layered-defense-and-platform-as-a-service.mp3" length="24990450" type="audio/mpeg"/><itunes:duration>17:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode></item><item><title>The Rising Cost Of Security Tools</title><itunes:title>The Rising Cost Of Security Tools</itunes:title><description><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></description><content:encoded><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/the-rising-cost-of-security-tools]]></link><guid isPermaLink="false">97b3f134-837f-424f-be5e-f7bc74445598</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 10 Aug 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7f8c3e5b-5c22-41a0-b2b7-ebd7ead5d4d7/cybersecurity-chronicles-ep03-the-rising-cost-of-security-tools.mp3" length="26016749" type="audio/mpeg"/><itunes:duration>18:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode></item><item><title>The Mouse Of The Problem</title><itunes:title>The Mouse Of The Problem</itunes:title><description><![CDATA[<p>Sponsored by Netswitch Technology Management -&nbsp;<a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></description><content:encoded><![CDATA[<p>Sponsored by Netswitch Technology Management -&nbsp;<a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/the-mouse-of-the-problem]]></link><guid isPermaLink="false">9c81dbee-8f90-4d2e-90e1-f17bb1119f52</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 03 Aug 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bd16c95a-8c48-4c0b-95e1-c0fcc9050cdd/cybersecurity-chronicles-ep02-the-mouse-of-the-problem.mp3" length="23368560" type="audio/mpeg"/><itunes:duration>16:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode></item><item><title>Ransomware In Kentucky</title><itunes:title>Ransomware In Kentucky</itunes:title><description><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></description><content:encoded><![CDATA[<p>Sponsored by Netswitch Technology Management - <a href="https://netswitch.net" rel="noopener noreferrer" target="_blank">netswitch.net</a></p>]]></content:encoded><link><![CDATA[https://cybersecurity-chronicles.captivate.fm/episode/ransomware-in-kentucky]]></link><guid isPermaLink="false">0dc916d6-5009-497d-9370-df85b6c185e7</guid><itunes:image href="https://artwork.captivate.fm/44f82f80-5a51-4b04-b0c1-602d699858b2/wUWK9M4PbjxsNcNwlvVVXGSM.png"/><pubDate>Mon, 27 Jul 2020 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/339a4075-7f34-4a9a-b642-b149cb2be300/cybersecurity-chronicles-ep01-ransomware-in-kentucky.mp3" length="25236210" type="audio/mpeg"/><itunes:duration>17:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode></item></channel></rss>