<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/disasterstream/" rel="self" type="application/rss+xml"/><title><![CDATA[Disaster.Stream]]></title><podcast:guid>2b9d6052-181f-525f-9f9d-da014914e1cb</podcast:guid><lastBuildDate>Tue, 02 Sep 2025 15:36:01 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2025 Bill Alderson]]></copyright><podcast:value type="lightning" method="keysend" suggested="1"><podcast:valueRecipient name="William Alderson" type="lightning" address="politebeach344685@getalby.com" split="100" customKey="" customValue=""/></podcast:value><managingEditor>Bill Alderson</managingEditor><itunes:summary><![CDATA[Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available in both audio and video formats, Disaster Stream is your go-to resource for understanding and navigating the complexities of disaster recovery and cybersecurity]]></itunes:summary><image><url>https://artwork.captivate.fm/1829ba5b-c91e-4a5c-9f04-742aebde8c13/Disaster-Stream-Podcast.png</url><title>Disaster.Stream</title><link><![CDATA[https://disaster.stream]]></link></image><itunes:image href="https://artwork.captivate.fm/1829ba5b-c91e-4a5c-9f04-742aebde8c13/Disaster-Stream-Podcast.png"/><itunes:owner><itunes:name>Bill Alderson</itunes:name></itunes:owner><itunes:author>Bill Alderson</itunes:author><description>Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available in both audio and video formats, Disaster Stream is your go-to resource for understanding and navigating the complexities of disaster recovery and cybersecurity</description><link>https://disaster.stream</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Disaster Stream is a podcast series that delves into the world of disaster recovery]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="History"></itunes:category><itunes:category text="Society &amp; Culture"><itunes:category text="Documentary"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><podcast:funding url="https://buymeacoffee.com/morpheuscyber">Support the Show!</podcast:funding><podcast:license url="https://www.morpheuscyber.com/legal/">All Rights Reserved</podcast:license><podcast:location>Austin, Texas</podcast:location><item><title>When ATMs Fail: Banking Outages, Black Swans &amp; Digital Risk</title><itunes:title>When ATMs Fail: Banking Outages, Black Swans &amp; Digital Risk</itunes:title><description><![CDATA[<p>In this episode of the <strong>Disaster.Stream Podcast</strong>, host <strong>Bill Alderson</strong> sits down with <strong>Bill Genovese</strong>, CIO Executive Advisor at <strong>Kyndryl</strong>, to explore one of the most high-stakes failures in modern banking: a nationwide <strong>ATM outage during a holiday weekend</strong>.</p><p>Drawing from decades of global experience with IBM, Kyndryl, and Big Four consulting, Genovese shares how banking systems can unravel in moments — and why recovery often requires more than just technology. Together, they examine how <strong>black swan events</strong> (rare, catastrophic failures) and <strong>gray swan events</strong> (compounding, foreseeable risks) threaten not just banks but entire national economies.</p><p>🔑 <strong>What you’ll learn in this episode:</strong></p><ul><li>The true impact of a bank losing all ATMs before a holiday</li><li>Black swan vs. gray swan risks — and why multiple gray swans can be worse</li><li>Lessons from IBM’s global SWAT teams on crisis response and remediation</li><li>How banking regulations, international oversight, and resilience standards shape recovery strategies</li><li>Why <strong>digital transformation and multi-cloud dependencies</strong> increase complexity</li><li>Practical lessons financial institutions can adopt to build resilience</li></ul><br/><p>👥 <strong>Featured voices:</strong></p><ul><li><strong>Bill Genovese (Kyndryl)</strong> — global expert on financial services architecture, resiliency, and risk advisory</li><li><strong>Nick Leghorn (New York Times)</strong> — application security leader, on how to write cybersecurity policies people will actually follow</li><li><strong>ISSA (Information Systems Security Association)</strong> — professional community strengthening global cybersecurity practices</li></ul><br/><p>💡 <strong>Key Takeaway:</strong></p><p>There is no cookie-cutter solution for disaster recovery. Each bank and enterprise has a unique “technology fingerprint” that requires <strong>holistic analysis across people, process, and technology</strong>. True resilience means planning for the compounding risks of our interconnected world.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the <strong>Disaster.Stream Podcast</strong>, host <strong>Bill Alderson</strong> sits down with <strong>Bill Genovese</strong>, CIO Executive Advisor at <strong>Kyndryl</strong>, to explore one of the most high-stakes failures in modern banking: a nationwide <strong>ATM outage during a holiday weekend</strong>.</p><p>Drawing from decades of global experience with IBM, Kyndryl, and Big Four consulting, Genovese shares how banking systems can unravel in moments — and why recovery often requires more than just technology. Together, they examine how <strong>black swan events</strong> (rare, catastrophic failures) and <strong>gray swan events</strong> (compounding, foreseeable risks) threaten not just banks but entire national economies.</p><p>🔑 <strong>What you’ll learn in this episode:</strong></p><ul><li>The true impact of a bank losing all ATMs before a holiday</li><li>Black swan vs. gray swan risks — and why multiple gray swans can be worse</li><li>Lessons from IBM’s global SWAT teams on crisis response and remediation</li><li>How banking regulations, international oversight, and resilience standards shape recovery strategies</li><li>Why <strong>digital transformation and multi-cloud dependencies</strong> increase complexity</li><li>Practical lessons financial institutions can adopt to build resilience</li></ul><br/><p>👥 <strong>Featured voices:</strong></p><ul><li><strong>Bill Genovese (Kyndryl)</strong> — global expert on financial services architecture, resiliency, and risk advisory</li><li><strong>Nick Leghorn (New York Times)</strong> — application security leader, on how to write cybersecurity policies people will actually follow</li><li><strong>ISSA (Information Systems Security Association)</strong> — professional community strengthening global cybersecurity practices</li></ul><br/><p>💡 <strong>Key Takeaway:</strong></p><p>There is no cookie-cutter solution for disaster recovery. Each bank and enterprise has a unique “technology fingerprint” that requires <strong>holistic analysis across people, process, and technology</strong>. True resilience means planning for the compounding risks of our interconnected world.</p>]]></content:encoded><link><![CDATA[https://disaster.stream/episode/when-atms-fail-banking-outages-black-swans-digital-risk]]></link><guid isPermaLink="false">aacb4208-5ffc-4cbb-a83f-febf34416195</guid><itunes:image href="https://artwork.captivate.fm/1829ba5b-c91e-4a5c-9f04-742aebde8c13/Disaster-Stream-Podcast.png"/><pubDate>Wed, 27 Aug 2025 05:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/aacb4208-5ffc-4cbb-a83f-febf34416195.mp3" length="85949793" type="audio/mpeg"/><itunes:duration>01:11:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f45dc355-9fda-460f-a14d-c872d769c1f4/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f45dc355-9fda-460f-a14d-c872d769c1f4/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f45dc355-9fda-460f-a14d-c872d769c1f4/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Holiday ATM Meltdown: Gray Swans, Banking Resilience &amp; DR"><podcast:source uri="https://youtu.be/g5YL21-Zjz0"/></podcast:alternateEnclosure></item><item><title>US Military Biometric Systems: Digital War Lessons from Iraq</title><itunes:title>US Military Biometric Systems: Digital War Lessons from Iraq</itunes:title><description><![CDATA[<p>In this episode of the <strong>Disaster.Stream Podcast</strong>, host <strong>Bill Alderson</strong> takes you inside one of the most critical — and least understood — battles of the Iraq and Afghanistan wars: the fight to keep U.S. military <strong>biometric intelligence systems</strong> running in the middle of the digital war.</p><p>Bill recounts how he was called by Army G2 at the Pentagon and deployed with <strong>U.S. CENTCOM</strong> to Iraq when a biometric watchlist system—used to identify insurgents through fingerprints, iris scans, and facial recognition—failed at a crucial moment. With millions of records in play and soldiers depending on accurate intelligence at checkpoints and bases, the failure threatened operational readiness.</p><p>🔑 <strong>What you’ll learn in this episode:</strong></p><ul><li>How biometric systems were used to enroll entire populations in Fallujah and beyond</li><li>The technical challenges of scaling biometric databases during wartime</li><li>Why replication delays and network bottlenecks nearly crippled the system mid-war</li><li>How battlefield packet analysis and root cause troubleshooting restored operations</li><li>Lessons learned that still apply today in cybersecurity, disaster recovery, and digital identity management</li></ul><br/><p>👥 Special segments also feature:</p><ul><li><strong>Charlene Deaver-Vasquez (FISMACS)</strong> on mathematical models for forecasting cyberattacks</li><li><strong>Jon DiMaggio</strong>, author of <em>The Art of Cyber Warfare</em>, with insights into nation-state cyber threats</li></ul><br/><p>From the Pentagon and CENTCOM to forward-deployed teams in Iraq and Afghanistan, Bill shares firsthand experiences of solving mission-critical failures when lives were on the line. These stories carry timeless lessons on <strong>incident response, readiness, and building resilient systems</strong>.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the <strong>Disaster.Stream Podcast</strong>, host <strong>Bill Alderson</strong> takes you inside one of the most critical — and least understood — battles of the Iraq and Afghanistan wars: the fight to keep U.S. military <strong>biometric intelligence systems</strong> running in the middle of the digital war.</p><p>Bill recounts how he was called by Army G2 at the Pentagon and deployed with <strong>U.S. CENTCOM</strong> to Iraq when a biometric watchlist system—used to identify insurgents through fingerprints, iris scans, and facial recognition—failed at a crucial moment. With millions of records in play and soldiers depending on accurate intelligence at checkpoints and bases, the failure threatened operational readiness.</p><p>🔑 <strong>What you’ll learn in this episode:</strong></p><ul><li>How biometric systems were used to enroll entire populations in Fallujah and beyond</li><li>The technical challenges of scaling biometric databases during wartime</li><li>Why replication delays and network bottlenecks nearly crippled the system mid-war</li><li>How battlefield packet analysis and root cause troubleshooting restored operations</li><li>Lessons learned that still apply today in cybersecurity, disaster recovery, and digital identity management</li></ul><br/><p>👥 Special segments also feature:</p><ul><li><strong>Charlene Deaver-Vasquez (FISMACS)</strong> on mathematical models for forecasting cyberattacks</li><li><strong>Jon DiMaggio</strong>, author of <em>The Art of Cyber Warfare</em>, with insights into nation-state cyber threats</li></ul><br/><p>From the Pentagon and CENTCOM to forward-deployed teams in Iraq and Afghanistan, Bill shares firsthand experiences of solving mission-critical failures when lives were on the line. These stories carry timeless lessons on <strong>incident response, readiness, and building resilient systems</strong>.</p>]]></content:encoded><link><![CDATA[https://disaster.stream/episode/us-military-biometric-systems-digital-war-lessons-from-iraq]]></link><guid isPermaLink="false">2c3aaa09-ef01-446b-b2b7-0c9a146c9bad</guid><itunes:image href="https://artwork.captivate.fm/1829ba5b-c91e-4a5c-9f04-742aebde8c13/Disaster-Stream-Podcast.png"/><pubDate>Wed, 27 Aug 2025 05:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2c3aaa09-ef01-446b-b2b7-0c9a146c9bad.mp3" length="71776797" type="audio/mpeg"/><itunes:duration>59:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/3a3c23d8-61fa-4974-9154-4a3ff5ce0e1b/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3a3c23d8-61fa-4974-9154-4a3ff5ce0e1b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3a3c23d8-61fa-4974-9154-4a3ff5ce0e1b/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Inside the Digital War: Biometrics &amp; Watchlists in Iraq"><podcast:source uri="https://youtu.be/t34rn7r76mo"/></podcast:alternateEnclosure></item><item><title>Radia Perlman: Spanning Tree, Networking Lessons &amp; SharkFest Keynote</title><itunes:title>Radia Perlman: Spanning Tree, Networking Lessons &amp; SharkFest Keynote</itunes:title><description><![CDATA[<p>In this special interview, I sit down with <strong>Radia Perlman</strong> — the visionary computer scientist and inventor of the <strong>Spanning Tree Protocol (STP)</strong>, often called the “Mother of the Internet.” Her groundbreaking work made modern Ethernet and switching possible, shaping the way every network operates today.</p><p>Radia shares her journey as a pioneer in networking, her reflections on how STP became a global standard, and her thoughts on why Layer 2 forwarding was always a compromise — and what the industry still gets wrong about it. We also look ahead at <strong>quantum-safe cryptography, CLNP vs. IP, and the future of protocols like QUIC</strong>.</p><p>🔑 <strong>What you’ll learn in this episode:</strong></p><ul><li>How Radia invented Spanning Tree and why it was meant to be “just a temporary fix”</li><li>Why network loops and misconfigurations are still a common cause of outages</li><li>The missed opportunity of CLNP and what it could have meant for the Internet</li><li>The realities (and misconceptions) around <strong>quantum computing and cryptography</strong></li><li>Radia’s candid thoughts on hype cycles like blockchain</li><li>A preview of her keynote at <strong>SharkFest</strong> — bringing theory and practice together</li></ul><br/><p>👩‍💻 Beyond the protocols, Radia also reflects on her role as a trailblazer for women in technology, offering encouragement to the next generation of engineers and innovators.</p><p>Whether you’re a network engineer, a cybersecurity leader, or simply curious about the hidden foundations of the Internet, this conversation with Radia Perlman is packed with insights, lessons, and history you won’t find anywhere else.</p><p>👉 Follow the show for more conversations with the leaders shaping networking, cybersecurity, and disaster recovery worldwide.</p>]]></description><content:encoded><![CDATA[<p>In this special interview, I sit down with <strong>Radia Perlman</strong> — the visionary computer scientist and inventor of the <strong>Spanning Tree Protocol (STP)</strong>, often called the “Mother of the Internet.” Her groundbreaking work made modern Ethernet and switching possible, shaping the way every network operates today.</p><p>Radia shares her journey as a pioneer in networking, her reflections on how STP became a global standard, and her thoughts on why Layer 2 forwarding was always a compromise — and what the industry still gets wrong about it. We also look ahead at <strong>quantum-safe cryptography, CLNP vs. IP, and the future of protocols like QUIC</strong>.</p><p>🔑 <strong>What you’ll learn in this episode:</strong></p><ul><li>How Radia invented Spanning Tree and why it was meant to be “just a temporary fix”</li><li>Why network loops and misconfigurations are still a common cause of outages</li><li>The missed opportunity of CLNP and what it could have meant for the Internet</li><li>The realities (and misconceptions) around <strong>quantum computing and cryptography</strong></li><li>Radia’s candid thoughts on hype cycles like blockchain</li><li>A preview of her keynote at <strong>SharkFest</strong> — bringing theory and practice together</li></ul><br/><p>👩‍💻 Beyond the protocols, Radia also reflects on her role as a trailblazer for women in technology, offering encouragement to the next generation of engineers and innovators.</p><p>Whether you’re a network engineer, a cybersecurity leader, or simply curious about the hidden foundations of the Internet, this conversation with Radia Perlman is packed with insights, lessons, and history you won’t find anywhere else.</p><p>👉 Follow the show for more conversations with the leaders shaping networking, cybersecurity, and disaster recovery worldwide.</p>]]></content:encoded><link><![CDATA[https://disaster.stream/episode/radia-perlman-spanning-tree-networking-lessons-sharkfest-keynote]]></link><guid isPermaLink="false">8b5f6997-93a7-406d-ba0a-0f8ee02447b3</guid><itunes:image href="https://artwork.captivate.fm/1829ba5b-c91e-4a5c-9f04-742aebde8c13/Disaster-Stream-Podcast.png"/><pubDate>Wed, 27 Aug 2025 05:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8b5f6997-93a7-406d-ba0a-0f8ee02447b3.mp3" length="38758022" type="audio/mpeg"/><itunes:duration>32:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/dc410b73-18b2-483b-b702-b6ae672819ef/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/dc410b73-18b2-483b-b702-b6ae672819ef/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/dc410b73-18b2-483b-b702-b6ae672819ef/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Radia Perlman Unplugged: Spanning Tree, Layer-3 Truths, &amp; the Future of Networking"><podcast:source uri="https://youtu.be/JsoYjtvcvZ8"/></podcast:alternateEnclosure></item><item><title>Pentagon 9/11 Recovery: Lessons in Crisis Response &amp; Readiness</title><itunes:title>Pentagon 9/11 Recovery: Lessons in Crisis Response &amp; Readiness</itunes:title><description><![CDATA[<p>On September 11, 2001, the Pentagon was left crippled by fire, water damage, and destroyed infrastructure after the terrorist attack. Days later, armed guards escorted my team and me into the still-smoldering building to restore critical communications for the U.S. Department of Defense.</p><p>In this episode, I share that story firsthand — what it was like to step into the epicenter of national crisis and lead a forensic recovery team tasked with bringing the Pentagon back online.</p><p>You’ll learn:</p><ul><li>🔎 <strong>What really happened inside the Pentagon’s network after 9/11</strong></li><li>⚡ <strong>The triage process</strong> for restoring thousands of servers and critical links under extreme pressure</li><li>🧠 <strong>Why readiness beats reaction</strong> — and why lessons learned matter more than blame</li><li>🏛️ <strong>Leadership under fire</strong>, featuring insights from Col. David Wills (U.S. CENTCOM &amp; Joint Chiefs of Staff)</li><li>📑 <strong>Best practices for disaster response</strong>, from documenting your infrastructure to building resilient “tiger teams”</li><li>💡 How today’s organizations can apply these lessons to avoid catastrophic downtime — from data centers to Wall Street trading floors</li></ul><br/><p>This is more than a war story — it’s a framework for <strong>crisis management, cybersecurity resilience, and business continuity</strong>. Whether you’re a technologist, executive, or leader of any kind, the lessons from 9/11 remain vital today.</p><p>👉 <strong>Key takeaway:</strong> It’s always more fun to be ready. Preparation, documentation, and collaboration can turn disaster into an opportunity for growth.</p>]]></description><content:encoded><![CDATA[<p>On September 11, 2001, the Pentagon was left crippled by fire, water damage, and destroyed infrastructure after the terrorist attack. Days later, armed guards escorted my team and me into the still-smoldering building to restore critical communications for the U.S. Department of Defense.</p><p>In this episode, I share that story firsthand — what it was like to step into the epicenter of national crisis and lead a forensic recovery team tasked with bringing the Pentagon back online.</p><p>You’ll learn:</p><ul><li>🔎 <strong>What really happened inside the Pentagon’s network after 9/11</strong></li><li>⚡ <strong>The triage process</strong> for restoring thousands of servers and critical links under extreme pressure</li><li>🧠 <strong>Why readiness beats reaction</strong> — and why lessons learned matter more than blame</li><li>🏛️ <strong>Leadership under fire</strong>, featuring insights from Col. David Wills (U.S. CENTCOM &amp; Joint Chiefs of Staff)</li><li>📑 <strong>Best practices for disaster response</strong>, from documenting your infrastructure to building resilient “tiger teams”</li><li>💡 How today’s organizations can apply these lessons to avoid catastrophic downtime — from data centers to Wall Street trading floors</li></ul><br/><p>This is more than a war story — it’s a framework for <strong>crisis management, cybersecurity resilience, and business continuity</strong>. Whether you’re a technologist, executive, or leader of any kind, the lessons from 9/11 remain vital today.</p><p>👉 <strong>Key takeaway:</strong> It’s always more fun to be ready. Preparation, documentation, and collaboration can turn disaster into an opportunity for growth.</p>]]></content:encoded><link><![CDATA[https://disaster.stream/episode/pentagon-9-11-recovery-lessons-in-crisis-response-readiness]]></link><guid isPermaLink="false">1d366d52-7977-4c46-9689-c1db3d8b89b9</guid><itunes:image href="https://artwork.captivate.fm/1829ba5b-c91e-4a5c-9f04-742aebde8c13/Disaster-Stream-Podcast.png"/><pubDate>Wed, 27 Aug 2025 05:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1d366d52-7977-4c46-9689-c1db3d8b89b9.mp3" length="77552523" type="audio/mpeg"/><itunes:duration>01:04:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f2ef4f09-e46a-4ec0-82f5-7c84ac9b7dbc/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f2ef4f09-e46a-4ec0-82f5-7c84ac9b7dbc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f2ef4f09-e46a-4ec0-82f5-7c84ac9b7dbc/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Pentagon 9/11 Communications Recovery: Lessons for Cyber &amp; DR"><podcast:source uri="https://youtu.be/t14p0vMmnxc"/></podcast:alternateEnclosure></item><item><title>Cyber Crises &amp; Lessons Learned DDOS US Stock Markets</title><itunes:title>Cyber Crises &amp; Lessons Learned DDOS US Stock Markets</itunes:title><description><![CDATA[<p><strong>Disaster.Stream</strong> takes you inside the world of high-stakes cyber incidents and recovery operations, where seconds matter and lessons shape the future. Hosted by veteran network forensics expert <strong>Bill Alderson</strong>, this show unpacks the anatomy of disasters—from stock market outages to military communications failures—revealing what really happened, how teams responded, and what leaders must learn.</p><p>Through vivid case studies, expert interviews, and frontline war stories, Disaster.Stream highlights:</p><ul><li><strong>Cyber &amp; IT disasters</strong> — from DDoS attacks to zero-day exploits.</li><li><strong>Human factors</strong> — ego, culture, and fear that complicate recovery.</li><li><strong>Proven best practices</strong> — building resilient organizations that bounce back faster.</li><li><strong>Voices of experience</strong> — McKinsey, NetScout, ExtraHop, Cloud Range, and pioneers like Vint Cerf, father of the Internet.</li></ul><br/><p>More than technology, this podcast is about people under pressure, lessons hard-won, and the leadership required to turn disaster into opportunity.</p><p>Whether you’re in IT, security, leadership, or just curious how systems survive when the unthinkable happens, join us to learn how organizations respond, recover, and evolve.</p><p>👉 Got a story? Email <strong>bill@disaster.stream</strong> and share your team’s recovery win.</p>]]></description><content:encoded><![CDATA[<p><strong>Disaster.Stream</strong> takes you inside the world of high-stakes cyber incidents and recovery operations, where seconds matter and lessons shape the future. Hosted by veteran network forensics expert <strong>Bill Alderson</strong>, this show unpacks the anatomy of disasters—from stock market outages to military communications failures—revealing what really happened, how teams responded, and what leaders must learn.</p><p>Through vivid case studies, expert interviews, and frontline war stories, Disaster.Stream highlights:</p><ul><li><strong>Cyber &amp; IT disasters</strong> — from DDoS attacks to zero-day exploits.</li><li><strong>Human factors</strong> — ego, culture, and fear that complicate recovery.</li><li><strong>Proven best practices</strong> — building resilient organizations that bounce back faster.</li><li><strong>Voices of experience</strong> — McKinsey, NetScout, ExtraHop, Cloud Range, and pioneers like Vint Cerf, father of the Internet.</li></ul><br/><p>More than technology, this podcast is about people under pressure, lessons hard-won, and the leadership required to turn disaster into opportunity.</p><p>Whether you’re in IT, security, leadership, or just curious how systems survive when the unthinkable happens, join us to learn how organizations respond, recover, and evolve.</p><p>👉 Got a story? Email <strong>bill@disaster.stream</strong> and share your team’s recovery win.</p>]]></content:encoded><link><![CDATA[https://disaster.stream/episode/cyber-crises-lessons-learned-ddos-us-stock-markets]]></link><guid isPermaLink="false">3f5a50ed-d2ce-4277-8b50-a73b652f95cd</guid><itunes:image href="https://artwork.captivate.fm/1829ba5b-c91e-4a5c-9f04-742aebde8c13/Disaster-Stream-Podcast.png"/><pubDate>Wed, 27 Aug 2025 05:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/3f5a50ed-d2ce-4277-8b50-a73b652f95cd.mp3" length="50026724" type="audio/mpeg"/><itunes:duration>41:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f1c59f6b-6fc7-4966-9904-126c9a663a26/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f1c59f6b-6fc7-4966-9904-126c9a663a26/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f1c59f6b-6fc7-4966-9904-126c9a663a26/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Stock Market DoS Attack Explained | Cybersecurity Lessons"><podcast:source uri="https://youtu.be/ii0Fmwm7v60"/></podcast:alternateEnclosure></item></channel></rss>