<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/full-metal-packet/" rel="self" type="application/rss+xml"/><title><![CDATA[Full Metal Packet]]></title><podcast:guid>83ec7a3e-a1af-509b-b195-314d6817f247</podcast:guid><lastBuildDate>Tue, 24 Mar 2026 15:38:40 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Control D]]></copyright><managingEditor>Control D</managingEditor><itunes:summary><![CDATA[Full Metal Packet is the go-to podcast for security leaders who want the truth about what it takes to defend at scale. Hosted by Yegor and Alex, the founders of Windscribe (trusted by 90M+ people) and Control D, this show pulls back the curtain on how operators actually handle breach incidents, reduce noise, and prepare for the post-AI security world.

Season 1 features CISOs, DFIR commanders, and security architects from SaaS,
healthcare, government, and hospitality. Each episode dives into:

- Breach Incidents → the first 72 hours that define an outcome (de-identified and NDA-safe).
- SecOps Therapy → the frictions nobody talks about: burnout, broken workflows, and the fixes that matter.
- Security Futures → fresh perspectives on what’s underrated, overhyped, and coming next in a world reshaped by AI.

No vendor fluff - just operator-grade conversations that security professionals can apply immediately.]]></itunes:summary><image><url>https://artwork.captivate.fm/b3866267-c395-4f94-966d-93daf5fd01db/Screenshot-2025-10-01-at-8-45-14-PM.png</url><title>Full Metal Packet</title><link><![CDATA[https://controld.com/]]></link></image><itunes:image href="https://artwork.captivate.fm/b3866267-c395-4f94-966d-93daf5fd01db/Screenshot-2025-10-01-at-8-45-14-PM.png"/><itunes:owner><itunes:name>Control D</itunes:name></itunes:owner><itunes:author>Control D</itunes:author><description>Full Metal Packet is the go-to podcast for security leaders who want the truth about what it takes to defend at scale. Hosted by Yegor and Alex, the founders of Windscribe (trusted by 90M+ people) and Control D, this show pulls back the curtain on how operators actually handle breach incidents, reduce noise, and prepare for the post-AI security world.

Season 1 features CISOs, DFIR commanders, and security architects from SaaS,
healthcare, government, and hospitality. Each episode dives into:

- Breach Incidents → the first 72 hours that define an outcome (de-identified and NDA-safe).
- SecOps Therapy → the frictions nobody talks about: burnout, broken workflows, and the fixes that matter.
- Security Futures → fresh perspectives on what’s underrated, overhyped, and coming next in a world reshaped by AI.

No vendor fluff - just operator-grade conversations that security professionals can apply immediately.</description><link>https://controld.com/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Candid conversations with CISOs, SecOps leaders, and incident responders about the chaos, containment, and future of cybersecurity.]]></itunes:subtitle><itunes:explicit>true</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Business"><itunes:category text="Management"/></itunes:category><itunes:category text="Technology"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Incidents at Scale: What CISOs Get Wrong</title><itunes:title>Incidents at Scale: What CISOs Get Wrong</itunes:title><description><![CDATA[<p>Randy Barr has held the CISO title at over 10 companies — including Cisco, Zoom, and BioRender — and has seen every version of how security programs succeed and fall apart.</p><p>He now leads security at Sequence Security, focused on API security, bot management, and AI protection. In this episode, Randy takes us through what security teams think they're doing well but aren't, what incidents actually look like at scale, and why AI is rewriting the rules faster than most organizations can keep up.</p><p>He explains:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why compliance and security are not the same thing — and confusing them is dangerous</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How insider threats often hide inside your own growth and broken processes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What a war room actually needs to function under pressure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why MCP servers and prompt injection are the next wave of incidents no one is ready for</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to build a CISO career that doesn't burn you out</li></ol><br/><p>Episode Timeline:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00) From ASP to cloud to AI — how the security industry has shifted</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(07:33) Why 80% of internet traffic is now machine to machine</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(09:46) What most startups get wrong about security programs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(15:01) How to make the business case for a security budget</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(19:36) When buying more tools is actually the wrong move</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(28:30) War story: stolen servers sold online by an infrastructure manager</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(36:25) War story part 2: third-party contractors scripting their own reimbursements</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(42:00) The website defacement that launched Randy's security career</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(46:11) What a good incident war room actually looks like</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(53:50) Shadow AI, MCP servers, and the prompt injection risk no one is tracking</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:02:00) Where AI can genuinely replace manual security work</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:12:43) Advice for new and experienced CISOs on what actually matters</li></ol><br/><p><a href="https://www.notion.so/FMP-Episode-5-Randolph-2eaf9107c71980f783eff157ece962e0?pvs=21" rel="noopener noreferrer" target="_blank">Connect with Randy on LinkedIn</a></p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></description><content:encoded><![CDATA[<p>Randy Barr has held the CISO title at over 10 companies — including Cisco, Zoom, and BioRender — and has seen every version of how security programs succeed and fall apart.</p><p>He now leads security at Sequence Security, focused on API security, bot management, and AI protection. In this episode, Randy takes us through what security teams think they're doing well but aren't, what incidents actually look like at scale, and why AI is rewriting the rules faster than most organizations can keep up.</p><p>He explains:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why compliance and security are not the same thing — and confusing them is dangerous</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How insider threats often hide inside your own growth and broken processes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What a war room actually needs to function under pressure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why MCP servers and prompt injection are the next wave of incidents no one is ready for</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to build a CISO career that doesn't burn you out</li></ol><br/><p>Episode Timeline:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00) From ASP to cloud to AI — how the security industry has shifted</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(07:33) Why 80% of internet traffic is now machine to machine</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(09:46) What most startups get wrong about security programs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(15:01) How to make the business case for a security budget</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(19:36) When buying more tools is actually the wrong move</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(28:30) War story: stolen servers sold online by an infrastructure manager</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(36:25) War story part 2: third-party contractors scripting their own reimbursements</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(42:00) The website defacement that launched Randy's security career</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(46:11) What a good incident war room actually looks like</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(53:50) Shadow AI, MCP servers, and the prompt injection risk no one is tracking</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:02:00) Where AI can genuinely replace manual security work</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:12:43) Advice for new and experienced CISOs on what actually matters</li></ol><br/><p><a href="https://www.notion.so/FMP-Episode-5-Randolph-2eaf9107c71980f783eff157ece962e0?pvs=21" rel="noopener noreferrer" target="_blank">Connect with Randy on LinkedIn</a></p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></content:encoded><link><![CDATA[https://controld.com/]]></link><guid isPermaLink="false">0bb91865-a738-4b8b-81fd-8f32dcb7d924</guid><itunes:image href="https://artwork.captivate.fm/e6c24137-6228-41d1-96b8-68fa0550e12c/Untitled-design-11.png"/><pubDate>Tue, 24 Mar 2026 11:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0bb91865-a738-4b8b-81fd-8f32dcb7d924.mp3" length="71974711" type="audio/mpeg"/><itunes:duration>01:14:58</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/617612e8-35a1-4628-a4cb-a8c8a8b014f6/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="The Security Mistakes Every Scaling Company Makes (And How to Fix Them)"><podcast:source uri="https://youtu.be/lvX2SJtbu3I"/></podcast:alternateEnclosure></item><item><title>Incident Response: EU vs. US Policy Gaps</title><itunes:title>Incident Response: EU vs. US Policy Gaps</itunes:title><description><![CDATA[<p>Alejandro Rivas Vazquez has spent nearly two decades running DFIR services and now advises on preparedness through his boutique consultancy, VeraBeam. He’s sat in boardrooms, testified as an expert witness, and been on the phone at 1am when OFAC changed the rules mid-ransomware negotiation.</p><p>In this episode, Alejandro breaks down why the EU and US approach cyber incidents from fundamentally different starting points, and what happens when those worlds collide inside a real investigation.</p><p><strong>He explains:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why lawyers belong in the room (and exactly when they don't)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How the EU's hyper-regulation actively hinders incident response</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why business email compromise costs more than ransomware — and gets less attention</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What preparation actually means before an incident hits</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How DFIR is professionalizing, and where AI fits into its future</li></ol><br/><p><strong>Timestamps</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00) Alejandro's path from Big Four IT risk to DFIR</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(07:45) How Operation Night Dragon changed the industry</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(16:20) Boardrooms, expert witnesses, and CISO liability</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(25:35) EU vs. US: regulation-first vs national security-first</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(32:15) When Europe's privacy laws block your own investigation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(41:48) CISO personal liability: insurance, risk acceptance, and burnout</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(54:18) War story: business email compromise and the board member who went rogue</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:01:45) The single decision that separates contained from catastrophic</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:09:26) Midnight OFAC call during an active ransomware response</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:14:00) Why DFIR merged and where the profession is heading</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:20:09) AI as force multiplier: threat, opportunity, and the hallucination danger zone</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:33:53) Practical advice: what EU and North American CISOs should do this quarter</li></ol><br/><p>Connect with <a href="https://www.linkedin.com/in/arivasvasquez/" rel="noopener noreferrer" target="_blank">Alejandro</a> on LinkedIn</p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></description><content:encoded><![CDATA[<p>Alejandro Rivas Vazquez has spent nearly two decades running DFIR services and now advises on preparedness through his boutique consultancy, VeraBeam. He’s sat in boardrooms, testified as an expert witness, and been on the phone at 1am when OFAC changed the rules mid-ransomware negotiation.</p><p>In this episode, Alejandro breaks down why the EU and US approach cyber incidents from fundamentally different starting points, and what happens when those worlds collide inside a real investigation.</p><p><strong>He explains:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why lawyers belong in the room (and exactly when they don't)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How the EU's hyper-regulation actively hinders incident response</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why business email compromise costs more than ransomware — and gets less attention</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What preparation actually means before an incident hits</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How DFIR is professionalizing, and where AI fits into its future</li></ol><br/><p><strong>Timestamps</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00) Alejandro's path from Big Four IT risk to DFIR</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(07:45) How Operation Night Dragon changed the industry</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(16:20) Boardrooms, expert witnesses, and CISO liability</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(25:35) EU vs. US: regulation-first vs national security-first</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(32:15) When Europe's privacy laws block your own investigation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(41:48) CISO personal liability: insurance, risk acceptance, and burnout</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(54:18) War story: business email compromise and the board member who went rogue</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:01:45) The single decision that separates contained from catastrophic</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:09:26) Midnight OFAC call during an active ransomware response</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:14:00) Why DFIR merged and where the profession is heading</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:20:09) AI as force multiplier: threat, opportunity, and the hallucination danger zone</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:33:53) Practical advice: what EU and North American CISOs should do this quarter</li></ol><br/><p>Connect with <a href="https://www.linkedin.com/in/arivasvasquez/" rel="noopener noreferrer" target="_blank">Alejandro</a> on LinkedIn</p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></content:encoded><link><![CDATA[https://controld.com/]]></link><guid isPermaLink="false">e9b71069-33a4-470f-81ea-316860ddd842</guid><itunes:image href="https://artwork.captivate.fm/79abea9e-baeb-4a77-9b0b-efa620e7d8f3/Untitled-design-9.png"/><pubDate>Tue, 10 Mar 2026 08:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e9b71069-33a4-470f-81ea-316860ddd842.mp3" length="86369225" type="audio/mpeg"/><itunes:duration>01:29:58</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/1f52f339-86bf-4104-941b-8f8d252aa44d/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Why EU and US Handle Cyber Incidents Completely Differently"><podcast:source uri="https://youtu.be/KUaMT9VdO5A"/></podcast:alternateEnclosure></item><item><title>How CISOs Should Rationalize the Security Stack</title><itunes:title>How CISOs Should Rationalize the Security Stack</itunes:title><description><![CDATA[<p>Ralph Chammah, Co-Founder &amp; CEO of Blacklight AI, shares a builder’s perspective shaped by years in cybersecurity analytics—what breaks in real SOC environments, and what it takes to make detection actually usable at scale.</p><p>In this episode, Ralph explains why “AI-first” security isn’t a label—it’s an operating model for reducing alert noise, improving context, and helping teams detect behavior that rule-based systems routinely miss.</p><p><strong>He explains:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why security stacks get noisy (and what “AI-first” should <em>actually</em> mean)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to cut through acronyms like XDR/MDR and evaluate real value</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to use context + behavior patterns to catch insider risk and compromise</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why privacy/trust decisions (local vs external processing) matter in AI security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How replay/simulation helps validate detections and reduce false positives</li></ol><br/><p><strong>Episode Timeline:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:46) Meet Ralph + what Blacklight AI does</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(06:45) Why he left the Big 4 to build a product</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(12:26) Tool overload, acronyms, and differentiation (XDR/MDR)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(18:10) Why AI belongs in detection (and how to avoid bad signals)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(21:44) Trust &amp; privacy: where the data goes (and why)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(23:16) “Battle scars” from SIEM life: parsers, missing fields, manual grind</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(29:32) Selective ingestion vs. “pipe everything” into the magic box</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(31:32) Validation: replaying history + simulation to prove detections</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(35:35) Biggest high-risk wins: insider threat + slow-burn intrusions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(39:13) Jaguar Land Rover breach story + business impact</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(47:27) Quickest wins: what to connect first by maturity level</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(49:55) What tools he’d remove first (and why)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(59:39) Platform vs point solutions: the real trade-off</li></ol><br/><p>Connect with <a href="https://www.linkedin.com/in/ralphchammah/" rel="noopener noreferrer" target="_blank">Ralph on LinkedIn</a></p><p>Powered by <a href="http://controld.com" rel="noopener noreferrer" target="_blank">controld.com</a></p>]]></description><content:encoded><![CDATA[<p>Ralph Chammah, Co-Founder &amp; CEO of Blacklight AI, shares a builder’s perspective shaped by years in cybersecurity analytics—what breaks in real SOC environments, and what it takes to make detection actually usable at scale.</p><p>In this episode, Ralph explains why “AI-first” security isn’t a label—it’s an operating model for reducing alert noise, improving context, and helping teams detect behavior that rule-based systems routinely miss.</p><p><strong>He explains:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why security stacks get noisy (and what “AI-first” should <em>actually</em> mean)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to cut through acronyms like XDR/MDR and evaluate real value</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to use context + behavior patterns to catch insider risk and compromise</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why privacy/trust decisions (local vs external processing) matter in AI security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How replay/simulation helps validate detections and reduce false positives</li></ol><br/><p><strong>Episode Timeline:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:46) Meet Ralph + what Blacklight AI does</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(06:45) Why he left the Big 4 to build a product</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(12:26) Tool overload, acronyms, and differentiation (XDR/MDR)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(18:10) Why AI belongs in detection (and how to avoid bad signals)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(21:44) Trust &amp; privacy: where the data goes (and why)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(23:16) “Battle scars” from SIEM life: parsers, missing fields, manual grind</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(29:32) Selective ingestion vs. “pipe everything” into the magic box</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(31:32) Validation: replaying history + simulation to prove detections</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(35:35) Biggest high-risk wins: insider threat + slow-burn intrusions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(39:13) Jaguar Land Rover breach story + business impact</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(47:27) Quickest wins: what to connect first by maturity level</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(49:55) What tools he’d remove first (and why)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(59:39) Platform vs point solutions: the real trade-off</li></ol><br/><p>Connect with <a href="https://www.linkedin.com/in/ralphchammah/" rel="noopener noreferrer" target="_blank">Ralph on LinkedIn</a></p><p>Powered by <a href="http://controld.com" rel="noopener noreferrer" target="_blank">controld.com</a></p>]]></content:encoded><link><![CDATA[https://controld.com/]]></link><guid isPermaLink="false">f206d650-cab2-42c2-9bcd-c24b2dbfb499</guid><itunes:image href="https://artwork.captivate.fm/622e6d92-6274-4af5-9635-30e9cead932a/Untitled-design-4.png"/><pubDate>Tue, 24 Feb 2026 10:22:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/f206d650-cab2-42c2-9bcd-c24b2dbfb499.mp3" length="63544056" type="audio/mpeg"/><itunes:duration>01:06:12</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/06cebe6d-e03b-4651-a625-58c9051c9368/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="The Cybersecurity Secret The Big Companies Don&apos;t Tell You"><podcast:source uri="https://youtu.be/pvh8JqIVOwM"/></podcast:alternateEnclosure></item><item><title>Black-Box Security Is Failing CISOs: Build Provable Security</title><itunes:title>Black-Box Security Is Failing CISOs: Build Provable Security</itunes:title><description><![CDATA[<p>Maxime Lamothe-Brassard, Founder and CEO of LimaCharlie, brings a rare perspective shaped by government cyber operations, Big Tech, and building security platforms from first principles.</p><p>In this episode, Maxime breaks down why modern security fails when it relies on black boxes, and what changes when you treat security like cloud infrastructure in an AI-driven world.</p><p>He explains:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why “trust me bro” security models quietly fail CISOs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How government cyber ops reshaped his view of threat modeling</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What provable security actually looks like in practice</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why transparency beats vendor magic every time</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How AI should amplify SecOps teams, not replace them</li></ol><br/><p>Episode Timeline:</p><p>(00:00) From hacker curiosity to cybersecurity foundations</p><p>(07:45) Lessons from government cyber operations</p><p>(16:07) The shock of moving into private-sector security</p><p>(25:35) Why most security platforms repeat the same mistakes</p><p>(32:15) Provable security vs “trust me” security</p><p>(41:40) Treating security like cloud infrastructure</p><p>(49:50) AI’s real role in the future of SecOps</p><p>(59:52) What CISOs should demand next from security vendors</p><p><a href="https://www.linkedin.com/in/maximelb/" rel="noopener noreferrer" target="_blank">Connect with Maxime on LinkedIn</a></p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></description><content:encoded><![CDATA[<p>Maxime Lamothe-Brassard, Founder and CEO of LimaCharlie, brings a rare perspective shaped by government cyber operations, Big Tech, and building security platforms from first principles.</p><p>In this episode, Maxime breaks down why modern security fails when it relies on black boxes, and what changes when you treat security like cloud infrastructure in an AI-driven world.</p><p>He explains:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why “trust me bro” security models quietly fail CISOs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How government cyber ops reshaped his view of threat modeling</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What provable security actually looks like in practice</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why transparency beats vendor magic every time</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How AI should amplify SecOps teams, not replace them</li></ol><br/><p>Episode Timeline:</p><p>(00:00) From hacker curiosity to cybersecurity foundations</p><p>(07:45) Lessons from government cyber operations</p><p>(16:07) The shock of moving into private-sector security</p><p>(25:35) Why most security platforms repeat the same mistakes</p><p>(32:15) Provable security vs “trust me” security</p><p>(41:40) Treating security like cloud infrastructure</p><p>(49:50) AI’s real role in the future of SecOps</p><p>(59:52) What CISOs should demand next from security vendors</p><p><a href="https://www.linkedin.com/in/maximelb/" rel="noopener noreferrer" target="_blank">Connect with Maxime on LinkedIn</a></p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></content:encoded><link><![CDATA[https://controld.com/]]></link><guid isPermaLink="false">dba47957-9d42-4cd4-802b-1201dc5ad955</guid><itunes:image href="https://artwork.captivate.fm/e7a66a76-62bd-40c4-92ad-b2dd00638894/Untitled-design-5.png"/><pubDate>Tue, 10 Feb 2026 09:22:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/dba47957-9d42-4cd4-802b-1201dc5ad955.mp3" length="58859152" type="audio/mpeg"/><itunes:duration>01:01:19</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/69588dcd-d420-46f0-8ca4-37212bc62dc4/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Why CISOs Should Demand Provable Security, Not Promises"><podcast:source uri="https://youtu.be/gwZ8kpbCfTA"/></podcast:alternateEnclosure></item><item><title>“I Was the Breach”: Inside a $3M Ransomware Crisis Every CISO Should Study</title><itunes:title>“I Was the Breach”: Inside a $3M Ransomware Crisis Every CISO Should Study</itunes:title><description><![CDATA[<p>Matt Lee, now Senior Director of Security &amp; Compliance at Pax8, reveals how a ransomware blast at his former MSP triggered a multi-million-dollar fallout, 26 client disruptions, and a complete redefinition of what security leadership really means in today’s world.</p><p>Matt is a battle-tested cybersecurity leader known for translating complex technical crises into practical security transformation. In this raw, revealing episode, he opens up about the breach that changed everything - and how it helped shape the philosophy behind Secure by Demand.</p><p>He explains:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How a hidden ransomware infection derailed a multi-company merger</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What most MSPs get dangerously wrong about security risk</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The real cost of reactive security: layoffs, lawsuits, and insurance gaps</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What “Secure by Demand” really means (and why it’s missing from most strategies)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why security maturity is the new battleground (not just tooling)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to lead through cyber chaos without losing your sanity</li></ol><br/><p>Episode Timeline:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00) Intro: Who is Matt Lee and why this episode matters</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(02:42) Matt’s origin story - from hacker kid to MSP tech</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(06:19) Falling into security: “I just added ‘and Security’ to my badge”</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(11:30) The merger that hid a ticking ransomware time bomb</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(17:04) Voldemort incident discovery: “We bought a company mid-breach”</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(20:47) The day it hit: Ransomware spreads to 26 client businesses</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(25:15) What went wrong: due diligence gaps, supply chain blindness</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(30:22) Incident response chaos and internal suspicion</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(36:48) Fallout: 18-month recovery, insurance battles, FBI involvement</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(41:35) Live Compromised: The philosophy Matt built from the wreckage</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(47:10) The birth of “Secure by Demand” - a challenge to the industry</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(53:01) Software design flaws: why vendors ship insecure defaults</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(56:20) Advice for CISOs and MSPs: mindset, tooling, and where to start</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(59:40) Real-world examples: empathy, leadership, and rebuilding trust</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:03:15) Final reflections: Why the industry needs hard conversations</li></ol><br/><p><a href="https://www.linkedin.com/in/cybermattlee/" rel="noopener noreferrer" target="_blank">Connect With Matt on LinkedIn</a></p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></description><content:encoded><![CDATA[<p>Matt Lee, now Senior Director of Security &amp; Compliance at Pax8, reveals how a ransomware blast at his former MSP triggered a multi-million-dollar fallout, 26 client disruptions, and a complete redefinition of what security leadership really means in today’s world.</p><p>Matt is a battle-tested cybersecurity leader known for translating complex technical crises into practical security transformation. In this raw, revealing episode, he opens up about the breach that changed everything - and how it helped shape the philosophy behind Secure by Demand.</p><p>He explains:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How a hidden ransomware infection derailed a multi-company merger</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What most MSPs get dangerously wrong about security risk</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The real cost of reactive security: layoffs, lawsuits, and insurance gaps</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>What “Secure by Demand” really means (and why it’s missing from most strategies)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Why security maturity is the new battleground (not just tooling)</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>How to lead through cyber chaos without losing your sanity</li></ol><br/><p>Episode Timeline:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00) Intro: Who is Matt Lee and why this episode matters</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(02:42) Matt’s origin story - from hacker kid to MSP tech</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(06:19) Falling into security: “I just added ‘and Security’ to my badge”</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(11:30) The merger that hid a ticking ransomware time bomb</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(17:04) Voldemort incident discovery: “We bought a company mid-breach”</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(20:47) The day it hit: Ransomware spreads to 26 client businesses</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(25:15) What went wrong: due diligence gaps, supply chain blindness</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(30:22) Incident response chaos and internal suspicion</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(36:48) Fallout: 18-month recovery, insurance battles, FBI involvement</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(41:35) Live Compromised: The philosophy Matt built from the wreckage</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(47:10) The birth of “Secure by Demand” - a challenge to the industry</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(53:01) Software design flaws: why vendors ship insecure defaults</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(56:20) Advice for CISOs and MSPs: mindset, tooling, and where to start</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(59:40) Real-world examples: empathy, leadership, and rebuilding trust</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(01:03:15) Final reflections: Why the industry needs hard conversations</li></ol><br/><p><a href="https://www.linkedin.com/in/cybermattlee/" rel="noopener noreferrer" target="_blank">Connect With Matt on LinkedIn</a></p><p>Powered by <a href="https://controld.com/" rel="noopener noreferrer" target="_blank">Control D</a></p>]]></content:encoded><link><![CDATA[https://controld.com/]]></link><guid isPermaLink="false">a28b8b75-d62d-465b-bde1-707009ee8f40</guid><itunes:image href="https://artwork.captivate.fm/b0bd2365-df28-45ef-8da1-36a56d93192f/Untitled-design-3.png"/><pubDate>Wed, 28 Jan 2026 08:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/a28b8b75-d62d-465b-bde1-707009ee8f40.mp3" length="75867165" type="audio/mpeg"/><itunes:duration>01:19:02</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/4eb9505a-c64c-4b06-a96c-e5d5b064aa59/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="“I Was The Breach”: Inside a $3M Ransomware Crisis Every CISO Should Study"><podcast:source uri="https://youtu.be/Bmm5Vg3jcvY"/></podcast:alternateEnclosure></item><item><title>Full Metal Packet: The Missing Conversations in Cybersecurity</title><itunes:title>Full Metal Packet: The Missing Conversations in Cybersecurity</itunes:title><description><![CDATA[<p>When a breach hits, the first 72 hours decide everything. But the stories, decisions, and philosophies behind those critical hours rarely make it into public conversation. That’s what <em>Full Metal Packet</em> is here to change.</p><p>Hosted by Yegor and Alex - the founders of Control D (and before that, Windscribe, now trusted by 90M+ people) - this podcast is where operators, CISOs, and security leaders finally get candid.</p><p>Season 1 brings you:</p><ul><li><strong>Breach Incidents</strong> → Inside the calls leaders had to make under fire, anonymized and NDA-safe.</li><li><strong>SecOps Therapy</strong> → The frictions nobody talks about: burnout, workflows, and the daily grind of running security.</li><li><strong>Security Futures</strong> → What’s underrated, what’s overhyped, and how AI will reshape security in the years ahead.</li></ul><br/><p>No blame. Just raw, operator-grade conversations from the people who’ve lived it.</p><p>Guests already include CISOs from SaaS, healthcare, and hospitality — the voices shaping security today.</p><p>If you’re a security leader, this is where your peers will be telling their stories. And if you’re listening, it’s where you’ll find the missing conversations you’ve been waiting for.</p><p>Subscribe now and join us for Season 1 of <em>Full Metal Packet</em>.</p>]]></description><content:encoded><![CDATA[<p>When a breach hits, the first 72 hours decide everything. But the stories, decisions, and philosophies behind those critical hours rarely make it into public conversation. That’s what <em>Full Metal Packet</em> is here to change.</p><p>Hosted by Yegor and Alex - the founders of Control D (and before that, Windscribe, now trusted by 90M+ people) - this podcast is where operators, CISOs, and security leaders finally get candid.</p><p>Season 1 brings you:</p><ul><li><strong>Breach Incidents</strong> → Inside the calls leaders had to make under fire, anonymized and NDA-safe.</li><li><strong>SecOps Therapy</strong> → The frictions nobody talks about: burnout, workflows, and the daily grind of running security.</li><li><strong>Security Futures</strong> → What’s underrated, what’s overhyped, and how AI will reshape security in the years ahead.</li></ul><br/><p>No blame. Just raw, operator-grade conversations from the people who’ve lived it.</p><p>Guests already include CISOs from SaaS, healthcare, and hospitality — the voices shaping security today.</p><p>If you’re a security leader, this is where your peers will be telling their stories. And if you’re listening, it’s where you’ll find the missing conversations you’ve been waiting for.</p><p>Subscribe now and join us for Season 1 of <em>Full Metal Packet</em>.</p>]]></content:encoded><link><![CDATA[https://controld.com/]]></link><guid isPermaLink="false">9039246f-b4a4-496a-be51-34791b2e3913</guid><itunes:image href="https://artwork.captivate.fm/b3866267-c395-4f94-966d-93daf5fd01db/Screenshot-2025-10-01-at-8-45-14-PM.png"/><pubDate>Wed, 01 Oct 2025 21:15:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/9039246f-b4a4-496a-be51-34791b2e3913.mp3" length="671920" type="audio/mpeg"/><itunes:duration>00:42</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>trailer</itunes:episodeType></item></channel></rss>