<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/left-to-our-own-devices/" rel="self" type="application/rss+xml"/><title><![CDATA[Left to Our Own Devices]]></title><podcast:guid>86642b93-5d54-593c-b003-c0ed2f1540e2</podcast:guid><lastBuildDate>Wed, 22 Jan 2025 07:00:29 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2025 Cybellum Technologies LTD]]></copyright><managingEditor>Cybellum Technologies LTD</managingEditor><itunes:summary><![CDATA[Introducing Left to Our Own Devices - the podcast dedicated to everything product security. 

Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros.

Hosted & produced by:
*David Leichner, CMO at Cybellum - https://www.linkedin.com/in/davidleichner/ 
*Shlomi Ashkenazy, Head of Strategy & Brand at Cybellum - https://www.linkedin.com/in/shlomi-ashkenazy-9786b685/

Left to Our Own Devices is brought to you by Cybellum. To learn more, visit Cybellum.com]]></itunes:summary><image><url>https://artwork.captivate.fm/5eb60246-c2d1-494e-936b-5bae6cdfe44f/ViBkAmhgb6MTLsjcvfUbC1qZ.png</url><title>Left to Our Own Devices</title><link><![CDATA[https://www.cybellum.com/conference]]></link></image><itunes:image href="https://artwork.captivate.fm/5eb60246-c2d1-494e-936b-5bae6cdfe44f/ViBkAmhgb6MTLsjcvfUbC1qZ.png"/><itunes:owner><itunes:name>Cybellum Technologies LTD</itunes:name></itunes:owner><itunes:author>Cybellum Technologies LTD</itunes:author><description>Introducing Left to Our Own Devices - the podcast dedicated to everything product security. 

Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros.

Hosted &amp; produced by:
*David Leichner, CMO at Cybellum - https://www.linkedin.com/in/davidleichner/ 
*Shlomi Ashkenazy, Head of Strategy &amp; Brand at Cybellum - https://www.linkedin.com/in/shlomi-ashkenazy-9786b685/

Left to Our Own Devices is brought to you by Cybellum. To learn more, visit Cybellum.com</description><link>https://www.cybellum.com/conference</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[The Product Security Podcast]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Education"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>JB Baker: Computational Storage and Product Security</title><itunes:title>JB Baker: Computational Storage and Product Security</itunes:title><description><![CDATA[<p>We sat down with the Seagate, Intel, and ScaleFlux veteran to discuss innovations in storage technologies, emerging threats, and cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Seagate, Intel, and ScaleFlux veteran to discuss innovations in storage technologies, emerging threats, and cybersecurity.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/jb-baker-computational-storage-and-product-security]]></link><guid isPermaLink="false">a21ffa0f-9d76-44fd-9818-964f172de134</guid><itunes:image href="https://artwork.captivate.fm/fa06a16b-cf59-4fe1-8640-b2c2d265b39b/0xPlfpdIs-CLSzIXBghnIqko.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 22 Jan 2025 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/12864b6a-85ca-40bf-b787-39026454af0c/LTOOD-2025-01-15-JB-Baker-Edit-1.mp3" length="54075686" type="audio/mpeg"/><itunes:duration>37:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Bryan Kissinger: Cybersecurity - A Business-Minded Perspective</title><itunes:title>Bryan Kissinger: Cybersecurity - A Business-Minded Perspective</itunes:title><description><![CDATA[<p>We sat down with the seasoned IT and cybersecurity leader and CISO at Trace3  to discuss emerging cyber threats, aligning security with business goals, and tailoring “right-sized” security programs. We also discuss balancing innovation with compliance and how military leadership principles influence corporate cybersecurity strategies.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the seasoned IT and cybersecurity leader and CISO at Trace3  to discuss emerging cyber threats, aligning security with business goals, and tailoring “right-sized” security programs. We also discuss balancing innovation with compliance and how military leadership principles influence corporate cybersecurity strategies.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/bryan-kissinger-cybersecurity-a-business-minded-perspective]]></link><guid isPermaLink="false">152cb9df-6bf2-4eea-a130-171d76799a5e</guid><itunes:image href="https://artwork.captivate.fm/f165501a-7c35-4808-be44-b5d63784586c/JY-8pnwoWHxvnEvIXgyK_Qm_.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 08 Jan 2025 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d83bd9f3-dcfc-4e69-8c43-e2a9d8bfd614/LTOOD-2024-11-27-Bryan-Kissinger-Edit-1.mp3" length="54119296" type="audio/mpeg"/><itunes:duration>22:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Errol Weiss: From Banking to Healthcare Cybersecurity</title><itunes:title>Errol Weiss: From Banking to Healthcare Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with the Health-ISAC Chief Security Officer to discuss his 25-year career spanning banking, government, and healthcare to identify the biggest cybersecurity threats and trends impacting the healthcare industry in 2025 and beyond.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Health-ISAC Chief Security Officer to discuss his 25-year career spanning banking, government, and healthcare to identify the biggest cybersecurity threats and trends impacting the healthcare industry in 2025 and beyond.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/errol-weiss-from-banking-to-healthcare-cybersecurity]]></link><guid isPermaLink="false">e75698aa-b1c0-413e-800c-dd3d79942631</guid><itunes:image href="https://artwork.captivate.fm/bd178c8d-f919-459c-bd73-3bdee2925993/AvwKMv5I1JiSEcvgT6SzA0YV.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 17 Dec 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e1bc619f-2eab-4da7-a8ab-c76e652a3b04/LTOOD-2024-11-26-Errol-Weiss-Edit-1.mp3" length="59238016" type="audio/mpeg"/><itunes:duration>24:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Dr. Hans-Martin von Stockhausen: Cybersecurity Lessons from Siemens Healthineers</title><itunes:title>Dr. Hans-Martin von Stockhausen: Cybersecurity Lessons from Siemens Healthineers</itunes:title><description><![CDATA[<p>We had the privilege of sitting down with Dr. Hans-Martin von Stockhausen, Principal Key Expert in Cybersecurity at Siemens Healthineers, to delve into the intricacies of cybersecurity throughout the product lifecycle. Our conversation explored the delicate balance between device usability and time-to-market pressures, as well as practical tips for enhancing cybersecurity posture.</p>]]></description><content:encoded><![CDATA[<p>We had the privilege of sitting down with Dr. Hans-Martin von Stockhausen, Principal Key Expert in Cybersecurity at Siemens Healthineers, to delve into the intricacies of cybersecurity throughout the product lifecycle. Our conversation explored the delicate balance between device usability and time-to-market pressures, as well as practical tips for enhancing cybersecurity posture.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/dr-hans-martin-von-stockhausen-cybersecurity-lessons-from-siemens-healthineers]]></link><guid isPermaLink="false">ab268690-7058-4320-ad6d-00c2a27fde68</guid><itunes:image href="https://artwork.captivate.fm/3cae48a9-a593-4fcd-ae50-8b4795a56271/WE3XulxJM21n84oOcDqVKnL2.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 03 Dec 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1623c6d1-4d0c-44f0-b311-daa871b9da92/Hans-Martin-Take-2-Post-edit-polishes.mp3" length="24585311" type="audio/mpeg"/><itunes:duration>25:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Ramakrishnan Pillai: Product Security at LivaNova and Beyond</title><itunes:title>Ramakrishnan Pillai: Product Security at LivaNova and Beyond</itunes:title><description><![CDATA[<p>We sat down with the Head of Product Security at LivaNova, the former Chief Product Security Officer at Elekta and co-chair of the Legacy Devices Task Group at the Health Sector Coordinating Council to discuss what he learned throughout his long and successful career and to gain insights on regulations, security activities and more</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Head of Product Security at LivaNova, the former Chief Product Security Officer at Elekta and co-chair of the Legacy Devices Task Group at the Health Sector Coordinating Council to discuss what he learned throughout his long and successful career and to gain insights on regulations, security activities and more</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/ramakrishnan-pillai-product-security-at-livanova-and-beyond]]></link><guid isPermaLink="false">aaa2e13f-f2ca-41b4-ad7e-58fc0990589c</guid><itunes:image href="https://artwork.captivate.fm/6c13d699-1320-4990-ae32-97f0b4fb39e9/j8YGW0HFy5DvxPseIYORTDeJ.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 19 Nov 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a00284cf-66d8-4074-8140-79c10b3d9b9c/LTOOD-2024-11-13-Ramakrishnan-Edit-1.mp3" length="46642816" type="audio/mpeg"/><itunes:duration>19:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Dorothy Amy: Leading Research at Frost &amp; Sullivan</title><itunes:title>Dorothy Amy: Leading Research at Frost &amp; Sullivan</itunes:title><description><![CDATA[<p>We sat with the Senior Industry Analyst at Frost &amp; Sullivan to learn from her cross-industry experience in automotive, mobility, technology, oil &amp; gas, and manufacturing.  We talked about innovation, market strategy, cybersecurity, and consulting for multiple industries, and gathered tips &amp; insights for cybersecurity professionals from her experience across the globe.</p>]]></description><content:encoded><![CDATA[<p>We sat with the Senior Industry Analyst at Frost &amp; Sullivan to learn from her cross-industry experience in automotive, mobility, technology, oil &amp; gas, and manufacturing.  We talked about innovation, market strategy, cybersecurity, and consulting for multiple industries, and gathered tips &amp; insights for cybersecurity professionals from her experience across the globe.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/dorothy-amy-leading-research-at-frost-sullivan]]></link><guid isPermaLink="false">e07ec869-3a30-4b14-9118-42d577152c05</guid><itunes:image href="https://artwork.captivate.fm/9cf79b3d-1829-41a8-b89b-2f93289f6b4e/A6Hwhr4dkLw6HYZEtktuHwhU.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 05 Nov 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a67f0790-aca0-423f-ac91-d0bf0d3ea524/LTOOD-2024-10-31-Dorothy-Amy-Edit-1.mp3" length="70683136" type="audio/mpeg"/><itunes:duration>29:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Danielle Radin: AI Ethics and Cybersecurity</title><itunes:title>Danielle Radin: AI Ethics and Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with the Los Angeles Emmy Award-winning journalist and author to discuss global AI ethics, cybersecurity, and the future of Artificial Intelligence.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Los Angeles Emmy Award-winning journalist and author to discuss global AI ethics, cybersecurity, and the future of Artificial Intelligence.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/danielle-radin-ai-ethics-and-cybersecurity]]></link><guid isPermaLink="false">114bd43f-4b12-48d8-a2bd-9c671a4d7921</guid><itunes:image href="https://artwork.captivate.fm/49bf0feb-d940-402b-a80a-ad85488c11e2/DzpRsoDz0p4y8zJwPQO0FwCL.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Mon, 21 Oct 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ed8cd1e7-dc39-429c-843c-352a7b660149/LTOOD-2024-10-15-Danielle-Radin-Edit-1.mp3" length="87296896" type="audio/mpeg"/><itunes:duration>36:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Aaron C. Crow: OT and Product Security (Special Episode)</title><itunes:title>Aaron C. Crow: OT and Product Security (Special Episode)</itunes:title><description><![CDATA[<p>In this special episode, David and Shlomi, hosts of the <em>Left to Our Own Devices</em> podcast, sit down with Aaron C. Crow, a seasoned Cyber and Strategic Risk leader with 25 years of experience. Together, they share valuable insights on OT and product security, while also exploring the future direction of the industry.</p><p>This episode is a republish from Aaron’s own <em>PrOTect It All</em> podcast, where it was originally released.</p>]]></description><content:encoded><![CDATA[<p>In this special episode, David and Shlomi, hosts of the <em>Left to Our Own Devices</em> podcast, sit down with Aaron C. Crow, a seasoned Cyber and Strategic Risk leader with 25 years of experience. Together, they share valuable insights on OT and product security, while also exploring the future direction of the industry.</p><p>This episode is a republish from Aaron’s own <em>PrOTect It All</em> podcast, where it was originally released.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/aaron-c-crow-ot-and-product-security-special-episode]]></link><guid isPermaLink="false">39c06947-2b36-4010-b76a-54c79fe63d8f</guid><itunes:image href="https://artwork.captivate.fm/abc17738-754b-4d97-a3ee-773444ad1fb5/todFPg8El0g61kgi7n4ONufu.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Mon, 07 Oct 2024 08:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6ab65ac1-2bdb-4635-b127-1b053e7319f4/Aaron-C-Crow.mp3" length="171759360" type="audio/mpeg"/><itunes:duration>01:11:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>John Krzeszewski - What&apos;s Next for ISO/SAE 21434</title><itunes:title>John Krzeszewski - What&apos;s Next for ISO/SAE 21434</itunes:title><description><![CDATA[<p>We sat down with the Cybersecurity &amp; Functional Safety Senior Engineering Specialist at Eaton to discuss the intersection of safety and security in the automotive world, upcoming updates to ISO/SAE 21434, and learn from his vast experience in the automotive and medical device industries.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Cybersecurity &amp; Functional Safety Senior Engineering Specialist at Eaton to discuss the intersection of safety and security in the automotive world, upcoming updates to ISO/SAE 21434, and learn from his vast experience in the automotive and medical device industries.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/john-krzeszewski-safety-security-at-eaton]]></link><guid isPermaLink="false">8ee76377-7282-4144-ba25-dff2f7cea1cb</guid><itunes:image href="https://artwork.captivate.fm/9170617e-4420-4b22-810e-e2215e093c5e/UcfZ92U-KiUdvHJa7kYaHPkT.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 24 Sep 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/375cb6f3-99ac-4310-8078-a54c33e8f4ab/LTOOD-2024-09-12-John-Krzeszerwski-Edit-1.mp3" length="78718336" type="audio/mpeg"/><itunes:duration>32:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Jens Gellynck: From QA to Leading Product Security at Barco</title><itunes:title>Jens Gellynck: From QA to Leading Product Security at Barco</itunes:title><description><![CDATA[<p>We sat down with the Product Security Officer - Healthcare at Barco to discuss the intersection of QA and Product Security, the Secure Software Development Life Cycle, and cybersecurity standards from NIST and IEC.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Product Security Officer - Healthcare at Barco to discuss the intersection of QA and Product Security, the Secure Software Development Life Cycle, and cybersecurity standards from NIST and IEC.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/jens-gellynck-from-qa-to-leading-product-security-at-barco]]></link><guid isPermaLink="false">bef206c3-e1de-4a11-b580-14efc54aef83</guid><itunes:image href="https://artwork.captivate.fm/a11a7bc7-f93f-4b72-8bd1-e9f01e7a500d/VNYTad9FwAWRSmADNcKoGDKo.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 17 Sep 2024 00:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c5302e21-d40a-4bd0-a2b7-083fb894fed6/LTOOD-2024-09-11-Jens-Gellynck-Edit-1.mp3" length="72866176" type="audio/mpeg"/><itunes:duration>30:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Melissa Rhodes: Leading Product Security at Medtronic</title><itunes:title>Melissa Rhodes: Leading Product Security at Medtronic</itunes:title><description><![CDATA[<p>We sat down with Melissa Rhodes, the Product Security Program Manager at Medtronic and an MDM security thought leader for a fun and insightful conversation about SBOMs and her journey from firmware engineering to leading product security.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Melissa Rhodes, the Product Security Program Manager at Medtronic and an MDM security thought leader for a fun and insightful conversation about SBOMs and her journey from firmware engineering to leading product security.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/melissa-rhodes-leading-product-security-at-medtronic]]></link><guid isPermaLink="false">0d394fd1-aca1-47cd-91cc-9e24f1cd6284</guid><itunes:image href="https://artwork.captivate.fm/4b1798f4-7be8-4913-b203-cb2491aceb0a/1y7WfBBCkbzterg2xH4jXYj_.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 10 Sep 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/87634b89-987e-4df0-8b98-5c76929ad6aa/LTOOD-2024-08-27-Melissa-Rhodes-Edit-1.mp3" length="39287776" type="audio/mpeg"/><itunes:duration>32:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Heather Vermillion: PACCAR, Security &amp; Personal Growth</title><itunes:title>Heather Vermillion: PACCAR, Security &amp; Personal Growth</itunes:title><description><![CDATA[<p>In this episode of "Left to Our Own Devices," we dive into the world of automotive cybersecurity with Heather Vermillion, a security engineer at PACCAR, who shares her journey from the Department of Defense to safeguarding advanced automotive technologies, while also championing the next generation of cybersecurity professionals.</p>]]></description><content:encoded><![CDATA[<p>In this episode of "Left to Our Own Devices," we dive into the world of automotive cybersecurity with Heather Vermillion, a security engineer at PACCAR, who shares her journey from the Department of Defense to safeguarding advanced automotive technologies, while also championing the next generation of cybersecurity professionals.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/heather-vermillion-paccar-security-personal-growth]]></link><guid isPermaLink="false">0a9bb67f-9812-4d67-8af1-beb2235a0172</guid><itunes:image href="https://artwork.captivate.fm/142c52b4-4fd0-469f-9560-d49824b55d2f/11pKhF5tHJAJyRVLSZENko2h.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 27 Aug 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/285735b4-b753-4e30-bf39-57c037716c61/LTOOD-2024-08-04-Heather-Vermillion-Edit-1.mp3" length="42626656" type="audio/mpeg"/><itunes:duration>35:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Robert Putman: From PlayStation to ABB</title><itunes:title>Robert Putman: From PlayStation to ABB</itunes:title><description><![CDATA[<p>In this episode of <em>Left to Our Own Devices</em>, Rob Putman, Global Manager of Cybersecurity Services at ABB, shares his journey from Sony PlayStation to leading cybersecurity in industrial automation. Tune in for insights on product security and industrial control challenges.</p>]]></description><content:encoded><![CDATA[<p>In this episode of <em>Left to Our Own Devices</em>, Rob Putman, Global Manager of Cybersecurity Services at ABB, shares his journey from Sony PlayStation to leading cybersecurity in industrial automation. Tune in for insights on product security and industrial control challenges.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/robert-putman-from-playstation-to-abb]]></link><guid isPermaLink="false">30f6ccf3-cbd2-4c79-a99a-18eb723c68ce</guid><itunes:image href="https://artwork.captivate.fm/9e1e6baf-bdbd-4389-b063-2cc4b9780638/XdfWfZXSNu5SJXxZkjBGOKSj.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 13 Aug 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/61eca3c7-f7af-4212-90f2-21c123139f6f/LTOOD-2024-07-21-Robert-Putnam-Edit-1.mp3" length="48050656" type="audio/mpeg"/><itunes:duration>40:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Bonus Episode: Dr. Allan Friedman Returns: CISA SBOM-a-Rama 2024</title><itunes:title>Bonus Episode: Dr. Allan Friedman Returns: CISA SBOM-a-Rama 2024</itunes:title><description><![CDATA[<p>In this episode, Dr. Allan Friedman from CISA returns to discuss the upcoming SBOM-a-Rama, a pivotal event in supply chain cybersecurity. He shares insights on the evolution of SBOMs, the significance of community collaboration, and what to expect from this year's hybrid event, including a showcase of innovative SBOM solutions.</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dr. Allan Friedman from CISA returns to discuss the upcoming SBOM-a-Rama, a pivotal event in supply chain cybersecurity. He shares insights on the evolution of SBOMs, the significance of community collaboration, and what to expect from this year's hybrid event, including a showcase of innovative SBOM solutions.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/bonus-episode-dr-allan-friedman-returns-cisa-sbom-a-rama-2024]]></link><guid isPermaLink="false">5c03ae21-4c91-4d52-869c-bba525a9da5f</guid><itunes:image href="https://artwork.captivate.fm/f6fb4e4d-cf72-44c4-80d1-632826379779/quxm47T_f-0G35P5zqo4jygf.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 07 Aug 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9776059e-2800-476e-83b5-c33b89a594d8/LTOOD-2024-08-04-Allan-Friedman-SBOM-O-RAMA-edit-1.mp3" length="27044416" type="audio/mpeg"/><itunes:duration>22:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Samuel Takachicha: From Safari IT to Med Device Security</title><itunes:title>Samuel Takachicha: From Safari IT to Med Device Security</itunes:title><description><![CDATA[<p>In this episode, we welcome the Director of Product Security at Edwards Life Sciences. Samuel shares his journey from IT roles in a Zimbabwe safari to leading product security in the medical device industry, discussing challenges, solutions, and the impact of FDA regulations on their processes. </p>]]></description><content:encoded><![CDATA[<p>In this episode, we welcome the Director of Product Security at Edwards Life Sciences. Samuel shares his journey from IT roles in a Zimbabwe safari to leading product security in the medical device industry, discussing challenges, solutions, and the impact of FDA regulations on their processes. </p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/samuel-takachicha-from-safari-it-to-med-device-security]]></link><guid isPermaLink="false">0df4cb46-a608-4e33-91a3-28c479d76889</guid><itunes:image href="https://artwork.captivate.fm/2fa03329-3f54-49cf-a879-ce8b33092f79/speqRqdK3-kxga95Wc63oSF1.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 30 Jul 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d605458d-5fa6-4793-9abf-92f3ddc079c2/LTOOD-2024-07-10-Samuel-Takachicha-Edit-1.mp3" length="35726656" type="audio/mpeg"/><itunes:duration>29:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Tom Alrich Returns: Our Vulnerability Problem (Bonus Episode)</title><itunes:title>Tom Alrich Returns: Our Vulnerability Problem (Bonus Episode)</itunes:title><description><![CDATA[<p>In this special bonus episode, we welcome back Tom Alrich, an expert in supply chain cybersecurity to discuss one of the most pressing issues in cybersecurity right now. Tom discusses the current issues with the National Vulnerability Database (NVD) and the challenges it presents for effective vulnerability management. We explore his proposed solutions and the future of software supply chain security, based on his extensive experience.</p><p>If you'd like to reach out to Tom, his email address is <a href="mailto:tom@tomalrich.com" rel="noopener noreferrer" target="_blank">tom@tomalrich.com</a>.</p><p>Additional links/resources mentioned during the episode or relevant to the discussion (if the links are not clickable please visit cybellum.com/podcasts to find them)</p><ul><li>The SBOM Forum's 2022 <a href="https://owasp.org/assets/files/posts/A%20Proposal%20to%20Operationalize%20Component%20Identification%20for%20Vulnerability%20Management.pdf" rel="noopener noreferrer" target="_blank">white paper</a>&nbsp;on fixing the CPE problem in the NVD</li><li><a href="https://tomalrichblog.blogspot.com/2024/07/currently-true-vulnerability-management.html" rel="noopener noreferrer" target="_blank">Tom's post</a>&nbsp;from yesterday on the problem with vulnerability management</li><li>The&nbsp;<a href="https://owasp.org/www-project-sbom-forum/" rel="noopener noreferrer" target="_blank">link</a>&nbsp;to the SBOM Forum's website, where <strong>donations can be made</strong> (please email&nbsp;Tom&nbsp;before donating)</li><li>An additional<a href="https://tomalrichblog.blogspot.com/2024/07/the-cvecpe-backlog-is-currently-17000.html" rel="noopener noreferrer" target="_blank"> post he published on the day we recorded the episode</a> which further highlights the NVD issue</li><li>Tom's <a href="https://www.amazon.com/s?k=introduction+to+sbom+and+vex&amp;crid=2IDUG1OC1P8JO&amp;sprefix=introduction+to+sbom%2Caps%2C220&amp;ref=nb_sb_ss_ts-doa-p_2_20" rel="noopener noreferrer" target="_blank">book</a> "Introduction to SBOM and VEX" which is out now</li></ul><br/><p>Tom also mentioned that he misspoke when he said at the end that the OWASP Vulnerability Database Working Group is meeting twice weekly. In reality, they are only meeting twice <strong>monthly</strong>, as he can't afford to dedicate more time than that. They would love to meet at least weekly and also create documents, webinars, and more. <strong>Therefore, they are seeking some modest donations to support these efforts.</strong></p>]]></description><content:encoded><![CDATA[<p>In this special bonus episode, we welcome back Tom Alrich, an expert in supply chain cybersecurity to discuss one of the most pressing issues in cybersecurity right now. Tom discusses the current issues with the National Vulnerability Database (NVD) and the challenges it presents for effective vulnerability management. We explore his proposed solutions and the future of software supply chain security, based on his extensive experience.</p><p>If you'd like to reach out to Tom, his email address is <a href="mailto:tom@tomalrich.com" rel="noopener noreferrer" target="_blank">tom@tomalrich.com</a>.</p><p>Additional links/resources mentioned during the episode or relevant to the discussion (if the links are not clickable please visit cybellum.com/podcasts to find them)</p><ul><li>The SBOM Forum's 2022 <a href="https://owasp.org/assets/files/posts/A%20Proposal%20to%20Operationalize%20Component%20Identification%20for%20Vulnerability%20Management.pdf" rel="noopener noreferrer" target="_blank">white paper</a>&nbsp;on fixing the CPE problem in the NVD</li><li><a href="https://tomalrichblog.blogspot.com/2024/07/currently-true-vulnerability-management.html" rel="noopener noreferrer" target="_blank">Tom's post</a>&nbsp;from yesterday on the problem with vulnerability management</li><li>The&nbsp;<a href="https://owasp.org/www-project-sbom-forum/" rel="noopener noreferrer" target="_blank">link</a>&nbsp;to the SBOM Forum's website, where <strong>donations can be made</strong> (please email&nbsp;Tom&nbsp;before donating)</li><li>An additional<a href="https://tomalrichblog.blogspot.com/2024/07/the-cvecpe-backlog-is-currently-17000.html" rel="noopener noreferrer" target="_blank"> post he published on the day we recorded the episode</a> which further highlights the NVD issue</li><li>Tom's <a href="https://www.amazon.com/s?k=introduction+to+sbom+and+vex&amp;crid=2IDUG1OC1P8JO&amp;sprefix=introduction+to+sbom%2Caps%2C220&amp;ref=nb_sb_ss_ts-doa-p_2_20" rel="noopener noreferrer" target="_blank">book</a> "Introduction to SBOM and VEX" which is out now</li></ul><br/><p>Tom also mentioned that he misspoke when he said at the end that the OWASP Vulnerability Database Working Group is meeting twice weekly. In reality, they are only meeting twice <strong>monthly</strong>, as he can't afford to dedicate more time than that. They would love to meet at least weekly and also create documents, webinars, and more. <strong>Therefore, they are seeking some modest donations to support these efforts.</strong></p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/tom-alrich-returns-our-vulnerability-problem]]></link><guid isPermaLink="false">d0b2a93c-c1de-4042-a0e0-20fbff14153d</guid><itunes:image href="https://artwork.captivate.fm/087d2227-97c3-488e-9f0e-bb95b7dec06a/odR9mRIwxzsqtTkvCziHAaUr.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 23 Jul 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9e08cf4f-864d-45ab-97e3-4d83ba8240ff/LTOOD-2024-07-18-Tom-Alrich-Edit-1.mp3" length="32333536" type="audio/mpeg"/><itunes:duration>26:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Ashwini Siddhi: From Dell to GoDaddy</title><itunes:title>Ashwini Siddhi: From Dell to GoDaddy</itunes:title><description><![CDATA[<p>Join us as we dive into the journey of Ashwini Siddhi, Director of Product Security Engineering at GoDaddy. Ashwini shares her experiences from Dell to GoDaddy, her expertise in threat modeling, and the pivotal role of Bengaluru in her career. We also explore her advocacy for diversity and inclusion in cybersecurity and her influential mentorship with Women in Cyber.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Join us as we dive into the journey of Ashwini Siddhi, Director of Product Security Engineering at GoDaddy. Ashwini shares her experiences from Dell to GoDaddy, her expertise in threat modeling, and the pivotal role of Bengaluru in her career. We also explore her advocacy for diversity and inclusion in cybersecurity and her influential mentorship with Women in Cyber.&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/ashwini-siddhi-from-dell-to-godaddy]]></link><guid isPermaLink="false">19ebe5ce-7c69-4b46-b5ce-a5829f687981</guid><itunes:image href="https://artwork.captivate.fm/463f30d9-d735-4ca8-98d1-bd3f39d162c3/qKhq3VX6bhOGqejWOs1KJD0B.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 16 Jul 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/299470f4-b3e4-408c-be55-d221fa7ca00e/LTOOD-2024-06-26-Ashwini-Edit-1.mp3" length="37732096" type="audio/mpeg"/><itunes:duration>31:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Scott Sheahan: From Aerospace to Automotive Cybersecurity</title><itunes:title>Scott Sheahan: From Aerospace to Automotive Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with Scott Sheahan, the owner of Rustic Security, to learn from his rich background in the automotive cybersecurity world and embedded software development. </p><p><br></p>]]></description><content:encoded><![CDATA[<p>We sat down with Scott Sheahan, the owner of Rustic Security, to learn from his rich background in the automotive cybersecurity world and embedded software development. </p><p><br></p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/scott-sheahan-from-aerospace-to-automotive-cybersecurity]]></link><guid isPermaLink="false">b2ed8a07-4af7-4965-9994-55e9289f4b8a</guid><itunes:image href="https://artwork.captivate.fm/38d1d009-f110-4bbd-8f35-542b067f5e4c/Pve63yuSrVT5JgkuomwgxuSN.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 02 Jul 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cd33ceb5-dbdf-4344-83fe-8f0fa5d45abc/LTOOD-2024-06-02-Scott-Shehan-Edit-1.mp3" length="42811936" type="audio/mpeg"/><itunes:duration>35:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Dmitri Shifrin: Cybersecurity &amp; AI at NVIDIA</title><itunes:title>Dmitri Shifrin: Cybersecurity &amp; AI at NVIDIA</itunes:title><description><![CDATA[<p>We sat down with a System Security Architecture Manager at NVIDIA, to discuss the convergence of Automotive cybersecurity and AI, as well as NVIDIA's Morpheus Cybersecurity Framework.</p>]]></description><content:encoded><![CDATA[<p>We sat down with a System Security Architecture Manager at NVIDIA, to discuss the convergence of Automotive cybersecurity and AI, as well as NVIDIA's Morpheus Cybersecurity Framework.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/dmitri-shifrin-cybersecurity-ai-at-nvidia]]></link><guid isPermaLink="false">7b30bec1-7061-4153-9bc5-2afce990814e</guid><itunes:image href="https://artwork.captivate.fm/d3b4b9f6-99b4-4d5d-9784-4ed7f92e425d/LpoUtfUMIjgCenaL3FlyNh-o.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 18 Jun 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9978d2da-1f1f-41bb-a42f-ace7bcb34743/LTOOD-2024-05-21-Dmitri-Edit-1.mp3" length="51450496" type="audio/mpeg"/><itunes:duration>42:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Chaitanya Mattur Srinivasamurthy: Leading Cybersecurity at ICU Medical</title><itunes:title>Chaitanya Mattur Srinivasamurthy: Leading Cybersecurity at ICU Medical</itunes:title><description><![CDATA[<p>We sat down with the Sr Director of Cyber Security &amp; Medical Device Connectivity Engineering at ICU Medical to discuss medical device cybersecurity, FDA, and balancing innovation and security.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Sr Director of Cyber Security &amp; Medical Device Connectivity Engineering at ICU Medical to discuss medical device cybersecurity, FDA, and balancing innovation and security.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/chaitanya-mattur-srinivasamurthy-leading-cybersecurity-at-icu-medical]]></link><guid isPermaLink="false">f96e2296-309f-4d88-a30b-0724a86352dc</guid><itunes:image href="https://artwork.captivate.fm/3a5a79f5-37d3-4e84-9e07-ad82595d1dd3/dKlwdZbrVKWZAvDpxQYM2fxj.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 04 Jun 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/18c63854-54ad-4bc0-b37f-58e6ae91ea93/LTOOD-2024-05-16-Chaitanya-Edit-1.mp3" length="35202976" type="audio/mpeg"/><itunes:duration>29:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Steve Orrin: Leading Cybersecurity at Intel and Beyond</title><itunes:title>Steve Orrin: Leading Cybersecurity at Intel and Beyond</itunes:title><description><![CDATA[<p>In this episode, we talk to Steve Orrin, Chief Technology Officer and Senior PE at Intel Federal, about his unique journey from biology to cybersecurity leadership. We discuss the main challenges faced by federal bodies in the cybersecurity landscape and how they differ across industries like Aerospace, Education, and Healthcare.</p><p>Steve shares valuable insights on product cybersecurity, emphasizing the growing interest from governments worldwide, as seen in regulations like the FDA Premarket Guidance and the Cyber Resilience Act. He offers advice to vendors, suppliers, and users on navigating this evolving regulatory landscape.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we talk to Steve Orrin, Chief Technology Officer and Senior PE at Intel Federal, about his unique journey from biology to cybersecurity leadership. We discuss the main challenges faced by federal bodies in the cybersecurity landscape and how they differ across industries like Aerospace, Education, and Healthcare.</p><p>Steve shares valuable insights on product cybersecurity, emphasizing the growing interest from governments worldwide, as seen in regulations like the FDA Premarket Guidance and the Cyber Resilience Act. He offers advice to vendors, suppliers, and users on navigating this evolving regulatory landscape.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/steve-orrin-leading-cybersecurity-at-intel]]></link><guid isPermaLink="false">156c3de2-eef5-478a-a5e7-b9678ea95b2a</guid><itunes:image href="https://artwork.captivate.fm/060f558a-504e-48c3-b04a-96882c347d70/mrHKDHfszv83LwJqPrlrn7ra.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 21 May 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7fdc7009-7d5b-4af3-a266-24d228a839fb/LTOOD-2024-05-07-Steve-Orrin-Edit-1.mp3" length="38859136" type="audio/mpeg"/><itunes:duration>32:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Maria Palombini: All About Standards</title><itunes:title>Maria Palombini: All About Standards</itunes:title><description><![CDATA[<p>We sat down with the Global Practice Leader, Healthcare &amp; Life Sciences at the IEEE Standards Association to discuss cybersecurity standards, regulations, and building a career in cybersecurity</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Global Practice Leader, Healthcare &amp; Life Sciences at the IEEE Standards Association to discuss cybersecurity standards, regulations, and building a career in cybersecurity</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/maria-palombini-all-about-standards]]></link><guid isPermaLink="false">61e323f5-c346-4a39-9729-3d0afd7083f1</guid><itunes:image href="https://artwork.captivate.fm/f4728444-e214-48be-b704-29c56b09ff12/adzoyTAY87zchEhb4UGMjJax.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Thu, 09 May 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/09aa4244-fe9d-43f3-8bc8-5124b04929b4/LTOOD-2024-04-16-Maria-Edit-1.mp3" length="45870567" type="audio/mpeg"/><itunes:duration>38:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Mariana Padilla: Leading the HACKERverse</title><itunes:title>Mariana Padilla: Leading the HACKERverse</itunes:title><description><![CDATA[<p>We sat down with the Co-founder and CEO of HACKERverse (Recently known as KIKrr) to discuss Entrepreneurship, product security, and the power of networking.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Co-founder and CEO of HACKERverse (Recently known as KIKrr) to discuss Entrepreneurship, product security, and the power of networking.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/mariana-padilla-leading-the-hackerverse]]></link><guid isPermaLink="false">ec46bc7a-1cb4-4c21-a567-bc8d7a3ad450</guid><itunes:image href="https://artwork.captivate.fm/b9784ce6-9c86-43db-89e1-5a4202247e6c/sbYJCCewxIGDAh259Ter7Cb1.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 24 Apr 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/469d3190-97b2-4ddc-bf19-6078714cfaf1/LTOOD-2024-04-11-Mariana-Edit-1.mp3" length="31284327" type="audio/mpeg"/><itunes:duration>26:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Paul Schmetzler: FDA Regulations, AI and Legal Risk</title><itunes:title>Paul Schmetzler: FDA Regulations, AI and Legal Risk</itunes:title><description><![CDATA[<p>We chatted with the partner at Clark Hill PLC about AI, FDA regulations, and cybersecurity legal risks, based on his years of experience learning the legal aspects of healthcare and industrial cybersecurity</p>]]></description><content:encoded><![CDATA[<p>We chatted with the partner at Clark Hill PLC about AI, FDA regulations, and cybersecurity legal risks, based on his years of experience learning the legal aspects of healthcare and industrial cybersecurity</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/paul-schmetzler-fda-regulations-ai-and-legal-risk]]></link><guid isPermaLink="false">54f4e8f5-07f5-41b9-8305-96f8e081a25f</guid><itunes:image href="https://artwork.captivate.fm/9db962da-9473-4c69-879d-fd116705e3fc/KTMaUq0VL_Ae0Xmbq4XyamBD.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 09 Apr 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ed1e3ae3-6455-475f-8b01-a5500c212d3e/LTOOD-2024-04-04-Paul-Schmeltzer-Edit-2.mp3" length="49390407" type="audio/mpeg"/><itunes:duration>41:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Dominique Shelton Leipzig: The Legal Challenge of Cybersecurity &amp; AI</title><itunes:title>Dominique Shelton Leipzig: The Legal Challenge of Cybersecurity &amp; AI</itunes:title><description><![CDATA[<p>We invited the Partner at Mayer Brown and the leader of the Global Data Innovation team, to discuss the legal aspects of cybersecurity, AI, and privacy, as well as the evolving landscape of responsible AI.</p>]]></description><content:encoded><![CDATA[<p>We invited the Partner at Mayer Brown and the leader of the Global Data Innovation team, to discuss the legal aspects of cybersecurity, AI, and privacy, as well as the evolving landscape of responsible AI.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/dominique-shelton-leipzig-the-legal-challenge-of-cybersecurity-ai]]></link><guid isPermaLink="false">e42c84ae-9bbd-4185-989a-41dcdfa79ff5</guid><itunes:image href="https://artwork.captivate.fm/fdaa11ad-a090-437c-96e4-00332f09fe3c/Q5UROVkR66RJnUbyOxQlLc7_.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 26 Mar 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7e24ebc8-5369-4a8b-95ae-751eae183797/LTOOD-2024-03-10-Dominique-Edit-1.mp3" length="34684167" type="audio/mpeg"/><itunes:duration>28:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Roman Kelser: From Security Research to AI</title><itunes:title>Roman Kelser: From Security Research to AI</itunes:title><description><![CDATA[<p>We sat down with the VP of Research at Cybellum, aka "Roman Explains" to learn from his vast experience in embedded device security research and get practical insights into how to use AI in product security, following the release of his new "Ask Roman" product feature for product security professionals.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the VP of Research at Cybellum, aka "Roman Explains" to learn from his vast experience in embedded device security research and get practical insights into how to use AI in product security, following the release of his new "Ask Roman" product feature for product security professionals.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/roman-kelser-from-security-research-to-ai]]></link><guid isPermaLink="false">5b5eb470-2f7d-4173-b5db-3dbe0245641f</guid><itunes:image href="https://artwork.captivate.fm/e6912c8b-0f95-4375-99b4-eef6a9af3b5a/IVsm9xG4QfHvKrmiOidB9OJ1.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 12 Mar 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e24b0b97-f04b-41a9-ae36-63a5addfced5/LTOOD-2024-03-05-Roman-Edit-1.mp3" length="22074087" type="audio/mpeg"/><itunes:duration>18:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Joachim Fox: Safety, Security and Innovation at ZF</title><itunes:title>Joachim Fox: Safety, Security and Innovation at ZF</itunes:title><description><![CDATA[<p>We were joined by the Director of Safety &amp; Cybersecurity at ZF for a fascinating conversation about innovation in automotive cybersecurity, and ZF's uncompromising approach to both safety and security.</p>]]></description><content:encoded><![CDATA[<p>We were joined by the Director of Safety &amp; Cybersecurity at ZF for a fascinating conversation about innovation in automotive cybersecurity, and ZF's uncompromising approach to both safety and security.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/joachim-fox-safety-security-and-innovation-at-zf]]></link><guid isPermaLink="false">0f835ab9-8643-4994-8a91-bd3ba46b97f5</guid><itunes:image href="https://artwork.captivate.fm/3a1dcfa5-cad8-4f17-a398-1814a0cad649/0Vks9azKXtdfYN6ZEjkEh5LN.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 27 Feb 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/985cdac8-425d-4957-85a0-78e3e92475a5/LTOOD-2024-02-18-Joachim-Edit-1.mp3" length="45907527" type="audio/mpeg"/><itunes:duration>38:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Franz-Josef Schuermann: TARA &amp; Threat Modeling Stories</title><itunes:title>Franz-Josef Schuermann: TARA &amp; Threat Modeling Stories</itunes:title><description><![CDATA[<p>We sat down with the Chairman of the Board at itemis inc. and the world-renowned TARA expert to discuss innovations in Threat Analysis, automotive cybersecurity trends, and much more.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Chairman of the Board at itemis inc. and the world-renowned TARA expert to discuss innovations in Threat Analysis, automotive cybersecurity trends, and much more.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/franz-joseph-tara-stories]]></link><guid isPermaLink="false">215579d5-dddf-468e-aacb-c90cff248873</guid><itunes:image href="https://artwork.captivate.fm/7e1d6dc9-224a-462a-94de-17a54ec37b62/RnTBjsZfTERDxsOBAAfdYR36.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 13 Feb 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d72b3310-1c88-4259-91a9-c59075084b97/Franz-Joseph-Final-Edit-6-2.mp3" length="34123540" type="audio/mpeg"/><itunes:duration>35:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Jacob Combs: Securing a Product Ecosystem</title><itunes:title>Jacob Combs: Securing a Product Ecosystem</itunes:title><description><![CDATA[<p>We sat down Jacob Combs, VP of Cybersecurity at Tandem Diabetes Care, to talk about how he manages product security at Tandem, and how he overcomes the need to secure an entire ecosystem, beyond the product's perimeters.</p>]]></description><content:encoded><![CDATA[<p>We sat down Jacob Combs, VP of Cybersecurity at Tandem Diabetes Care, to talk about how he manages product security at Tandem, and how he overcomes the need to secure an entire ecosystem, beyond the product's perimeters.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/jacob-combs-securing-a-product-ecosystem]]></link><guid isPermaLink="false">1c0fbad1-cee5-42fc-bb84-fd5b899a5ebc</guid><itunes:image href="https://artwork.captivate.fm/678acd99-9135-45bf-a1e3-eba7ba55af48/3dPGG0rnARD5q7qx5y5ILoCC.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 30 Jan 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1ab7ac7d-8656-4db9-bf79-592b1dc49966/LTOOD-2023-12-17-Jacob-Combs-Edit-1.mp3" length="29503047" type="audio/mpeg"/><itunes:duration>24:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Henning Kruse: When OT, Network Security and Automotive Meet</title><itunes:title>Henning Kruse: When OT, Network Security and Automotive Meet</itunes:title><description><![CDATA[<p>We sat down with the Senior Manager for Technical Cyber Security at PwC Deutschland to discuss trends in OT security, AI, automotive cybersecurity, and everything in between.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Senior Manager for Technical Cyber Security at PwC Deutschland to discuss trends in OT security, AI, automotive cybersecurity, and everything in between.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/henning-kruse-when-ot-network-security-and-automotive-meet]]></link><guid isPermaLink="false">7d0edb94-58df-404b-8cd5-a5aa32acbcbb</guid><itunes:image href="https://artwork.captivate.fm/fb43f502-3f2d-47f4-9146-6dfcc0a6a803/g_GssE5f4twLR4sIdxqjlg4k.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 17 Jan 2024 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e259c134-8e80-4231-8333-7433d77d955c/LTOOD-2023-11-13-Henning-Cruze-Edit-1.mp3" length="32185287" type="audio/mpeg"/><itunes:duration>26:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Summarizing 2023 in Product Security</title><itunes:title>Summarizing 2023 in Product Security</itunes:title><description><![CDATA[<p>Hey hackers, defenders, and everyone in between! Today, we rewind 2023: a year of regulatory push, supply chain hacks, and enough zero days to fill a breach library. But fear not! We also saw product security rise like a phoenix, with threat modeling soaring and vulnerability management taking center stage. So buckle up as we toast the triumphs, dissect the dramas, and prepare for what's next in this ever-evolving world.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Hey hackers, defenders, and everyone in between! Today, we rewind 2023: a year of regulatory push, supply chain hacks, and enough zero days to fill a breach library. But fear not! We also saw product security rise like a phoenix, with threat modeling soaring and vulnerability management taking center stage. So buckle up as we toast the triumphs, dissect the dramas, and prepare for what's next in this ever-evolving world.&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/summarizing-2023-in-product-security]]></link><guid isPermaLink="false">f78c5987-6ae0-4386-b41b-0f8b46dd147b</guid><itunes:image href="https://artwork.captivate.fm/bf8a663d-0791-41e6-9107-d8bbdbbd36cf/3DXMl3bpyMB01fg1Axl3sB36.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Thu, 04 Jan 2024 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/016ab6a1-f63b-40bb-9651-4dc19e2e5acd/LTOOD-2023-12-28-EOY-Episode-Edit-1.mp3" length="21352647" type="audio/mpeg"/><itunes:duration>17:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Robert Smigelski: Where Safety and Security Meet</title><itunes:title>Robert Smigelski: Where Safety and Security Meet</itunes:title><description><![CDATA[<p>We sat down with Robert Smigelski, CISSP, MSEE, Manager Product Cybersecurity at B. Braun Medical, for a deep dive conversation about how he built the product security practice at B. Braun Medical, automation, and the intersection between safety and security.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Robert Smigelski, CISSP, MSEE, Manager Product Cybersecurity at B. Braun Medical, for a deep dive conversation about how he built the product security practice at B. Braun Medical, automation, and the intersection between safety and security.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/robert-smigelski-where-safety-and-security-meet]]></link><guid isPermaLink="false">03a3f831-fccd-43e2-9d85-698a51e15f13</guid><itunes:image href="https://artwork.captivate.fm/ab581fd4-0be6-4b90-9d41-a5a937518caa/qNUNO0nV6hkzcx2ZMcplJbV3.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 13 Dec 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4fb1ff8c-7de2-4bab-a248-26210863fde9/LTOOD-2023-11-14-Robert-Smigielski-Edit-1.mp3" length="56228967" type="audio/mpeg"/><itunes:duration>46:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Gonen Barkan: Radar and Cybersecurity</title><itunes:title>Gonen Barkan: Radar and Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with the Chief Radar Officer at Arbe, who also previously led radar technology and development for General Motors, to discuss radar technology, cybersecurity and autonomous technologies.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Chief Radar Officer at Arbe, who also previously led radar technology and development for General Motors, to discuss radar technology, cybersecurity and autonomous technologies.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/gonen-barkan-radar-and-cybersecurity]]></link><guid isPermaLink="false">38f0d6ac-df69-4482-ac68-f55a28c2bc1b</guid><itunes:image href="https://artwork.captivate.fm/a35a9dd1-3021-4e12-bc95-380f522c61fc/lzOhQ-5y92pEndyhoMLIKJI0.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 29 Nov 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9b4776c9-7974-43ee-ba91-22b75aab0055/LTOOD-2023-11-13-Gonen-Barkan-Edit-1.mp3" length="43401447" type="audio/mpeg"/><itunes:duration>36:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Eddy Thesee: All About Rail Cybersecurity</title><itunes:title>Eddy Thesee: All About Rail Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with Eddy Thesee, a world expert in rail cybersecurity. Eddy is the Vice President of Products &amp; Solutions Cybersecurity at Alstom, a world leader in green, smart mobility rail solutions such as rail transportation and infrastructure. Eddy began his career as a network and systems consultant and then joined Alstom where he moved through the ranks all the way to becoming the company's VP of Products &amp; Solutions Cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Eddy Thesee, a world expert in rail cybersecurity. Eddy is the Vice President of Products &amp; Solutions Cybersecurity at Alstom, a world leader in green, smart mobility rail solutions such as rail transportation and infrastructure. Eddy began his career as a network and systems consultant and then joined Alstom where he moved through the ranks all the way to becoming the company's VP of Products &amp; Solutions Cybersecurity.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/eddy-thesee-all-about-rail-cybersecurity]]></link><guid isPermaLink="false">999d912c-8861-483d-ae10-d0ca41739b84</guid><itunes:image href="https://artwork.captivate.fm/6b672e28-85b5-4696-b9c0-c9da5e7332a0/Eaq_RyfqA1mwrkR7rMKh_Bbf.jpg"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 15 Nov 2023 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4ad4955c-1f22-4e56-a445-a5d33a865528/LTOOD-2023-11-07-Eddy-Thesee-Edit-1.mp3" length="45362727" type="audio/mpeg"/><itunes:duration>37:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Matanyahu Englman: The State Comptroller of Israel on Cybersecurity</title><itunes:title>Matanyahu Englman: The State Comptroller of Israel on Cybersecurity</itunes:title><description><![CDATA[<p>The brutal terrorist attack in Israel on Oct 7th against men, women, children and the elderly has left us heartbroken. We at Cybellum hold the hands of those who lost their family members and friends in such a horrific way and pray for the safe return of our hostages and soldiers. At the same time, we find it important to push forward. Our cyber adversaries, very much like the real-world ones, never stop, and it's important to keep advancing the product security community, especially in these trying times.</p><p>On that note, we share our interview with Matanyahu Englman, Israel’s state comptroller and Ombudsman. Mr. Engelman has held countless key positions across government, academia, and the private sector, and is one of the main voices promoting cybersecurity in the state of Israel and abroad. He invited us to his Jerusalem office to discuss his pioneering approach to cybersecurity, hear insights from his team's research, and learn about his multi-national cybersecurity cooperations.</p><p>Please note the interview was recorded before the terrorist attacks in Israel.</p>]]></description><content:encoded><![CDATA[<p>The brutal terrorist attack in Israel on Oct 7th against men, women, children and the elderly has left us heartbroken. We at Cybellum hold the hands of those who lost their family members and friends in such a horrific way and pray for the safe return of our hostages and soldiers. At the same time, we find it important to push forward. Our cyber adversaries, very much like the real-world ones, never stop, and it's important to keep advancing the product security community, especially in these trying times.</p><p>On that note, we share our interview with Matanyahu Englman, Israel’s state comptroller and Ombudsman. Mr. Engelman has held countless key positions across government, academia, and the private sector, and is one of the main voices promoting cybersecurity in the state of Israel and abroad. He invited us to his Jerusalem office to discuss his pioneering approach to cybersecurity, hear insights from his team's research, and learn about his multi-national cybersecurity cooperations.</p><p>Please note the interview was recorded before the terrorist attacks in Israel.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/matanyahu-englman-the-state-comptroller-of-israel-on-cybersecurity]]></link><guid isPermaLink="false">dc8a355c-a088-4a7b-b96d-4204163c0219</guid><itunes:image href="https://artwork.captivate.fm/ff927fe2-fa43-45a4-ada0-7ea8721565bb/UzdYbYyMlisVErPmJGVzcP-b.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 31 Oct 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f9024cab-b336-42a1-8707-31cfe038baaa/LTOOD-2023-09-20-Matanyahu-Engelman-Edit-1.mp3" length="64532007" type="audio/mpeg"/><itunes:duration>53:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Helen Negre: On Product Security, Psychology and Personal Growth</title><itunes:title>Helen Negre: On Product Security, Psychology and Personal Growth</itunes:title><description><![CDATA[<p>We sat down with Helen Negre, the Chief Cybersecurity Officer for Siemens USA and the Americas CISO for Siemens Mobility, for a fascinating and candid conversation about product security, psychology, and personal growth. Helen has shared with us insights from her nontypical journey to cybersecurity leadership and provides tips for those wanting to follow a similar path.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Helen Negre, the Chief Cybersecurity Officer for Siemens USA and the Americas CISO for Siemens Mobility, for a fascinating and candid conversation about product security, psychology, and personal growth. Helen has shared with us insights from her nontypical journey to cybersecurity leadership and provides tips for those wanting to follow a similar path.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/helen-negre-on-product-security-psychology-and-personal-growth]]></link><guid isPermaLink="false">f816eca7-5cde-42a7-bb3b-fc1beb503d45</guid><itunes:image href="https://artwork.captivate.fm/e1c58e1f-8e42-42dd-a616-382d8bb52b96/jTBy5HBsY4AKRkxRfhRUVpI-.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 04 Oct 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/386e44ab-a0ba-485c-a29f-a4a3f14db55c/LTOOD-2023-09-20-Helen-Negre-Edit-1.mp3" length="42556647" type="audio/mpeg"/><itunes:duration>35:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Michal Geva: Securing OTA</title><itunes:title>Michal Geva: Securing OTA</itunes:title><description><![CDATA[<p>We sat down with Michal Geva, General Manager, OTA and Cybersecurity at HARMAN International to discuss trends in automotive cybersecurity and OTA cybersecurity. Michal also discussed supply chain cybersecurity, EVs and provided her tips for women in cybersecurity roles.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Michal Geva, General Manager, OTA and Cybersecurity at HARMAN International to discuss trends in automotive cybersecurity and OTA cybersecurity. Michal also discussed supply chain cybersecurity, EVs and provided her tips for women in cybersecurity roles.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/michal-geva-securing-ota]]></link><guid isPermaLink="false">cd712d79-34b7-4a3d-82d2-758be330abfb</guid><itunes:image href="https://artwork.captivate.fm/fff9e39a-7673-46f8-8a2c-8b94858014c7/lh_Aie6-MPKGWDjLv18PlNOW.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 19 Sep 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1256dac8-b83a-4fcf-ac4c-4f9d413b0fd2/LTOOD-2023-08-14-Michal-Geva-Edit-2.mp3" length="42774269" type="audio/mpeg"/><itunes:duration>35:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Nidhi Gani: Championing Medical Device Regulatory Affairs</title><itunes:title>Nidhi Gani: Championing Medical Device Regulatory Affairs</itunes:title><description><![CDATA[<p>We sat down with Nidhi Gani, a seasoned regulatory affairs professional with over a decade of experience in medical devices and digital health to discuss her experiences and her insights. Nidhi has worked with devices ranging from heart and lung machines to rehabilitation devices. She works at Embecta as a Regulatory Affairs Software and Cybersecurity and is a Cybersecurity Fellow at the Archimedes Center for Health Care and Medical Device Cybersecurity at Northeastern University.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Nidhi Gani, a seasoned regulatory affairs professional with over a decade of experience in medical devices and digital health to discuss her experiences and her insights. Nidhi has worked with devices ranging from heart and lung machines to rehabilitation devices. She works at Embecta as a Regulatory Affairs Software and Cybersecurity and is a Cybersecurity Fellow at the Archimedes Center for Health Care and Medical Device Cybersecurity at Northeastern University.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/nidhi-gani-championing-medical-device-regulatory-affairs]]></link><guid isPermaLink="false">89a13eb6-3165-4773-a773-c6b5977beb5d</guid><itunes:image href="https://artwork.captivate.fm/c72297df-7990-459e-ab27-005ce00067ff/UhPssffOPppd5IPOSdFgE-07.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 05 Sep 2023 03:50:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/10b2b8f4-5085-40b2-a243-7df0e195e6e5/LTOOD-2023-08-14-Nidhi-Gani-Edit-1.mp3" length="32816487" type="audio/mpeg"/><itunes:duration>27:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Mihoko Matsubara: Cybersecurity as a Global Effort</title><itunes:title>Mihoko Matsubara: Cybersecurity as a Global Effort</itunes:title><description><![CDATA[<p>The Chief Cyber Security Strategist at NTT Japan came by our offices to discuss the differences in cybersecurity approaches between countries, her experience working with the public and the private sector, and how to manage cybersecurity and spend time at the beach at the same time.</p>]]></description><content:encoded><![CDATA[<p>The Chief Cyber Security Strategist at NTT Japan came by our offices to discuss the differences in cybersecurity approaches between countries, her experience working with the public and the private sector, and how to manage cybersecurity and spend time at the beach at the same time.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/mihoko-matsubara-cybersecurity-as-a-global-effort]]></link><guid isPermaLink="false">da1e03d7-0cb0-4b4f-98ff-533ce9dc4f67</guid><itunes:image href="https://artwork.captivate.fm/02e9b18d-ab57-43b9-8cc0-d98a1eb4c072/niX1B67IibAEJuHxL-oSPJLh.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 15 Aug 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/de3378a6-5dda-49ad-a942-5b57a814f015/LTOOD-2023-08-01-Mihoko-Matsubara-Edit-2.mp3" length="22629686" type="audio/mpeg"/><itunes:duration>23:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Joanna C. Cooper: The Power of “Yes”</title><itunes:title>Joanna C. Cooper: The Power of “Yes”</itunes:title><description><![CDATA[<p>Joanna C. Cooper is the General Manager at Daimler Truck North America. Over the past 15 years, Joanna built multi-disciplinary industry experience, domestically and internationally, ranging from project management and component procurement, through manufacturing operations and engaging customer experience. She joined us to discuss the automotive industry, cybersecurity, and how to advance women in manufacturing roles.</p>]]></description><content:encoded><![CDATA[<p>Joanna C. Cooper is the General Manager at Daimler Truck North America. Over the past 15 years, Joanna built multi-disciplinary industry experience, domestically and internationally, ranging from project management and component procurement, through manufacturing operations and engaging customer experience. She joined us to discuss the automotive industry, cybersecurity, and how to advance women in manufacturing roles.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/joanna-c-cooper-the-power-of-yes]]></link><guid isPermaLink="false">70e4ac7b-2290-4b30-901a-cf7fef20217f</guid><itunes:image href="https://artwork.captivate.fm/ada91990-7bc9-4992-8264-ecf75dd757da/JJ0BUyX1eEqffLs__D5cpoSJ.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 02 Aug 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2ff8a054-b178-4bf3-bdcf-c09d50b62a66/LTOOD-2023-07-19-Joanna-Cooper-Edit-1.mp3" length="33292167" type="audio/mpeg"/><itunes:duration>27:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>John Heldreth: Growing a 15,000 Strong Automotive Cybersecurity Group</title><itunes:title>John Heldreth: Growing a 15,000 Strong Automotive Cybersecurity Group</itunes:title><description><![CDATA[<p>We sat down with the Car Security Operations at Volkswagen AG, and ASRG founder to discuss his journey into automotive cybersecurity, what he learned along the way, and why the upcoming Secure Our Street Conference is so important to the community.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Car Security Operations at Volkswagen AG, and ASRG founder to discuss his journey into automotive cybersecurity, what he learned along the way, and why the upcoming Secure Our Street Conference is so important to the community.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/john-heldreth-growing-a-15-000-strong-automotive-cybersecurity-group]]></link><guid isPermaLink="false">afe6d1e6-26b3-4b3e-832b-b8a5cd774835</guid><itunes:image href="https://artwork.captivate.fm/001cbf1e-5f0c-42a1-86f1-eec5133e2b43/piNY6c8CCK1PCCKz4d37MBjc.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 19 Jul 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/26e0ba8c-cfc2-4f86-a927-eff48f5d109e/LTOOD-2023-07-09-John-Heldreth-Edit-1.mp3" length="45788967" type="audio/mpeg"/><itunes:duration>38:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Bindu Sundaresan: Uncovering Business Blind Spots With Cybersecurity</title><itunes:title>Bindu Sundaresan: Uncovering Business Blind Spots With Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with the Director at AT&amp;T Cybersecurity to discuss the relationship between cybersecurity and the business, the growing connectivity in the telecom industry, and to hear her tips and tricks for women in cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Director at AT&amp;T Cybersecurity to discuss the relationship between cybersecurity and the business, the growing connectivity in the telecom industry, and to hear her tips and tricks for women in cybersecurity.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/bindu-sundaresan-uncovering-business-blind-spots-with-cybersecurity]]></link><guid isPermaLink="false">ad14f7af-a04a-4e22-9cbc-767a12874658</guid><itunes:image href="https://artwork.captivate.fm/1e8e5cc1-8746-4958-bbc7-dcd5c1e3cc51/Z5grnrFVgJ871HpmAIC1Mbo5.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 05 Jul 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7bdcd8aa-3d9e-4648-b190-955a3a1d74d7/LTOOD-2023-06-18-Bindu-Edit-1.mp3" length="53646955" type="audio/mpeg"/><itunes:duration>44:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Tony Turner: HBOMs, Threat Modeling and Supply Chain Cybersecurity</title><itunes:title>Tony Turner: HBOMs, Threat Modeling and Supply Chain Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with Tony Turner, CEO at Opswright, for a fascinating conversation about everything product security - from the collaboration challenge between asset owners and manufacturers to HBOMs and his new book.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Tony Turner, CEO at Opswright, for a fascinating conversation about everything product security - from the collaboration challenge between asset owners and manufacturers to HBOMs and his new book.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/tony-turner-hboms-threat-modeling-and-supply-chain-cybersecurity]]></link><guid isPermaLink="false">fde6b008-afe1-4e97-951b-6d9c62e215ba</guid><itunes:image href="https://artwork.captivate.fm/4872da82-f110-4e85-804e-b14f28e2cf5f/BtZ-tegMctaGcaSGN043tFOu.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 21 Jun 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fd794901-25fe-46e1-965f-d88e6190ab2c/LTOOD-2023-05-29-Tony-Turner-Editing-edit-1-1.mp3" length="44461287" type="audio/mpeg"/><itunes:duration>37:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Katie Boswell: When AI Meets Industrial Cybersecurity</title><itunes:title>Katie Boswell: When AI Meets Industrial Cybersecurity</itunes:title><description><![CDATA[<p>We sat down with the Managing Director, Cyber Security Services at KPMG, to discuss life on the front lines of securing the most critical national infrastructure, how AI will change security as we know it, and how her mother inspired her to become a leader in this field.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Managing Director, Cyber Security Services at KPMG, to discuss life on the front lines of securing the most critical national infrastructure, how AI will change security as we know it, and how her mother inspired her to become a leader in this field.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/katie-boswell-on-the-front-lines-of-industrial-cybersecurity]]></link><guid isPermaLink="false">fabd0b34-677f-47a4-9efd-399778781933</guid><itunes:image href="https://artwork.captivate.fm/1a6ec388-1a6c-4aee-b1ec-c29ac4a880cc/6gJBGpPku0sAdEtNUBVTGlKa.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 07 Jun 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6950c3fd-7d1d-4290-9948-d4bf55016f34/LTOOD-2023-05-29-Katie-Boswell-Edit-3.mp3" length="25697503" type="audio/mpeg"/><itunes:duration>26:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Esti Pesin: Flying Cyber (with Guest Host Michael Engstler)</title><itunes:title>Esti Pesin: Flying Cyber (with Guest Host Michael Engstler)</itunes:title><description><![CDATA[<p>We sat down with Esti Peshin, VP, General Manager, Cyber Division at Israel Aerospace Industries - ELTA, and our guest host Michael Engstler, co-founder and CTO of Cybellum, to discuss what flying a plane can teach you about cybersecurity. Under Esti’s management, IAI's cyber activity was expanded from a Directorate to a Division. Esti also served as the Director General of the Israeli Hi-Tech Caucus at the Knesset, the Israeli Parliament, and was a partner in multiple private equity firms. Esti is also a licensed pilot, as shown in the fantastic videos she shares on social media.</p>]]></description><content:encoded><![CDATA[<p>We sat down with Esti Peshin, VP, General Manager, Cyber Division at Israel Aerospace Industries - ELTA, and our guest host Michael Engstler, co-founder and CTO of Cybellum, to discuss what flying a plane can teach you about cybersecurity. Under Esti’s management, IAI's cyber activity was expanded from a Directorate to a Division. Esti also served as the Director General of the Israeli Hi-Tech Caucus at the Knesset, the Israeli Parliament, and was a partner in multiple private equity firms. Esti is also a licensed pilot, as shown in the fantastic videos she shares on social media.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/esti-pesin-flying-cyber-with-guest-host-michael-engstler]]></link><guid isPermaLink="false">e30d10ef-710c-4cf9-a63a-13df7767b434</guid><itunes:image href="https://artwork.captivate.fm/e3952993-65b7-4f2b-b8ac-d32579d3a3fc/uIVP6bb5uhR-J6YBG1fFgyA1.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 24 May 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/51ccc37c-2a27-4cf2-a93a-989e47ae138f/LTOOD-2023-04-17-Esti-Peshin-Ed-1.mp3" length="34482087" type="audio/mpeg"/><itunes:duration>28:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Paul Cha: How LG VS Became CSMS Compliant</title><itunes:title>Paul Cha: How LG VS Became CSMS Compliant</itunes:title><description><![CDATA[<p>Paul Cha is a cyber and product security leader, serving as the VP of Cybersecurity at LG Electronics Vehicle component Solutions. Paul held critical positions at Synopsis, Ford Motor Company, and Samsung prior to joining LG. We sat down with him to discuss LG VS' journey to becoming CSMS certified, his work with Cybellum, and learn from his many years of experience.</p>]]></description><content:encoded><![CDATA[<p>Paul Cha is a cyber and product security leader, serving as the VP of Cybersecurity at LG Electronics Vehicle component Solutions. Paul held critical positions at Synopsis, Ford Motor Company, and Samsung prior to joining LG. We sat down with him to discuss LG VS' journey to becoming CSMS certified, his work with Cybellum, and learn from his many years of experience.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/paul-cha-how-lg-vs-became-csms-compliant]]></link><guid isPermaLink="false">75a9110f-2100-42b1-aeab-0c291110eacf</guid><itunes:image href="https://artwork.captivate.fm/2b2ea456-2dce-4168-ab05-ed6dfc005839/1GKAtlckMI8y0SeeqExuPHFM.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 09 May 2023 16:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/eda26683-1651-4aab-80ab-4a3acf934be6/LTOOD-2023-04-17-Paul-Cha-Ed-1.mp3" length="23877927" type="audio/mpeg"/><itunes:duration>19:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Slava Bronfman: Watching Product Security Mature</title><itunes:title>Slava Bronfman: Watching Product Security Mature</itunes:title><description><![CDATA[<p>We sat down with the Cybellum Co-founder and CEO, to discuss the progress made in the product security world and Cybellum's transition from a tiny start-up into a global company that was bought by LG Electronics.</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Cybellum Co-founder and CEO, to discuss the progress made in the product security world and Cybellum's transition from a tiny start-up into a global company that was bought by LG Electronics.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/slava-bronfman-watching-product-security-mature]]></link><guid isPermaLink="false">6cfe1fc8-822e-4e52-b1fb-1b252bf9c26f</guid><itunes:image href="https://artwork.captivate.fm/32b33f92-4357-4ffa-9cb1-167bb83ca7d9/Xhd2rSPFRN4ab115GRWAzOjT.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 26 Apr 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5a8769b2-69c8-41d7-8e77-41acfeebe999/LTOOD-2023-03-15-Slava-Ed-1.mp3" length="31631847" type="audio/mpeg"/><itunes:duration>26:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Adam Boulton: From Food to Embedded Devices</title><itunes:title>Adam Boulton: From Food to Embedded Devices</itunes:title><description><![CDATA[<p>Adam Boulton, VP of Security Technologies at Cybellum, is one of the most experienced software security pros on the planet, with over 15 years of experience in security engineering. Among other things, he has more than 100 cybersecurity patents under his belt and is one of the leading experts in reverse engineering of device binaries in particular and product security in general. In this episode, he shares his experience and his tips on building a product security strategy and provides security lessons from the food and building industries.</p>]]></description><content:encoded><![CDATA[<p>Adam Boulton, VP of Security Technologies at Cybellum, is one of the most experienced software security pros on the planet, with over 15 years of experience in security engineering. Among other things, he has more than 100 cybersecurity patents under his belt and is one of the leading experts in reverse engineering of device binaries in particular and product security in general. In this episode, he shares his experience and his tips on building a product security strategy and provides security lessons from the food and building industries.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/adam-boulton-safety-security-and-embedded-devices]]></link><guid isPermaLink="false">5b82aeed-1805-409a-90ab-a68e235c4287</guid><itunes:image href="https://artwork.captivate.fm/4bb798e1-beb2-4ab8-bdc1-72fb82392683/hprK_4Q2nowmN3icHvIc_9CW.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 28 Mar 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7bbf6274-3d01-4ac8-b89f-0e2eb6adf27e/LTOOD-2023-03-15-Adam-Boulton-Ed-1.mp3" length="42284967" type="audio/mpeg"/><itunes:duration>35:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Mirel Sehic: Simplifying Product Security</title><itunes:title>Mirel Sehic: Simplifying Product Security</itunes:title><description><![CDATA[<p>The Global VP and GM of Cybersecurity at Honeywell shares his thoughts on the link between IT, OT, and Product Security, and shares how simplifying cybersecurity is key. Mirel spent over a decade embedded across varying domains, with global experience leading engineering, operations, marketing, and sales teams. He is an advisor and board member in multiple cybersecurity organizations and non-profits and is one of the trailblazers in the world of IT and OT cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>The Global VP and GM of Cybersecurity at Honeywell shares his thoughts on the link between IT, OT, and Product Security, and shares how simplifying cybersecurity is key. Mirel spent over a decade embedded across varying domains, with global experience leading engineering, operations, marketing, and sales teams. He is an advisor and board member in multiple cybersecurity organizations and non-profits and is one of the trailblazers in the world of IT and OT cybersecurity.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/mirel-sehic-simplifying-product-security]]></link><guid isPermaLink="false">b898df16-24bb-43ef-a7b3-a18529ce2d19</guid><itunes:image href="https://artwork.captivate.fm/5760dbae-5aaf-4b0c-96d8-37b5d262f395/faLFsX6VV7ujGedcSBpASiAl.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Thu, 16 Mar 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/683579ed-dacb-407f-ad78-fd52282e2dff/ltood-2023-03-07-mirel-sehic-ed-1.mp3" length="48399207" type="audio/mpeg"/><itunes:duration>40:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Faye Francy: The Power of Community</title><itunes:title>Faye Francy: The Power of Community</itunes:title><description><![CDATA[<p>We sat down with the Executive Director of Automotive-ISAC to discuss the power of community in the Automotive cybersecurity world and beyond. Faye has over 30 years of diverse experience in government and industry specializing in forensic chemistry, aviation, security, and networked systems. She’s a key figure in today's Automotive cybersecurity world,</p>]]></description><content:encoded><![CDATA[<p>We sat down with the Executive Director of Automotive-ISAC to discuss the power of community in the Automotive cybersecurity world and beyond. Faye has over 30 years of diverse experience in government and industry specializing in forensic chemistry, aviation, security, and networked systems. She’s a key figure in today's Automotive cybersecurity world,</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/faye-francy-the-power-of-community]]></link><guid isPermaLink="false">0eef5461-9b81-4821-9175-7b47a2510483</guid><itunes:image href="https://artwork.captivate.fm/254e2327-314e-4d44-8936-e9af18d7ec7a/_14W2Uh_n840L2P827JMhV96.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 28 Feb 2023 08:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/52ddefb3-9a16-4e4d-b3f3-c548628c1c95/ltood-2023-02-02-faye-francy-ed-1.mp3" length="34560807" type="audio/mpeg"/><itunes:duration>28:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Adam Shostack: Threat Modeling, Star Wars, and Games</title><itunes:title>Adam Shostack: Threat Modeling, Star Wars, and Games</itunes:title><description><![CDATA[<p>Adam is one the biggest threat modeling experts in the world, he is an advisor, a lecturer, a game designer, and the author of multiple books, including "Threat Modeling: Designing for Security". </p><p>His latest book “Threats: What Every Engineer Should Learn From Star Wars” is available now: https://www.amazon.com/Threats-Every-Engineer-Should-Learn/dp/1119895162#:~:text=In%20Threats%3A%20What%20Every%20Engineer,how%20to%20develop%20secure%20systems.</p><p>During our conversation, Adam mentioned a book by&nbsp;Csikszenmihality, which can be found here:</p><p>https://www.amazon.com/Finding-Flow-Psychology-Engagement-Everyday-ebook/dp/B086SVQ1MJ/ref=sr_1_1?crid=132R6QL2KYRZU&amp;keywords=finding+flow&amp;qid=1675723854&amp;sprefix=finding+flow%2Caps%2C166&amp;sr=8-1</p><p>He also mentioned a book called "Don't Bother Me Mom", which can be found here: https://www.amazon.com/Dont-Bother-Me-Mom-Im-Learning/dp/1557788588</p>]]></description><content:encoded><![CDATA[<p>Adam is one the biggest threat modeling experts in the world, he is an advisor, a lecturer, a game designer, and the author of multiple books, including "Threat Modeling: Designing for Security". </p><p>His latest book “Threats: What Every Engineer Should Learn From Star Wars” is available now: https://www.amazon.com/Threats-Every-Engineer-Should-Learn/dp/1119895162#:~:text=In%20Threats%3A%20What%20Every%20Engineer,how%20to%20develop%20secure%20systems.</p><p>During our conversation, Adam mentioned a book by&nbsp;Csikszenmihality, which can be found here:</p><p>https://www.amazon.com/Finding-Flow-Psychology-Engagement-Everyday-ebook/dp/B086SVQ1MJ/ref=sr_1_1?crid=132R6QL2KYRZU&amp;keywords=finding+flow&amp;qid=1675723854&amp;sprefix=finding+flow%2Caps%2C166&amp;sr=8-1</p><p>He also mentioned a book called "Don't Bother Me Mom", which can be found here: https://www.amazon.com/Dont-Bother-Me-Mom-Im-Learning/dp/1557788588</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/adam-shostack-threat-modeling-star-wars-and-games]]></link><guid isPermaLink="false">420602fa-a66b-453b-ad9a-675cddf7240e</guid><itunes:image href="https://artwork.captivate.fm/6ca90300-8749-4b7b-bc60-7ca9fef1155c/u3JHZmFW-926Nx9dPQn3_Z0l.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 14 Feb 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6e402714-69a9-4edf-9245-bcf8ae5197a6/ltood-2023-02-02-adam-shostack-ed-1-1.mp3" length="32948007" type="audio/mpeg"/><itunes:duration>27:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Phil Englert: The Way Forward for Med Device Cybersecurity</title><itunes:title>Phil Englert: The Way Forward for Med Device Cybersecurity</itunes:title><description><![CDATA[<p>Phil Englert is the Director of Medical Device Security at Health ISAC. Phil is an experienced professional well versed in building and sustaining Medical Device Cybersecurity programs in healthcare. He has held key positions at MedSec, Deloitte, and Catholic Health Initiatives. We sat down with him to discuss the challenges, trends, and outlooks in today's medical device cybersecurity world.</p>]]></description><content:encoded><![CDATA[<p>Phil Englert is the Director of Medical Device Security at Health ISAC. Phil is an experienced professional well versed in building and sustaining Medical Device Cybersecurity programs in healthcare. He has held key positions at MedSec, Deloitte, and Catholic Health Initiatives. We sat down with him to discuss the challenges, trends, and outlooks in today's medical device cybersecurity world.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/phil-englert-the-way-forward-for-med-device-cybersecurity]]></link><guid isPermaLink="false">af243fbb-90b8-4ec1-ad3c-432c9dfe6340</guid><itunes:image href="https://artwork.captivate.fm/8ccb6b98-210a-4411-a1e0-297c2b61e222/R98zvJD_q1GiB-gE9YuBRBbT.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 01 Feb 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/87788b3b-46bf-41b4-9ca6-f04598af4c67/ltood-2022-12-28-phil-englert-ed-1.mp3" length="43765383" type="audio/mpeg"/><itunes:duration>30:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Thomas LaRock: SolarWinds&apos; Cybersecurity Strategy</title><itunes:title>Thomas LaRock: SolarWinds&apos; Cybersecurity Strategy</itunes:title><description><![CDATA[<p>Thomas is the Head Geek at SolarWinds. He has over 20 years of IT experience holding roles such as programmer, developer, analyst, and database administrator. He came to our show to talk about lessons learned from SUNBURST, as well as SolarWinds' initiatives and strategy going forward.</p>]]></description><content:encoded><![CDATA[<p>Thomas is the Head Geek at SolarWinds. He has over 20 years of IT experience holding roles such as programmer, developer, analyst, and database administrator. He came to our show to talk about lessons learned from SUNBURST, as well as SolarWinds' initiatives and strategy going forward.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/thomas-larock-solarwinds-cybersecurity-strategy]]></link><guid isPermaLink="false">ec315d2c-e2b2-4cc6-8c64-47527cf03a79</guid><itunes:image href="https://artwork.captivate.fm/f42df5bf-e7a6-4973-8e5c-34f91fb002a3/bjA8UthZLJEGzvmKBASe95g_.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 17 Jan 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ebab063e-1fa9-44fb-bcc3-49550637fd47/Thomas-Larock-Final-Edit.mp3" length="25188410" type="audio/mpeg"/><itunes:duration>26:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>New Year Special: Summarizing 2022 in Product Security</title><itunes:title>New Year Special: Summarizing 2022 in Product Security</itunes:title><description><![CDATA[<p>In the 20th episode of Left to Our Own Devices: The Product Security Podcast, hosts David Leichner and Shlomi Ashkenazy summarize the highlights and takeaways from their 19 interviews with product security leaders in 2022</p>]]></description><content:encoded><![CDATA[<p>In the 20th episode of Left to Our Own Devices: The Product Security Podcast, hosts David Leichner and Shlomi Ashkenazy summarize the highlights and takeaways from their 19 interviews with product security leaders in 2022</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/new-year-special-summarizing-2022-in-product-security]]></link><guid isPermaLink="false">5f7eaa8a-5cc3-4819-8d58-84ed52fba374</guid><itunes:image href="https://artwork.captivate.fm/a34a2b1e-4b86-497d-a106-31b118f89aba/_VSPIXYOoV4NdGLsvn0mqbZ4.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 03 Jan 2023 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f7b4e1cc-c077-4c30-8d54-191d4e8de857/ltood-2022-12-29-eoy-episode-ed-1.mp3" length="19885575" type="audio/mpeg"/><itunes:duration>13:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Joe Weiss: The Hard Truth About Industrial Cybersecurity</title><itunes:title>Joe Weiss: The Hard Truth About Industrial Cybersecurity</itunes:title><description><![CDATA[<p>Joe Weiss is what you would call a trailblazer in the realm of critical infrastructure cybersecurity. During his 40+ years in industrial instrumentation controls and cybersecurity, he has set many of the standards we now aspire to achieve and written multiple books on cybersecurity for power stations, water stations, and data centers. He is the managing partner at Applied Control Solutions consultancy and director of the International Society for Automation. </p><p>We sat down with him to discuss the frightening reality of industrial control systems. and the importance of including engineers in industrial product security.</p>]]></description><content:encoded><![CDATA[<p>Joe Weiss is what you would call a trailblazer in the realm of critical infrastructure cybersecurity. During his 40+ years in industrial instrumentation controls and cybersecurity, he has set many of the standards we now aspire to achieve and written multiple books on cybersecurity for power stations, water stations, and data centers. He is the managing partner at Applied Control Solutions consultancy and director of the International Society for Automation. </p><p>We sat down with him to discuss the frightening reality of industrial control systems. and the importance of including engineers in industrial product security.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/joe-weiss-the-hard-truth-about-industrial-cybersecurity]]></link><guid isPermaLink="false">d7463b0d-2965-4a39-ad4d-2db2dbc9e25e</guid><itunes:image href="https://artwork.captivate.fm/6ae86324-3cd4-434b-a073-c931d05fb786/x90_bZVf0BIdXL8xqVK-AZQ3.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 14 Dec 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/229008e0-a9ea-400c-9601-ca7d0c5affe7/ltood-2022-11-28-joe-weiss-ed-1.mp3" length="54230151" type="audio/mpeg"/><itunes:duration>37:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Dale Peterson: ICS Security Has a Way to Go</title><itunes:title>Dale Peterson: ICS Security Has a Way to Go</itunes:title><description><![CDATA[<p>Dale Peterson is the founder of the S4 conference and creator of many of today’s standard ICS security tools and techniques. We spoke with him about the biggest challenges in industrial control system cybersecurity today and learned from his fascinating personal story.</p>]]></description><content:encoded><![CDATA[<p>Dale Peterson is the founder of the S4 conference and creator of many of today’s standard ICS security tools and techniques. We spoke with him about the biggest challenges in industrial control system cybersecurity today and learned from his fascinating personal story.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/dale-peterson-ics-security-has-a-way-to-go]]></link><guid isPermaLink="false">4da059ae-3ba2-4c93-ae49-1fbeb68af87b</guid><itunes:image href="https://artwork.captivate.fm/1a12bb1c-1e4a-4dbd-8a71-661590921aed/OZx_Pu9tuXev3xI7ZFsKOG-_.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 23 Nov 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8d9fcd63-6cb7-4e11-a515-2c15332c001d/ltood-2022-11-13-dale-peterson-ed-1.mp3" length="47213319" type="audio/mpeg"/><itunes:duration>32:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Mimi Gross: The Cybersecurity Talent Crisis</title><itunes:title>Mimi Gross: The Cybersecurity Talent Crisis</itunes:title><description><![CDATA[<p>Mimi Gross - a.k.a the “Cybersecurity Matchmaker” -- is an expert in cybersecurity recruiting, and has helped dozens of companies find the right talents to join their teams. We sat down with her to discuss what manufacturers can learn from start-ups about recruiting top talent.</p>]]></description><content:encoded><![CDATA[<p>Mimi Gross - a.k.a the “Cybersecurity Matchmaker” -- is an expert in cybersecurity recruiting, and has helped dozens of companies find the right talents to join their teams. We sat down with her to discuss what manufacturers can learn from start-ups about recruiting top talent.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/mimi-gross-the-cybersecurity-talent-crisis]]></link><guid isPermaLink="false">c012737a-7538-4097-80a9-f96131cfcc7b</guid><itunes:image href="https://artwork.captivate.fm/676ebd86-1f01-4d3c-8604-c4bca68182f2/SKdR1f2yOuRb98srMLaRZ-3A.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Thu, 10 Nov 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/92ce7257-a3b3-465a-b5d4-069b2f3136d3/ltood-2022-11-02-mimi-gross-ed-1.mp3" length="31942407" type="audio/mpeg"/><itunes:duration>22:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Rick Driggers: From the U.S. Air Force to Industrial Cybersecurity</title><itunes:title>Rick Driggers: From the U.S. Air Force to Industrial Cybersecurity</itunes:title><description><![CDATA[<p>Rick Driggers is the critical infrastructure cyber lead at Accenture Federal Services. We chatted with him about his incredible journey from the U.S. Air Force to CISA, and uncovered the biggest challenges facing the industrial cybersecurity world today</p>]]></description><content:encoded><![CDATA[<p>Rick Driggers is the critical infrastructure cyber lead at Accenture Federal Services. We chatted with him about his incredible journey from the U.S. Air Force to CISA, and uncovered the biggest challenges facing the industrial cybersecurity world today</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/rick-driggers-from-the-u-s-air-force-to-industrial-cybersecurity]]></link><guid isPermaLink="false">6bff6e7c-4629-427e-97a0-438127aa27aa</guid><itunes:image href="https://artwork.captivate.fm/decf0a16-1e6f-48d1-bdf1-73802055cb99/_2H_tPe7v-eWgN3UXkgaR0-q.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 26 Oct 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cbce51c5-ca0b-4526-a0b0-2624f81836d3/LTOOD-20-202022-10-18-20-20Rick-20Driggers-20ed-201-1.mp3" length="35992839" type="audio/mpeg"/><itunes:duration>25:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Ronen Lago: Shifting Gears in Product Security</title><itunes:title>Ronen Lago: Shifting Gears in Product Security</itunes:title><description><![CDATA[<p>Ronen Lago has spent the past 20 years as CTO and Head of Product, in companies such as Daimler, Lockheed Martin, Motorola, and CYE. We sat with him to discuss why device manufacturers need to make drastic changes to their operations and hear his tips and tricks for product security teams.</p>]]></description><content:encoded><![CDATA[<p>Ronen Lago has spent the past 20 years as CTO and Head of Product, in companies such as Daimler, Lockheed Martin, Motorola, and CYE. We sat with him to discuss why device manufacturers need to make drastic changes to their operations and hear his tips and tricks for product security teams.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/ronen-lago-shifting-gears-in-product-security]]></link><guid isPermaLink="false">b40b6266-918c-4324-8b0c-9e9e55f45ccb</guid><itunes:image href="https://artwork.captivate.fm/668e3c6d-2fd0-4425-8afa-b925c0ffd9b0/sfSCp7_izbjzbGFuB95MEd1K.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 12 Oct 2022 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/66936e3e-ba34-42bd-9b9b-9d27b21f0b89/LTOOD-202022-10-05-20-20Ronen-20-20Ed-201.mp3" length="36423687" type="audio/mpeg"/><itunes:duration>25:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Dr. Suzanne Schwartz, FDA: What&apos;s Next in Medical Device Cybersecurity</title><itunes:title>Dr. Suzanne Schwartz, FDA: What&apos;s Next in Medical Device Cybersecurity</itunes:title><description><![CDATA[<p>Dr. Suzanne Schwartz is the Director of the Office of Strategic Partnerships &amp; Technology Innovation, at the Center for Devices &amp; Radiological Health of the US FDA. She is one of the most prominent policymakers and leaders in medical device cybersecurity, having spent the past 12 years at the FDA advancing medical device cybersecurity for the benefit of the entire world. We sat down with her to discuss where medical device cybersecurity regulations are headed and hear her advice for women wanting to advance their careers in cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>Dr. Suzanne Schwartz is the Director of the Office of Strategic Partnerships &amp; Technology Innovation, at the Center for Devices &amp; Radiological Health of the US FDA. She is one of the most prominent policymakers and leaders in medical device cybersecurity, having spent the past 12 years at the FDA advancing medical device cybersecurity for the benefit of the entire world. We sat down with her to discuss where medical device cybersecurity regulations are headed and hear her advice for women wanting to advance their careers in cybersecurity.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/dr-suzanne-schwartz-fda-whats-next-in-medical-device-cybersecurity]]></link><guid isPermaLink="false">e3ebb978-7eba-4eb3-bae5-ea991192f38c</guid><itunes:image href="https://artwork.captivate.fm/4c917726-bd76-4999-8ad8-6285da511bc7/01KdUmkHynO5IfUUOZ2Fd5az.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 28 Sep 2022 01:45:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/693b9143-292e-49e2-854d-7a0a757338df/ltood-2022-09-18-suzanne-schwartz-ed1.mp3" length="38994038" type="audio/mpeg"/><itunes:duration>27:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Eystein Stenberg: Software Updates for Connected Devices - Everything You Wanted to Know</title><itunes:title>Eystein Stenberg: Software Updates for Connected Devices - Everything You Wanted to Know</itunes:title><description><![CDATA[<p>Eystein Stenberg, Co-founder, and CTO at Northern.tech (developers of Mender), sheds some light on the intricate world of software updates for connected devices and provides his tips and tricks for product security teams.</p>]]></description><content:encoded><![CDATA[<p>Eystein Stenberg, Co-founder, and CTO at Northern.tech (developers of Mender), sheds some light on the intricate world of software updates for connected devices and provides his tips and tricks for product security teams.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/eystein-stenberg-software-updates-for-connected-devices-everything-you-wanted-to-know]]></link><guid isPermaLink="false">501a19d0-b074-4ab7-b83c-372606b6776b</guid><itunes:image href="https://artwork.captivate.fm/3cc93e3f-ba2d-4e6b-a7d0-5e66b6d6536d/QMi5AwRVoseX_z3kuM0aaDt6.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 13 Sep 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2c1a2e93-3b8b-4b4c-beb9-2a583dc78ebc/ltood-2022-09-06-eystein-edit-1.mp3" length="36592455" type="audio/mpeg"/><itunes:duration>25:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Anthony Fernando: Surgical Robots, FDA and Cybersecurity</title><itunes:title>Anthony Fernando: Surgical Robots, FDA and Cybersecurity</itunes:title><description><![CDATA[<p>Medical Device leader and innovator Anthony Fernando discusses the future of robotic surgery, regulations, and cybersecurity.</p><p>Anthony Fernando is President and CEO of Asensus Surgical, a company that is reimagining how surgeries are being done. Anthony is a veteran of the medical device industry, having held key positions at Stryker, Becton Dickinson &amp; Company, PerkinElmer, and more.</p>]]></description><content:encoded><![CDATA[<p>Medical Device leader and innovator Anthony Fernando discusses the future of robotic surgery, regulations, and cybersecurity.</p><p>Anthony Fernando is President and CEO of Asensus Surgical, a company that is reimagining how surgeries are being done. Anthony is a veteran of the medical device industry, having held key positions at Stryker, Becton Dickinson &amp; Company, PerkinElmer, and more.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/anthony-fernando-surgical-robots-fda-and-cybersecurity]]></link><guid isPermaLink="false">ef85249c-1296-49ef-b9b1-7567912d7691</guid><itunes:image href="https://artwork.captivate.fm/174209bc-ce99-4636-8bb4-f1f9483843bd/0IrcjbZSalHvGrxaKv25QBvb.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 31 Aug 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/cb32ac49-be23-4ce2-bf85-2a5404746826/ltood-anthony-fernando-ed-1.mp3" length="41645703" type="audio/mpeg"/><itunes:duration>28:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Asaf Atzmon: The Future of Automotive Cybersecurity</title><itunes:title>Asaf Atzmon: The Future of Automotive Cybersecurity</itunes:title><description><![CDATA[<p>Asaf Atzmon, the former VP &amp; General Manager Automotive Cybersecurity at HARMAN International, sat down with us to discuss where automotive product cybersecurity is headed and explains the complexity of open-source security for car manufacturers.</p>]]></description><content:encoded><![CDATA[<p>Asaf Atzmon, the former VP &amp; General Manager Automotive Cybersecurity at HARMAN International, sat down with us to discuss where automotive product cybersecurity is headed and explains the complexity of open-source security for car manufacturers.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/asaf-atzmon-the-future-of-automotive-cybersecurity]]></link><guid isPermaLink="false">81a3c26d-c5a4-4f62-97d0-2b1280eeb6da</guid><itunes:image href="https://artwork.captivate.fm/379209be-756e-424e-bbc1-64d12c276cbc/LJfCH8VuseiF9M-nRfiv1qLs.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 16 Aug 2022 04:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7b443466-d203-4739-a8af-abf3098c62a8/ltood-2022-08-08-asaf-atzmon-ed-1.mp3" length="43555143" type="audio/mpeg"/><itunes:duration>30:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Ken Hoyme: Building a Medical Device Cybersecurity Practice</title><itunes:title>Ken Hoyme: Building a Medical Device Cybersecurity Practice</itunes:title><description><![CDATA[<p>Product cybersecurity expert Ken Hoyme shared with us how he built the product security practice at Boston Scientific, why he chose this profession, and gives his practical recommendations for product security teams.</p><p>Ken is an expert in everything product cybersecurity and has held key positions at Boston Scientific and Honeywell. He is a senior technical leader with demonstrated capabilities to drive broad cross-functional teams to create effective solutions to complex problems, with particular emphasis on safety and security-critical, regulated industries.</p>]]></description><content:encoded><![CDATA[<p>Product cybersecurity expert Ken Hoyme shared with us how he built the product security practice at Boston Scientific, why he chose this profession, and gives his practical recommendations for product security teams.</p><p>Ken is an expert in everything product cybersecurity and has held key positions at Boston Scientific and Honeywell. He is a senior technical leader with demonstrated capabilities to drive broad cross-functional teams to create effective solutions to complex problems, with particular emphasis on safety and security-critical, regulated industries.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/ken-hoyme-building-a-medical-device-cybersecurity-practice]]></link><guid isPermaLink="false">0c9edbb9-9438-4b61-931d-62bcb009c444</guid><itunes:image href="https://artwork.captivate.fm/c40518b0-61d8-411e-be36-e4dd89b3c5fc/dPNHh956OE6EFeq78IIiLwVr.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 03 Aug 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/edf8d773-e756-435c-972f-193204febc7e/ltood-2022-07-26-ken-hoyme-brw-gk-edit-1.mp3" length="46221447" type="audio/mpeg"/><itunes:duration>32:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Joseph Steinberg: Aliens, AI and Product Security</title><itunes:title>Joseph Steinberg: Aliens, AI and Product Security</itunes:title><description><![CDATA[<p>The "expert witness of cyber", Joseph Steinberg, sat down with us to discuss how AI will change cybersecurity, why the product security world has ways to go, and what aliens have to do with all of that.</p><p>Joseph Steinberg is a world-renowned speaker, advisor, and expert witness talking about cybersecurity, AI, and IoT. He was ranked as one of the top cybersecurity influencers in the world, wrote numerous successful books about cybersecurity, and is instrumental in shaping the cybersecurity world as we know it.</p>]]></description><content:encoded><![CDATA[<p>The "expert witness of cyber", Joseph Steinberg, sat down with us to discuss how AI will change cybersecurity, why the product security world has ways to go, and what aliens have to do with all of that.</p><p>Joseph Steinberg is a world-renowned speaker, advisor, and expert witness talking about cybersecurity, AI, and IoT. He was ranked as one of the top cybersecurity influencers in the world, wrote numerous successful books about cybersecurity, and is instrumental in shaping the cybersecurity world as we know it.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/joseph-steinberg-aliens-ai-and-product-security]]></link><guid isPermaLink="false">0a5fb436-c1a0-4127-aa29-39a836dcbb61</guid><itunes:image href="https://artwork.captivate.fm/b16f5633-d52c-4b21-ac60-39b1adec5d7b/58USEKJ2hRVdpe-KIfw0rzKm.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 20 Jul 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/eed41edf-d3ec-48b7-8855-c6e9d716fefc/ltood-joseph-steinberg-ed-1.mp3" length="51015495" type="audio/mpeg"/><itunes:duration>35:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Dr. Allan Friedman: All About SBOMs</title><itunes:title>Dr. Allan Friedman: All About SBOMs</itunes:title><description><![CDATA[<p>We sat down with one of the most influential cybersecurity experts in the world, to talk about SBOMs, standards, and everything in between.</p><p>Dr. Allan Friedman is a Senior Advisor and Strategist at the U.S Cybersecurity and Infrastructure Security Agency (CISA). He is both a technologist and a policymaker, with more than 15 years of experience in international cybersecurity and technology policy. He is known for his ability to design, convene, and facilitate complex, multi-stakeholder policy processes, which he demonstrated more than once while leading CISA's efforts to coordinate SBOM standards around the world.</p>]]></description><content:encoded><![CDATA[<p>We sat down with one of the most influential cybersecurity experts in the world, to talk about SBOMs, standards, and everything in between.</p><p>Dr. Allan Friedman is a Senior Advisor and Strategist at the U.S Cybersecurity and Infrastructure Security Agency (CISA). He is both a technologist and a policymaker, with more than 15 years of experience in international cybersecurity and technology policy. He is known for his ability to design, convene, and facilitate complex, multi-stakeholder policy processes, which he demonstrated more than once while leading CISA's efforts to coordinate SBOM standards around the world.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/dr-allan-friedman-all-about-sboms]]></link><guid isPermaLink="false">600b298c-14b3-4761-9e97-f3e401162219</guid><itunes:image href="https://artwork.captivate.fm/6eb5895d-2a8d-42eb-b87a-901255add7bf/91-QDC0-ER3BptJcjNKFv4yh.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 06 Jul 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a6f2ad99-ab2b-4057-9521-29f5327faf89/ltood-allan-friedman-brw-gav-ed-1.mp3" length="40830663" type="audio/mpeg"/><itunes:duration>28:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Tom Alrich: VEXs and Supply Chain Cybersecurity</title><itunes:title>Tom Alrich: VEXs and Supply Chain Cybersecurity</itunes:title><description><![CDATA[<p>Tom Alrich is a well-known independent consultant and blogger about supply chain cybersecurity and software bills of material, for electric power and other industries.</p><p>We sat down with him to learn from his vast experience about supply chain security, SBOMs, VEXs, and how they all tie together.</p>]]></description><content:encoded><![CDATA[<p>Tom Alrich is a well-known independent consultant and blogger about supply chain cybersecurity and software bills of material, for electric power and other industries.</p><p>We sat down with him to learn from his vast experience about supply chain security, SBOMs, VEXs, and how they all tie together.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/tom-alrich-vexs-and-the-future-of-supply-chain-cybersecurity]]></link><guid isPermaLink="false">a3f15cce-eb16-4191-86c7-07569505e066</guid><itunes:image href="https://artwork.captivate.fm/492b7806-a0a1-4e1c-9716-e16aa1630cb7/8Yu1uivI-WSQPEcSStIrSsZn.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 21 Jun 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e1340549-7463-4735-b62e-2fb02f1c26a0/ltood-2022-06-13-tom-alrich-brw-ed-1.mp3" length="39055431" type="audio/mpeg"/><itunes:duration>27:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Steve Springett: CycloneDX and the Future of SBOMs</title><itunes:title>Steve Springett: CycloneDX and the Future of SBOMs</itunes:title><description><![CDATA[<p>In this fascinating interview, the CycloneDX leader gives his take on the future of CycloneDX and SBOMs, and shares tips on how product security teams should prepare themselves for what's coming</p>]]></description><content:encoded><![CDATA[<p>In this fascinating interview, the CycloneDX leader gives his take on the future of CycloneDX and SBOMs, and shares tips on how product security teams should prepare themselves for what's coming</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/steve-springett-building-an-sbom-standard]]></link><guid isPermaLink="false">ac110eec-7dde-4498-80af-c5e4ed6d9ec1</guid><itunes:image href="https://artwork.captivate.fm/70956e20-8775-4fdf-b478-a109f31e664a/-y5ilo4Ja-ypbNHj5AZEV3tk.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 07 Jun 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5f67ccc2-3528-4994-91d6-905f3b0e65f6/ltood-steve-springett-brw-ed-1.mp3" length="36256071" type="audio/mpeg"/><itunes:duration>25:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>John Ray: Is Florida the Silicon Valley of Medical Devices?</title><itunes:title>John Ray: Is Florida the Silicon Valley of Medical Devices?</itunes:title><description><![CDATA[<p>John Ray is the Executive Director of the FMMC, a Florida statewide association of medical technology firms., which aims to unite, promote and grow the Florida medical device industry, and to enhance the business success of its member companies. </p><p>John sat down with us and explained why Florida is one of the greatest hubs for medical device manufacturers and reveals what he learned about medical device cybersecurity after working with dozens of medical technology companies.</p>]]></description><content:encoded><![CDATA[<p>John Ray is the Executive Director of the FMMC, a Florida statewide association of medical technology firms., which aims to unite, promote and grow the Florida medical device industry, and to enhance the business success of its member companies. </p><p>John sat down with us and explained why Florida is one of the greatest hubs for medical device manufacturers and reveals what he learned about medical device cybersecurity after working with dozens of medical technology companies.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/john-ray-is-florida-the-silicon-valley-of-medical-devices]]></link><guid isPermaLink="false">f8c190bd-9cad-4443-9203-96ec36d77745</guid><itunes:image href="https://artwork.captivate.fm/db5207b2-1d19-4ce1-a592-ccb7d2ecbac6/M8WrgBZd7klG2JPfJNrGhcYU.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 24 May 2022 05:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7492a690-c858-4cac-934c-dc4ae1f9e5b1/ltood-john-ray-brw-ed-1.mp3" length="33946311" type="audio/mpeg"/><itunes:duration>23:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Chris Gates: Protecting Lives with Medical Device Cybersecurity (Part 2 of 2)</title><itunes:title>Chris Gates: Protecting Lives with Medical Device Cybersecurity (Part 2 of 2)</itunes:title><description><![CDATA[<p>Part 2 of 2.</p><p>In this thought-provoking interview, one of the world's leading medical device cybersecurity experts shares his hopes and concerns for the medical device industry and reveals the personal reasons behind why he chose this challenging&nbsp;-- and fascinating -- profession.</p><p>During the past 40+ years, Chris Gates – Director of Product Security at Velentium, has built a huge legacy as a product security expert for embedded systems, especially medical devices. He has helped dozens of leading medical device manufacturers create their product security practice, and greatly contributed to the working groups designing the security frameworks used by the entire industry, such as SBOMs.</p>]]></description><content:encoded><![CDATA[<p>Part 2 of 2.</p><p>In this thought-provoking interview, one of the world's leading medical device cybersecurity experts shares his hopes and concerns for the medical device industry and reveals the personal reasons behind why he chose this challenging&nbsp;-- and fascinating -- profession.</p><p>During the past 40+ years, Chris Gates – Director of Product Security at Velentium, has built a huge legacy as a product security expert for embedded systems, especially medical devices. He has helped dozens of leading medical device manufacturers create their product security practice, and greatly contributed to the working groups designing the security frameworks used by the entire industry, such as SBOMs.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/chris-gates-protecting-lives-with-medical-device-cybersecurity-part-2-of-2]]></link><guid isPermaLink="false">aa310c2e-7544-4f10-afd4-c6f9f0970e86</guid><itunes:image href="https://artwork.captivate.fm/42776246-a24b-451c-b716-e0cf4a38e75a/lHehrT69Sq3Mls8Q2yZFkNrP.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 03 May 2022 01:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/48a6e23b-1b70-4e38-bb0c-51d3016b426a/ltood-2022-04-10-chris-gates-part-2-brw-ed-1.mp3" length="31533466" type="audio/mpeg"/><itunes:duration>21:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Chris Gates: Protecting Lives with Medical Device Cybersecurity (Part 1 of 2)</title><itunes:title>Chris Gates: Protecting Lives with Medical Device Cybersecurity (Part 1 of 2)</itunes:title><description><![CDATA[<p>Part 1 of 2.</p><p>In this thought-provoking interview, one of the world's leading medical device cybersecurity experts shares his hopes and concerns for the medical device industry and reveals the personal reasons behind why he chose this challenging&nbsp;-- and fascinating -- profession.</p><p>During the past 40+ years, Chris Gates – Director of Product Security at Velentium, has built a huge legacy as a product security expert for embedded systems, especially medical devices. He has helped dozens of leading medical device manufacturers create their product security practice, and greatly contributed to the working groups designing the security frameworks used by the entire industry, such as SBOMs.</p>]]></description><content:encoded><![CDATA[<p>Part 1 of 2.</p><p>In this thought-provoking interview, one of the world's leading medical device cybersecurity experts shares his hopes and concerns for the medical device industry and reveals the personal reasons behind why he chose this challenging&nbsp;-- and fascinating -- profession.</p><p>During the past 40+ years, Chris Gates – Director of Product Security at Velentium, has built a huge legacy as a product security expert for embedded systems, especially medical devices. He has helped dozens of leading medical device manufacturers create their product security practice, and greatly contributed to the working groups designing the security frameworks used by the entire industry, such as SBOMs.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/chris-gates-our-medical-device-security-problem-part-1-of-2]]></link><guid isPermaLink="false">7625d413-1af4-4633-aa4f-895bb8972eb8</guid><itunes:image href="https://artwork.captivate.fm/e47504ba-8243-45b4-a6af-f22053717420/8vX3KUW5AVI4ANS9-tiHFgiH.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Tue, 26 Apr 2022 02:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b3d58101-d557-4fc2-9149-61def0271f10/ltood-2022-04-10-chris-gates-part-1-brw-ed-1.mp3" length="34639948" type="audio/mpeg"/><itunes:duration>24:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Thomas Wambera: The Automotive Ghost-Writers</title><itunes:title>Thomas Wambera: The Automotive Ghost-Writers</itunes:title><description><![CDATA[<p>Thomas Wambera, Affiliate Business Manager at AVL Deutschland, sheds some light on the upcoming WP. 29 regulations and talks about cybersecurity in an autonomous world.</p><p>Thomas is a veteran cybersecurity expert and engineer in the automotive industry, including in areas such as controllers, autonomous cars, and regulation. </p>]]></description><content:encoded><![CDATA[<p>Thomas Wambera, Affiliate Business Manager at AVL Deutschland, sheds some light on the upcoming WP. 29 regulations and talks about cybersecurity in an autonomous world.</p><p>Thomas is a veteran cybersecurity expert and engineer in the automotive industry, including in areas such as controllers, autonomous cars, and regulation. </p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/thomas-wambera-the-automotive-ghost-writers]]></link><guid isPermaLink="false">d622a520-0072-4e41-aede-e7dc2d8a7fe3</guid><itunes:image href="https://artwork.captivate.fm/6753d4ab-a24a-4c36-b0fe-11c0367c6201/HtiGsoYs4Lfb8cRZxi_rCopF.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Thu, 14 Apr 2022 04:30:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/58603121-c752-439f-b7fa-7ab6d86299d2/ltood-2022-03-15-thomas-wambera-ed-2-20-1.mp3" length="40913607" type="audio/mpeg"/><itunes:duration>28:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Felipe Fernandes: Securing Jaguars</title><itunes:title>Felipe Fernandes: Securing Jaguars</itunes:title><description><![CDATA[<p>Felipe Fernandes from Jaguar Land Rover (JLR) discusses the toughest challenges and most exciting innovations in today's automotive cybersecurity world and reveals what his favorite JLR car is.</p><p>Felipe is a Cyber Security Manager at Jaguar Land Rover. He is an expert in all things automotive cybersecurity, from RF systems to IoT and embedded hardware design. In the past, he was Head of Vehicle Cyber Security LATAM at Fiat Chrysler.</p>]]></description><content:encoded><![CDATA[<p>Felipe Fernandes from Jaguar Land Rover (JLR) discusses the toughest challenges and most exciting innovations in today's automotive cybersecurity world and reveals what his favorite JLR car is.</p><p>Felipe is a Cyber Security Manager at Jaguar Land Rover. He is an expert in all things automotive cybersecurity, from RF systems to IoT and embedded hardware design. In the past, he was Head of Vehicle Cyber Security LATAM at Fiat Chrysler.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/felipe-fernandez-securing-jaguars]]></link><guid isPermaLink="false">8b4b8917-163a-44fd-ae09-99ea9582a14d</guid><itunes:image href="https://artwork.captivate.fm/35ae115e-b2ce-480c-aae9-02b27866d05d/im6iGgR79cGhIOnA9statdNx.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 06 Apr 2022 03:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9795855b-668b-430f-8460-2a6666473096/cybellum-ltood-episode-2-filipe-fernandes-brw-ed-1-1.mp3" length="39661383" type="audio/mpeg"/><itunes:duration>27:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>David Colombo: Hacking Teslas</title><itunes:title>David Colombo: Hacking Teslas</itunes:title><description><![CDATA[<p>In the first episode of "Left to Our Own Devices", David Colombo (aka the "cyber boy wonder") breaks down how he hacked dozens of Teslas in one day, how he became a world-renowned security researcher at the age of 19, and shares his tips and tricks for product security teams.</p><p>David is the founder of Colombo Technologies. He is a very prolific cyber security researcher who, despite his young age, has managed to build quite a name for himself in multiple industries. During the past few years, he's exposed critical vulnerabilities in government offices, banks, and, most recently, Tesla cars.</p>]]></description><content:encoded><![CDATA[<p>In the first episode of "Left to Our Own Devices", David Colombo (aka the "cyber boy wonder") breaks down how he hacked dozens of Teslas in one day, how he became a world-renowned security researcher at the age of 19, and shares his tips and tricks for product security teams.</p><p>David is the founder of Colombo Technologies. He is a very prolific cyber security researcher who, despite his young age, has managed to build quite a name for himself in multiple industries. During the past few years, he's exposed critical vulnerabilities in government offices, banks, and, most recently, Tesla cars.</p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/david-colombo-hacking-teslas]]></link><guid isPermaLink="false">dddff173-9be0-459c-9212-520ad641a0ef</guid><itunes:image href="https://artwork.captivate.fm/3dd61f25-f5d6-437e-ad27-209e6dba0c57/Uoni1mNjYJ8nfDnnbjMkKcyb.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 23 Mar 2022 08:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9e8f8e8d-46e7-4f30-abef-2dd2fac40b5c/cybellum-ltood-david-colombo-brw-ed-2.mp3" length="36693255" type="audio/mpeg"/><itunes:duration>25:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><itunes:author>Cybellum Technologies LTD</itunes:author></item><item><title>Introducing Left to Our Own Devices: The Product Security Podcast</title><itunes:title>Introducing Left to Our Own Devices: The Product Security Podcast</itunes:title><description><![CDATA[<p>Product security and cybersecurity pros around the world are working really hard right now to build their strategy for safeguarding devices and complying with regulations. </p><p>We’ve noticed everyone’s running into the same problems, but they take different approaches. Another thing they all have in common is that they wanna learn what the other person is doing.</p><p>And then it hit us - why not start a podcast?</p><p><em>Left to Our Own Devices</em> is the name of our new podcast. Dedicated to everything product security, from Medical SBOM, to WP. 29 and the latest industrial security threats.</p><p>We’ve invited policymakers, engineers, and industry leaders to hear their war stories and insider tips for surviving the product security jungle.</p><p>Product security teams - this podcast is for you. Whether you’re from the Automotive, Medical Device or Industrial equipment industries, you’ve come to the right place. </p><p>So buckle up, make yourself a good cup of coffee, and join us for a peek under the hood.</p><p>Left to Our Own Devices is brought to you by Cybellum. To learn more, visit <a href="Cybellum.com" rel="noopener noreferrer" target="_blank">Cybellum.com</a></p>]]></description><content:encoded><![CDATA[<p>Product security and cybersecurity pros around the world are working really hard right now to build their strategy for safeguarding devices and complying with regulations. </p><p>We’ve noticed everyone’s running into the same problems, but they take different approaches. Another thing they all have in common is that they wanna learn what the other person is doing.</p><p>And then it hit us - why not start a podcast?</p><p><em>Left to Our Own Devices</em> is the name of our new podcast. Dedicated to everything product security, from Medical SBOM, to WP. 29 and the latest industrial security threats.</p><p>We’ve invited policymakers, engineers, and industry leaders to hear their war stories and insider tips for surviving the product security jungle.</p><p>Product security teams - this podcast is for you. Whether you’re from the Automotive, Medical Device or Industrial equipment industries, you’ve come to the right place. </p><p>So buckle up, make yourself a good cup of coffee, and join us for a peek under the hood.</p><p>Left to Our Own Devices is brought to you by Cybellum. To learn more, visit <a href="Cybellum.com" rel="noopener noreferrer" target="_blank">Cybellum.com</a></p>]]></content:encoded><link><![CDATA[https://cybellum2022.wpengine.com/podcasts/introducing-left-to-our-own-devices-the-product-security-podcast]]></link><guid isPermaLink="false">8db9d177-31bc-4292-a08c-bb37a41d681a</guid><itunes:image href="https://artwork.captivate.fm/5eb60246-c2d1-494e-936b-5bae6cdfe44f/ViBkAmhgb6MTLsjcvfUbC1qZ.png"/><dc:creator><![CDATA[Cybellum Technologies LTD]]></dc:creator><pubDate>Wed, 02 Mar 2022 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/497db628-f71b-4a5a-9e37-14a899978794/cybellum-left-to-our-own-devices-intro-brw-ed-3-1.mp3" length="2144199" type="audio/mpeg"/><itunes:duration>01:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>trailer</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><itunes:season>1</itunes:season><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season><itunes:author>Cybellum Technologies LTD</itunes:author></item></channel></rss>