<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/the-cybersecurity-readi/" rel="self" type="application/rss+xml"/><title><![CDATA[The Cybersecurity Readiness Podcast Series]]></title><podcast:guid>26fc16bb-e8d1-5305-8872-cd328a09ac43</podcast:guid><lastBuildDate>Fri, 27 Feb 2026 09:31:14 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Dr. Dave Chatterjee]]></copyright><managingEditor>Dr. Dave Chatterjee</managingEditor><itunes:summary><![CDATA[The Cybersecurity Readiness Podcast Series provides a reflective, thought-provoking, and jargon-free discussion on how to enhance the state of cybersecurity at an individual, organizational, and national level. As of September 2, 2024, the podcast series has produced over 70 episodes, been downloaded over 10K times, and has listeners in 105 countries. The podcast episodes are used in classrooms and for corporate training and serve as insight sources in research and publications.

Host Dr. Dave Chatterjee converses with subject matter experts, business and technology leaders, trainers and educators, and members of user communities. He has been studying cybersecurity for over a decade. He has delivered talks, conducted webinars, consulted with companies, and served on a cybersecurity SWAT team with Chief Information Security Officers (CISOs). Dr. Chatterjee is a Visiting Professor at Duke University and has served as a tenured professor at The Terry College of Business at the University of Georgia. 

Connect with Dr. Chatterjee on these platforms: 

LinkedIn: https://www.linkedin.com/in/dchatte/ 

Website: https://dchatte.com/]]></itunes:summary><image><url>https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg</url><title>The Cybersecurity Readiness Podcast Series</title><link><![CDATA[https://www.dchatte.com/episodes/]]></link></image><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><itunes:owner><itunes:name>Dr. Dave Chatterjee</itunes:name></itunes:owner><itunes:author>Dr. Dave Chatterjee</itunes:author><description>The Cybersecurity Readiness Podcast Series provides a reflective, thought-provoking, and jargon-free discussion on how to enhance the state of cybersecurity at an individual, organizational, and national level. As of September 2, 2024, the podcast series has produced over 70 episodes, been downloaded over 10K times, and has listeners in 105 countries. The podcast episodes are used in classrooms and for corporate training and serve as insight sources in research and publications.

Host Dr. Dave Chatterjee converses with subject matter experts, business and technology leaders, trainers and educators, and members of user communities. He has been studying cybersecurity for over a decade. He has delivered talks, conducted webinars, consulted with companies, and served on a cybersecurity SWAT team with Chief Information Security Officers (CISOs). Dr. Chatterjee is a Visiting Professor at Duke University and has served as a tenured professor at The Terry College of Business at the University of Georgia. 

Connect with Dr. Chatterjee on these platforms: 

LinkedIn: https://www.linkedin.com/in/dchatte/ 

Website: https://dchatte.com/</description><link>https://www.dchatte.com/episodes/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[with Dr. Dave Chatterjee]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Business"><itunes:category text="Management"/></itunes:category><itunes:category text="Business"><itunes:category text="Careers"/></itunes:category><itunes:category text="Business"><itunes:category text="Entrepreneurship"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Episode 101: AI vs. AI in Cybersecurity: Why Continuous Validation Is Now Essential</title><itunes:title>Episode 101: AI vs. AI in Cybersecurity: Why Continuous Validation Is Now Essential</itunes:title><description><![CDATA[<p>In this forward-looking Episode 101 of the Cybersecurity Readiness Podcast Series, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/snehalantani/" rel="noopener noreferrer" target="_blank">Snehal Antani—CEO and Co-Founder of Horizon3.ai </a>and former Chief Technology Officer at Joint Special Operations Command (JSOC)—to examine the rapidly emerging reality of AI-versus-AI cyber warfare.</p><p>As AI dramatically compresses attacker dwell time and lowers the skill barrier for sophisticated intrusions, traditional defensive postures are proving insufficient. Drawing on real-world demonstrations and national-security-grade operational experience, Antani explains how offensive AI is transforming cyber risk by enabling attackers to move at machine speed, scale attacks indiscriminately, and expose systemic weaknesses in organizational defenses.</p><p>Framed through Dr. Chatterjee’s Commitment–Preparedness–Discipline (CPD) lens, the episode reframes cybersecurity readiness as a continuous validation discipline—one that demands organizations train like they fight, reduce blast radius, and build muscle memory for inevitable breaches. The conversation delivers a clear message: in the age of autonomous threats, resilience belongs to organizations that continuously test themselves faster than adversaries can exploit them.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-101-ai-vs-ai-in-cybersecurity-why-continuous-validation-is-now-essential/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-101-ai-vs-ai-in-cybersecurity-why-continuous-validation-is-now-essential/</a></p><p><strong>Connect with Host Dr. Dave Chatterjee</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles &amp; Cases Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/root-automating-the-remediation-gap/01tOF00000B0DoXYAV" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2026). Root: Automating the Remediation Gap, Ivey Publishing, Jan 7, 2026.</a></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” </a><em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank"> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” </a><em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” </a><em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” </a><em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank"> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” </a><em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Journal of Organizational Computing and Electronic Commerce, </a></em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” </a><em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Business Horizons, </a></em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this forward-looking Episode 101 of the Cybersecurity Readiness Podcast Series, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/snehalantani/" rel="noopener noreferrer" target="_blank">Snehal Antani—CEO and Co-Founder of Horizon3.ai </a>and former Chief Technology Officer at Joint Special Operations Command (JSOC)—to examine the rapidly emerging reality of AI-versus-AI cyber warfare.</p><p>As AI dramatically compresses attacker dwell time and lowers the skill barrier for sophisticated intrusions, traditional defensive postures are proving insufficient. Drawing on real-world demonstrations and national-security-grade operational experience, Antani explains how offensive AI is transforming cyber risk by enabling attackers to move at machine speed, scale attacks indiscriminately, and expose systemic weaknesses in organizational defenses.</p><p>Framed through Dr. Chatterjee’s Commitment–Preparedness–Discipline (CPD) lens, the episode reframes cybersecurity readiness as a continuous validation discipline—one that demands organizations train like they fight, reduce blast radius, and build muscle memory for inevitable breaches. The conversation delivers a clear message: in the age of autonomous threats, resilience belongs to organizations that continuously test themselves faster than adversaries can exploit them.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-101-ai-vs-ai-in-cybersecurity-why-continuous-validation-is-now-essential/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-101-ai-vs-ai-in-cybersecurity-why-continuous-validation-is-now-essential/</a></p><p><strong>Connect with Host Dr. Dave Chatterjee</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles &amp; Cases Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/root-automating-the-remediation-gap/01tOF00000B0DoXYAV" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2026). Root: Automating the Remediation Gap, Ivey Publishing, Jan 7, 2026.</a></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” </a><em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank"> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” </a><em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” </a><em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” </a><em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank"> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” </a><em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Journal of Organizational Computing and Electronic Commerce, </a></em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” </a><em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Business Horizons, </a></em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/ai-vs-ai-in-cybersecurity-why-continuous-validation-is-now-essential]]></link><guid isPermaLink="false">b43295ee-0cef-447a-8916-0fcc2cc9fe54</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Fri, 27 Feb 2026 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/b43295ee-0cef-447a-8916-0fcc2cc9fe54.mp3" length="64493797" type="audio/mpeg"/><itunes:duration>44:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>101</itunes:episode><podcast:episode>101</podcast:episode></item><item><title>Episode 100: From Cyber Defense to Trust Governance</title><itunes:title>Episode 100: From Cyber Defense to Trust Governance</itunes:title><description><![CDATA[<p>In this milestone 100th episode of the <em>Cybersecurity Readiness Podcast Series</em>, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> reflects on nearly one hundred conversations that collectively reveal a hard-earned truth: cybersecurity has crossed a point of no return. It is no longer a technical function or an episodic response to crises—it has become a <strong>trust discipline</strong>.</p><p>Rather than celebrating longevity, Episode 100 serves as a moment of synthesis and reckoning. Drawing on insights from global practitioners, scholars, regulators, and executives, Chatterjee distills why trust collapses, why recovery is slow, and why organizations that invest in <strong>readiness consistently outperform those that rely on reaction</strong>.</p><p>Tracing the podcast’s origins—from an experimental idea inspired by a University of Georgia undergraduate to a globally recognized platform reaching listeners in over 117 countries—this episode reframes cybersecurity as a leadership, governance, and enterprise resilience challenge. Through the lens of the <strong>Commitment–Preparedness–Discipline (CPD)</strong> framework, Episode 100 captures how cybersecurity has evolved from control-centric defense to a core pillar of organizational credibility and trust governance.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-100-from-cyber-defense-to-trust-governance/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-100-from-cyber-defense-to-trust-governance/</a></p><p>Connect with Host Dr. Dave Chatterjee</p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles &amp; Cases Published</p><p><a href="https://www.iveypublishing.ca/s/product/root-automating-the-remediation-gap/01tOF00000B0DoXYAV" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2026). Root: Automating the Remediation Gap, Ivey Publishing, Jan 7, 2026.</a></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” <em>Business Horizons,</em> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” <em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” <em>I by IMD</em>, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” <em>Business Horizons,</em> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” <em>Journal of Organizational Computing and Electronic Commerce, </em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” <em>Business Horizons, </em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this milestone 100th episode of the <em>Cybersecurity Readiness Podcast Series</em>, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> reflects on nearly one hundred conversations that collectively reveal a hard-earned truth: cybersecurity has crossed a point of no return. It is no longer a technical function or an episodic response to crises—it has become a <strong>trust discipline</strong>.</p><p>Rather than celebrating longevity, Episode 100 serves as a moment of synthesis and reckoning. Drawing on insights from global practitioners, scholars, regulators, and executives, Chatterjee distills why trust collapses, why recovery is slow, and why organizations that invest in <strong>readiness consistently outperform those that rely on reaction</strong>.</p><p>Tracing the podcast’s origins—from an experimental idea inspired by a University of Georgia undergraduate to a globally recognized platform reaching listeners in over 117 countries—this episode reframes cybersecurity as a leadership, governance, and enterprise resilience challenge. Through the lens of the <strong>Commitment–Preparedness–Discipline (CPD)</strong> framework, Episode 100 captures how cybersecurity has evolved from control-centric defense to a core pillar of organizational credibility and trust governance.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-100-from-cyber-defense-to-trust-governance/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-100-from-cyber-defense-to-trust-governance/</a></p><p>Connect with Host Dr. Dave Chatterjee</p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles &amp; Cases Published</p><p><a href="https://www.iveypublishing.ca/s/product/root-automating-the-remediation-gap/01tOF00000B0DoXYAV" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2026). Root: Automating the Remediation Gap, Ivey Publishing, Jan 7, 2026.</a></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” <em>Business Horizons,</em> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” <em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” <em>I by IMD</em>, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” <em>Business Horizons,</em> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” <em>Journal of Organizational Computing and Electronic Commerce, </em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” <em>Business Horizons, </em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-100-from-cyber-defense-to-trust-governance]]></link><guid isPermaLink="false">7b153a14-8ce5-4295-9d70-1b05ca0b9c78</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 28 Jan 2026 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/7b153a14-8ce5-4295-9d70-1b05ca0b9c78.mp3" length="26551993" type="audio/mpeg"/><itunes:duration>18:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>100</itunes:episode><podcast:episode>100</podcast:episode></item><item><title>Episode 99: Access Control Reimagined — Why Identity, Devices, and Zero Trust Must Converge</title><itunes:title>Episode 99: Access Control Reimagined — Why Identity, Devices, and Zero Trust Must Converge</itunes:title><description><![CDATA[<p>In this landmark 99th episode of the <em>Cybersecurity Readiness Podcast Series</em>, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/dennylecompte/" rel="noopener noreferrer" target="_blank">Denny LeCompte</a>—CEO of Portnox (<a href="https://www.portnox.com/" rel="noopener noreferrer" target="_blank">https://www.portnox.com/</a>) and a former SolarWinds executive—to examine one of cybersecurity’s oldest yet most persistently exploited challenges: <strong>access control</strong>.</p><p>Despite decades of investment in passwords, MFA, and perimeter defenses, breaches rooted in access failures continue to dominate headlines. Drawing on firsthand experience—including lessons learned from the SolarWinds Sunburst breach—LeCompte explains why password-centric security models are fundamentally misaligned with human behavior and modern digital environments.</p><p>Together, Chatterjee and LeCompte argue for a decisive shift toward <strong>passwordless, device-centric, zero-trust access models</strong> that assume human fallibility, eliminate implicit trust, and dramatically reduce attack surfaces. Framed through Dr. Chatterjee’s <strong>Commitment–Preparedness–Discipline (CPD)</strong> lens, the episode reframes access control not as an IT configuration issue, but as a <strong>core pillar of cybersecurity governance, business resilience, and competitive survival</strong>.</p><h2>Time Stamps</h2><p>00:49 — Episode framing and the persistence of access control failures</p><p>03:15 — Why passwords remain fundamentally broken</p><p>05:54 — Enterprise vs. consumer passwordless realities</p><p>09:25 — SolarWinds breach lessons and access control failures</p><p>17:52 — Zero trust explained without the buzzwords</p><p>23:07 — Device identity, IoT risk, and network visibility</p><p>28:02 — Why identity and device controls must converge</p><p>35:52 — How leaders should assess access control maturity</p><p>42:52 — Designing security for human behavior</p><p>43:30 — Closing reflections</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-99-access-control-reimagined-why-identity-devices-and-zero-trust-must-converge/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-99-access-control-reimagined-why-identity-devices-and-zero-trust-must-converge/</a></p><p>Connect with Host Dr. Dave Chatterjee</p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” </a><em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank"> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” </a><em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” </a><em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” </a><em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank"> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” </a><em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Journal of Organizational Computing and Electronic Commerce, </a></em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” </a><em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Business Horizons, </a></em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this landmark 99th episode of the <em>Cybersecurity Readiness Podcast Series</em>, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/dennylecompte/" rel="noopener noreferrer" target="_blank">Denny LeCompte</a>—CEO of Portnox (<a href="https://www.portnox.com/" rel="noopener noreferrer" target="_blank">https://www.portnox.com/</a>) and a former SolarWinds executive—to examine one of cybersecurity’s oldest yet most persistently exploited challenges: <strong>access control</strong>.</p><p>Despite decades of investment in passwords, MFA, and perimeter defenses, breaches rooted in access failures continue to dominate headlines. Drawing on firsthand experience—including lessons learned from the SolarWinds Sunburst breach—LeCompte explains why password-centric security models are fundamentally misaligned with human behavior and modern digital environments.</p><p>Together, Chatterjee and LeCompte argue for a decisive shift toward <strong>passwordless, device-centric, zero-trust access models</strong> that assume human fallibility, eliminate implicit trust, and dramatically reduce attack surfaces. Framed through Dr. Chatterjee’s <strong>Commitment–Preparedness–Discipline (CPD)</strong> lens, the episode reframes access control not as an IT configuration issue, but as a <strong>core pillar of cybersecurity governance, business resilience, and competitive survival</strong>.</p><h2>Time Stamps</h2><p>00:49 — Episode framing and the persistence of access control failures</p><p>03:15 — Why passwords remain fundamentally broken</p><p>05:54 — Enterprise vs. consumer passwordless realities</p><p>09:25 — SolarWinds breach lessons and access control failures</p><p>17:52 — Zero trust explained without the buzzwords</p><p>23:07 — Device identity, IoT risk, and network visibility</p><p>28:02 — Why identity and device controls must converge</p><p>35:52 — How leaders should assess access control maturity</p><p>42:52 — Designing security for human behavior</p><p>43:30 — Closing reflections</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-99-access-control-reimagined-why-identity-devices-and-zero-trust-must-converge/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-99-access-control-reimagined-why-identity-devices-and-zero-trust-must-converge/</a></p><p>Connect with Host Dr. Dave Chatterjee</p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” </a><em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank"> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” </a><em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” </a><em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” </a><em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank"> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” </a><em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Journal of Organizational Computing and Electronic Commerce, </a></em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” </a><em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Business Horizons, </a></em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-99-access-control-reimagined-why-identity-devices-and-zero-trust-must-converge]]></link><guid isPermaLink="false">9c9a4cb3-3336-4210-9bbf-310eccb82dce</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 14 Jan 2026 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/9c9a4cb3-3336-4210-9bbf-310eccb82dce.mp3" length="64192549" type="audio/mpeg"/><itunes:duration>44:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>99</itunes:episode><podcast:episode>99</podcast:episode></item><item><title>Episode 98 -- Beyond Certification — Turning Compliance into Competitive Firepower</title><itunes:title>Episode 98 -- Beyond Certification — Turning Compliance into Competitive Firepower</itunes:title><description><![CDATA[<p>In this timely and hard-hitting episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/sandeep-pauddar/" rel="noopener noreferrer" target="_blank">Sandeep Pauddar</a>—an accomplished global auditor with over 30 years of experience—to challenge a deeply entrenched misconception: that cybersecurity certifications and compliance are merely regulatory checkboxes. Instead, the conversation reframes compliance as a strategic asset—one that can strengthen trust, resilience, and competitive positioning in an era defined by AI, global regulations, and escalating cyber risk.</p><p>Drawing on real-world breach examples, audit insights, and cross-industry comparisons, Pauddar explains why organizations that treat compliance reactively often pay a steep price—financially, operationally, and reputationally. Dr. Chatterjee integrates his Commitment–Preparedness–Discipline (CPD) governance framework to demonstrate how leadership mindset, continuous audit readiness, and disciplined execution transform certifications from defensive necessities into engines of strategic value.</p><p>Together, they explore why leadership engagement—not regulatory pressure alone—determines compliance effectiveness, how audit culture can shift from adversarial to collaborative, and why proactive organizations outperform peers by embedding governance into everyday operations rather than scrambling after incidents occur.</p><h2>Time Stamps</h2><p>00:49 — Episode introduction and framing compliance as competitive firepower</p><p>02:22 — Podar’s professional background and global audit experience</p><p>05:01 — Real-world consequences of non-compliance</p><p>07:30 — Sector comparisons and leadership mindset gaps</p><p>09:36 — Global regulatory approaches to cybersecurity and AI</p><p>12:33 — Compliance overload and framework fatigue</p><p>14:56 — Why audits fail to drive change</p><p>16:10 — Shifting from adversarial to collaborative audits</p><p>18:17 — Leadership’s role in cybersecurity culture</p><p>21:44 — Proactive vs. reactive compliance models</p><p>23:54 — Leadership best practices for audit readiness</p><p>25:45 — CPD framework applied to certifications</p><p>29:37 — AI standards and proactive governance</p><p>34:24 — Human risk, awareness, and phishing realities</p><p>37:44 — Closing reflection</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-98-beyond-certification-turning-compliance-into-competitive-firepower/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-98-beyond-certification-turning-compliance-into-competitive-firepower/</a></p><p>Connect with Host Dr. Dave Chatterjee</p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” </a><em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank"> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” </a><em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” </a><em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” </a><em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank"> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” </a><em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Journal of Organizational Computing and Electronic Commerce, </a></em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” </a><em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Business Horizons, </a></em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this timely and hard-hitting episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/sandeep-pauddar/" rel="noopener noreferrer" target="_blank">Sandeep Pauddar</a>—an accomplished global auditor with over 30 years of experience—to challenge a deeply entrenched misconception: that cybersecurity certifications and compliance are merely regulatory checkboxes. Instead, the conversation reframes compliance as a strategic asset—one that can strengthen trust, resilience, and competitive positioning in an era defined by AI, global regulations, and escalating cyber risk.</p><p>Drawing on real-world breach examples, audit insights, and cross-industry comparisons, Pauddar explains why organizations that treat compliance reactively often pay a steep price—financially, operationally, and reputationally. Dr. Chatterjee integrates his Commitment–Preparedness–Discipline (CPD) governance framework to demonstrate how leadership mindset, continuous audit readiness, and disciplined execution transform certifications from defensive necessities into engines of strategic value.</p><p>Together, they explore why leadership engagement—not regulatory pressure alone—determines compliance effectiveness, how audit culture can shift from adversarial to collaborative, and why proactive organizations outperform peers by embedding governance into everyday operations rather than scrambling after incidents occur.</p><h2>Time Stamps</h2><p>00:49 — Episode introduction and framing compliance as competitive firepower</p><p>02:22 — Podar’s professional background and global audit experience</p><p>05:01 — Real-world consequences of non-compliance</p><p>07:30 — Sector comparisons and leadership mindset gaps</p><p>09:36 — Global regulatory approaches to cybersecurity and AI</p><p>12:33 — Compliance overload and framework fatigue</p><p>14:56 — Why audits fail to drive change</p><p>16:10 — Shifting from adversarial to collaborative audits</p><p>18:17 — Leadership’s role in cybersecurity culture</p><p>21:44 — Proactive vs. reactive compliance models</p><p>23:54 — Leadership best practices for audit readiness</p><p>25:45 — CPD framework applied to certifications</p><p>29:37 — AI standards and proactive governance</p><p>34:24 — Human risk, awareness, and phishing realities</p><p>37:44 — Closing reflection</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-98-beyond-certification-turning-compliance-into-competitive-firepower/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-98-beyond-certification-turning-compliance-into-competitive-firepower/</a></p><p>Connect with Host Dr. Dave Chatterjee</p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” </a><em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank"> Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. </a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,” </a><em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,” </a><em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">I by IMD</a></em><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">, September 28, 2022, Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,” </a><em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Business Horizons,</a></em><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank"> available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,” </a><em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Journal of Organizational Computing and Electronic Commerce, </a></em><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,” </a><em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Business Horizons, </a></em><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-98-beyond-certification-turning-compliance-into-competitive-firepower]]></link><guid isPermaLink="false">6fa54295-1bc2-4d1c-a44d-e1fc8af3d2c6</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 30 Dec 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/6fa54295-1bc2-4d1c-a44d-e1fc8af3d2c6.mp3" length="55715557" type="audio/mpeg"/><itunes:duration>38:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>98</itunes:episode><podcast:episode>98</podcast:episode></item><item><title>Episode 97 -- AI’s Missing Puzzle Piece — Why Information Readiness Determines AI Success</title><itunes:title>Episode 97 -- AI’s Missing Puzzle Piece — Why Information Readiness Determines AI Success</itunes:title><description><![CDATA[<p>In this insightful episode, Dr. Dave Chatterjee speaks with <a href="https://www.linkedin.com/in/gregoryclark/" rel="noopener noreferrer" target="_blank">Greg Clark—longtime enterprise content management and cybersecurity leader</a>—about a foundational but overlooked ingredient of AI success: <strong>information readiness</strong>. While organizations rush to implement artificial intelligence, many neglect the quality, governance, security, and contextual integrity of the data fueling these systems. As Clark notes, without clean, curated, and governed information, even the most advanced AI models will misfire—sometimes with damaging or legally significant consequences.</p><p>Together, they explore why “garbage in, garbage out” is more relevant than ever in the AI era, especially as enterprises confront fragmented data, weak metadata, inconsistent governance, and high regulatory scrutiny. Dr. Chatterjee weaves in his <strong>Commitment–Preparedness–Discipline (CPD)</strong> governance framework, demonstrating why information readiness must be treated as a <strong>strategic capability</strong>, not a technical afterthought. The conversation illuminates how trust, data integrity, and responsible model oversight are emerging as competitive differentiators in the age of GenAI and agentic AI.</p><p><strong>Time Stamps</strong></p><p>00:49 — Dave introduces Greg Clark</p><p>02:43 — Clark’s 20+ year journey</p><p>07:14 — Defining information readiness</p><p>08:32 — Importance of understanding data</p><p>09:58 — Data chaos and pitfalls</p><p>12:00 — Trust erosion</p><p>13:29 — Air Canada chatbot case</p><p>16:22 — Auditability and explainability</p><p>18:51 — CPD applied to AI governance</p><p>20:43 — Operational maturity</p><p>22:53 — JPMorgan’s Responsible AI Council</p><p>25:43 — Security as strategic capability</p><p>27:35 — Zero trust and data protection</p><p>30:32 — Mayo Clinic example</p><p>31:25 — Metrics for buy-in</p><p>32:50 — Destroy-your-business scenarios</p><p>34:21 — Trust-first culture</p><p>36:09 — Human-in-the-loop</p><p>37:20 — GDPR case</p><p>38:23 — Final reflections</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-97-ais-missing-puzzle-piece-why-information-readiness-determines-ai-success/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-97-ais-missing-puzzle-piece-why-information-readiness-determines-ai-success/</a></p><p>Connect with Host Dr. Dave Chatterjee </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this insightful episode, Dr. Dave Chatterjee speaks with <a href="https://www.linkedin.com/in/gregoryclark/" rel="noopener noreferrer" target="_blank">Greg Clark—longtime enterprise content management and cybersecurity leader</a>—about a foundational but overlooked ingredient of AI success: <strong>information readiness</strong>. While organizations rush to implement artificial intelligence, many neglect the quality, governance, security, and contextual integrity of the data fueling these systems. As Clark notes, without clean, curated, and governed information, even the most advanced AI models will misfire—sometimes with damaging or legally significant consequences.</p><p>Together, they explore why “garbage in, garbage out” is more relevant than ever in the AI era, especially as enterprises confront fragmented data, weak metadata, inconsistent governance, and high regulatory scrutiny. Dr. Chatterjee weaves in his <strong>Commitment–Preparedness–Discipline (CPD)</strong> governance framework, demonstrating why information readiness must be treated as a <strong>strategic capability</strong>, not a technical afterthought. The conversation illuminates how trust, data integrity, and responsible model oversight are emerging as competitive differentiators in the age of GenAI and agentic AI.</p><p><strong>Time Stamps</strong></p><p>00:49 — Dave introduces Greg Clark</p><p>02:43 — Clark’s 20+ year journey</p><p>07:14 — Defining information readiness</p><p>08:32 — Importance of understanding data</p><p>09:58 — Data chaos and pitfalls</p><p>12:00 — Trust erosion</p><p>13:29 — Air Canada chatbot case</p><p>16:22 — Auditability and explainability</p><p>18:51 — CPD applied to AI governance</p><p>20:43 — Operational maturity</p><p>22:53 — JPMorgan’s Responsible AI Council</p><p>25:43 — Security as strategic capability</p><p>27:35 — Zero trust and data protection</p><p>30:32 — Mayo Clinic example</p><p>31:25 — Metrics for buy-in</p><p>32:50 — Destroy-your-business scenarios</p><p>34:21 — Trust-first culture</p><p>36:09 — Human-in-the-loop</p><p>37:20 — GDPR case</p><p>38:23 — Final reflections</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-97-ais-missing-puzzle-piece-why-information-readiness-determines-ai-success/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-97-ais-missing-puzzle-piece-why-information-readiness-determines-ai-success/</a></p><p>Connect with Host Dr. Dave Chatterjee </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-97-ais-missing-puzzle-piece-why-information-readiness-determines-ai-success]]></link><guid isPermaLink="false">5267dfc5-215a-482d-bfbe-7b9eaf027392</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 16 Dec 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/5267dfc5-215a-482d-bfbe-7b9eaf027392.mp3" length="38122368" type="audio/mpeg"/><itunes:duration>39:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>97</itunes:episode><podcast:episode>97</podcast:episode></item><item><title>Episode 96 -- The Man Behind the Hollywood Movie Breach: Cyber Lessons from a Real FBI Ghost</title><itunes:title>Episode 96 -- The Man Behind the Hollywood Movie Breach: Cyber Lessons from a Real FBI Ghost</itunes:title><description><![CDATA[<p>In this riveting episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dave Chatterjee, Ph.D.</a>, sits down with <a href="https://www.linkedin.com/in/eric-m-oneill/" rel="noopener noreferrer" target="_blank">Eric O’Neill, a legendary FBI undercover operative</a> whose real-life spy hunt inspired the Hollywood thriller Breach. O’Neill recounts how he helped capture Robert Hanssen, one of the most damaging spies in U.S. history, and how the counterintelligence mindset he cultivated at the FBI now forms the foundation of his cybersecurity strategy work.</p><p>Together, they explore how spycraft translates to the digital age—from insider threats and virtual trusted insiders to AI-driven deception, deepfakes, and nation-state infiltration. Through real-world stories, hard-won lessons, and O’Neill’s PAID (Prepare–Assess–Investigate–Decide) methodology, listeners learn why thinking like a spy is essential for defending organizations, families, and individuals in a hyperconnected world. Dr. Chatterjee connects these insights to his Commitment–Preparedness–Discipline (CPD) framework, emphasizing the strategic value of leadership, culture, and proactive readiness.</p><p><strong>Time Stamps</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;00:49 — Dave introduces Eric O’Neill’s background and spycraft legacy.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;03:00 — How O’Neill became a top-secret FBI ghost operative.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;06:03 — What the movie Breach gets right—and wrong.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;11:22 — Inside the high-pressure undercover case against Hanssen.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;13:45 — The real “Kate,” mentorship, and managing undercover stress.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;17:11 — Hanssen’s true motivations: ego, greed, resentment.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;18:00 — Transition from FBI spyhunter to cybersecurity strategist.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;19:56 — How cybercriminals now target people—not systems.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;21:25 — Deepfakes, AI deception, and personal harm.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;24:26 — Nation-state tactics and why detection is still possible.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;27:53 — Spy vs. cybercriminal: same infiltration, different outcomes.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;31:23 — A national readiness gap: threats to critical infrastructure.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;33:40 — The PAID framework for organizational defense.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;36:17 — Cyber insurance as a forcing mechanism for readiness.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;38:20 — Leadership challenges and CISO empowerment.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;40:34 — Human behavior—the most important attack surface.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;44:03 — MFA fatigue, passwordless solutions, and practical tech fixes.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;47:10 — Tips for families dealing with deepfake scams.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;51:23 — Why verification matters more than ever.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;53:17 — Closing reflections on protecting society in a synthetic world.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-96-the-man-behind-the-hollywood-movie-breach-cyber-lessons-from-a-real-fbi-ghost/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-96-the-man-behind-the-hollywood-movie-breach-cyber-lessons-from-a-real-fbi-ghost/</a></p><p>Connect with Host Dr. Dave Chatterjee </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this riveting episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dave Chatterjee, Ph.D.</a>, sits down with <a href="https://www.linkedin.com/in/eric-m-oneill/" rel="noopener noreferrer" target="_blank">Eric O’Neill, a legendary FBI undercover operative</a> whose real-life spy hunt inspired the Hollywood thriller Breach. O’Neill recounts how he helped capture Robert Hanssen, one of the most damaging spies in U.S. history, and how the counterintelligence mindset he cultivated at the FBI now forms the foundation of his cybersecurity strategy work.</p><p>Together, they explore how spycraft translates to the digital age—from insider threats and virtual trusted insiders to AI-driven deception, deepfakes, and nation-state infiltration. Through real-world stories, hard-won lessons, and O’Neill’s PAID (Prepare–Assess–Investigate–Decide) methodology, listeners learn why thinking like a spy is essential for defending organizations, families, and individuals in a hyperconnected world. Dr. Chatterjee connects these insights to his Commitment–Preparedness–Discipline (CPD) framework, emphasizing the strategic value of leadership, culture, and proactive readiness.</p><p><strong>Time Stamps</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;00:49 — Dave introduces Eric O’Neill’s background and spycraft legacy.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;03:00 — How O’Neill became a top-secret FBI ghost operative.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;06:03 — What the movie Breach gets right—and wrong.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;11:22 — Inside the high-pressure undercover case against Hanssen.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;13:45 — The real “Kate,” mentorship, and managing undercover stress.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;17:11 — Hanssen’s true motivations: ego, greed, resentment.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;18:00 — Transition from FBI spyhunter to cybersecurity strategist.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;19:56 — How cybercriminals now target people—not systems.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;21:25 — Deepfakes, AI deception, and personal harm.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;24:26 — Nation-state tactics and why detection is still possible.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;27:53 — Spy vs. cybercriminal: same infiltration, different outcomes.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;31:23 — A national readiness gap: threats to critical infrastructure.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;33:40 — The PAID framework for organizational defense.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;36:17 — Cyber insurance as a forcing mechanism for readiness.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;38:20 — Leadership challenges and CISO empowerment.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;40:34 — Human behavior—the most important attack surface.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;44:03 — MFA fatigue, passwordless solutions, and practical tech fixes.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;47:10 — Tips for families dealing with deepfake scams.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;51:23 — Why verification matters more than ever.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;53:17 — Closing reflections on protecting society in a synthetic world.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-96-the-man-behind-the-hollywood-movie-breach-cyber-lessons-from-a-real-fbi-ghost/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-96-the-man-behind-the-hollywood-movie-breach-cyber-lessons-from-a-real-fbi-ghost/</a></p><p>Connect with Host Dr. Dave Chatterjee </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-96-thinking-like-a-spycounterintelligence-lessons-for-cybersecurity-readiness]]></link><guid isPermaLink="false">8c8cd554-d3a4-4c9b-8d35-649983e1ee89</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 01 Dec 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/8c8cd554-d3a4-4c9b-8d35-649983e1ee89.mp3" length="74989093" type="audio/mpeg"/><itunes:duration>52:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>96</itunes:episode><podcast:episode>96</podcast:episode></item><item><title>Episode 95 -- Defending Digital Trust – Battling the Deepfake Surge with AI-Powered Detection</title><itunes:title>Episode 95 -- Defending Digital Trust – Battling the Deepfake Surge with AI-Powered Detection</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dave Chatterjee, Ph.D. </a>sits down with <a href="https://www.linkedin.com/in/sandwedg/" rel="noopener noreferrer" target="_blank">Sandy Kronenberg, Founder and CEO of Netarx</a>, an AI-driven platform designed to detect and prevent synthetic impersonation across video, voice, and email. With deepfake fraud incidents skyrocketing by 3,000 percent and costing organizations an average of $500,000 per attack, Kronenberg and Chatterjee unpack how AI can now help defeat AI—turning defense innovation into a frontline imperative.</p><p>Together, they explore the evolution of deepfake technology, the psychology of digital deception, and how organizations can safeguard their people and data from real-time manipulation. Through the Commitment–Preparedness–Discipline (CPD) framework, Dr. Chatterjee emphasizes the importance of leadership discipline, continuous monitoring, and technology integration in establishing a high-performance cybersecurity culture in the era of generative AI threats.</p><p><strong>Time Stamps</strong></p><p>• 00:49 — Dave introduces the topic and deepfake threat surge.</p><p>• 02:37 — Sandy shares his professional journey and early exposure to cyber fraud.</p><p>• 07:28 — Discussion on the human layer and OSI model limitations.</p><p>• 09:55 — Integrating deepfake detection within enterprise security architecture.</p><p>• 13:01 — How AI models ingest 50+ signals for real-time identity validation.</p><p>• 17:48 — Zoom and video call trust issues in remote business settings.</p><p>• 19:40 — Why siloed tools fail—importance of cross-channel correlation.</p><p>• 23:30 — Continuous learning loops: retraining AI models against new deepfake generators.</p><p>• 26:59 — The rise of Trust Officers and Trust Operations in corporate governance.</p><p>• 32:15 — HR, finance, and brand use cases for disinformation security.</p><p>• 35:18 — Balancing training and AI automation.</p><p>• 37:16 — Expanding defense to email and multimodal verification.</p><p>• 41:18 — Closing takeaways on readiness and adoption strategy.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> - <a href="https://www.dchatte.com/episode-95-defending-digital-trust-battling-the-deepfake-surge-with-ai-powered-detection/" rel="noopener noreferrer" target="_blank">﻿﻿https://www.dchatte.com/episode-95-defending-digital-trust-battling-the-deepfake-surge-with-ai-powered-detection/</a></p><p><strong>Connect with Host Dr. Dave Chatterjee </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dave Chatterjee, Ph.D. </a>sits down with <a href="https://www.linkedin.com/in/sandwedg/" rel="noopener noreferrer" target="_blank">Sandy Kronenberg, Founder and CEO of Netarx</a>, an AI-driven platform designed to detect and prevent synthetic impersonation across video, voice, and email. With deepfake fraud incidents skyrocketing by 3,000 percent and costing organizations an average of $500,000 per attack, Kronenberg and Chatterjee unpack how AI can now help defeat AI—turning defense innovation into a frontline imperative.</p><p>Together, they explore the evolution of deepfake technology, the psychology of digital deception, and how organizations can safeguard their people and data from real-time manipulation. Through the Commitment–Preparedness–Discipline (CPD) framework, Dr. Chatterjee emphasizes the importance of leadership discipline, continuous monitoring, and technology integration in establishing a high-performance cybersecurity culture in the era of generative AI threats.</p><p><strong>Time Stamps</strong></p><p>• 00:49 — Dave introduces the topic and deepfake threat surge.</p><p>• 02:37 — Sandy shares his professional journey and early exposure to cyber fraud.</p><p>• 07:28 — Discussion on the human layer and OSI model limitations.</p><p>• 09:55 — Integrating deepfake detection within enterprise security architecture.</p><p>• 13:01 — How AI models ingest 50+ signals for real-time identity validation.</p><p>• 17:48 — Zoom and video call trust issues in remote business settings.</p><p>• 19:40 — Why siloed tools fail—importance of cross-channel correlation.</p><p>• 23:30 — Continuous learning loops: retraining AI models against new deepfake generators.</p><p>• 26:59 — The rise of Trust Officers and Trust Operations in corporate governance.</p><p>• 32:15 — HR, finance, and brand use cases for disinformation security.</p><p>• 35:18 — Balancing training and AI automation.</p><p>• 37:16 — Expanding defense to email and multimodal verification.</p><p>• 41:18 — Closing takeaways on readiness and adoption strategy.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> - <a href="https://www.dchatte.com/episode-95-defending-digital-trust-battling-the-deepfake-surge-with-ai-powered-detection/" rel="noopener noreferrer" target="_blank">﻿﻿https://www.dchatte.com/episode-95-defending-digital-trust-battling-the-deepfake-surge-with-ai-powered-detection/</a></p><p><strong>Connect with Host Dr. Dave Chatterjee </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-95-defending-digital-trust-battling-the-deepfake-surge-with-ai-powered-detection]]></link><guid isPermaLink="false">00aa4466-78b3-467e-800e-fbf79a510dcc</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 19 Nov 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/00aa4466-78b3-467e-800e-fbf79a510dcc.mp3" length="63280633" type="audio/mpeg"/><itunes:duration>43:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>95</itunes:episode><podcast:episode>95</podcast:episode></item><item><title>Guardians of Trust: The CISO’s Strategic Role in Global Non-Profits</title><itunes:title>Guardians of Trust: The CISO’s Strategic Role in Global Non-Profits</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>sits down with <a href="https://www.linkedin.com/in/pam-lindemoen/" rel="noopener noreferrer" target="_blank">Pam Lindemoen</a>, Chief Security Officer and Vice President of Strategy at the Retail &amp; Hospitality Information Sharing and Analysis Center (RH-ISAC), to explore the CISO’s evolving role in global nonprofit organizations. Moving beyond traditional corporate metrics of cost and compliance, Lindemoen reveals how cybersecurity leadership in the nonprofit sector is ultimately about preserving trust, protecting donor data, and sustaining mission-driven operations. Drawing on three decades of experience across healthcare, finance, and retail, Lindemoen shares how RH-ISAC has become a collaborative force multiplier, enabling member companies to detect, respond, and adapt collectively to cyber threats. Through the Commitment–Preparedness–Discipline (CPD) framework, Dr. Chatterjee and Lindemoen illustrate how leadership, empathy, and shared intelligence drive resilience across the nonprofit ecosystem.</p><p><strong>Time Stamps</strong></p><p>• 00:49 — Dave introduces the topic and Pam Lindemoen’s professional journey.</p><p>• 02:49 — Career reflections: from IT foundations to cybersecurity leadership.</p><p>• 04:23 — Inside RH-ISAC: a trusted model for cross-industry collaboration.</p><p>• 07:06 — Navigating dual responsibilities—defending RH-ISAC and empowering members.</p><p>• 09:09 — Governance, trust, and relationship management in a global community.</p><p>• 12:27 — RH-ISAC’s differentiation and member-driven value.</p><p>• 14:00 — Leadership through listening and connection.</p><p>• 20:50 — Advice for CISOs exploring nonprofit leadership paths.</p><p>• 24:26 — Real-world example: supply chain attack mitigation through shared intelligence.</p><p>• 27:55 — Final reflections on collective trust, collaboration, and resilience.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> - https://www.dchatte.com/episode-94-guardians-of-trust-the-cisos-strategic-role-in-global-non-profits/</p><p>﻿﻿</p><p><strong>Connect with Host Dr. Dave Chatterjee </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>sits down with <a href="https://www.linkedin.com/in/pam-lindemoen/" rel="noopener noreferrer" target="_blank">Pam Lindemoen</a>, Chief Security Officer and Vice President of Strategy at the Retail &amp; Hospitality Information Sharing and Analysis Center (RH-ISAC), to explore the CISO’s evolving role in global nonprofit organizations. Moving beyond traditional corporate metrics of cost and compliance, Lindemoen reveals how cybersecurity leadership in the nonprofit sector is ultimately about preserving trust, protecting donor data, and sustaining mission-driven operations. Drawing on three decades of experience across healthcare, finance, and retail, Lindemoen shares how RH-ISAC has become a collaborative force multiplier, enabling member companies to detect, respond, and adapt collectively to cyber threats. Through the Commitment–Preparedness–Discipline (CPD) framework, Dr. Chatterjee and Lindemoen illustrate how leadership, empathy, and shared intelligence drive resilience across the nonprofit ecosystem.</p><p><strong>Time Stamps</strong></p><p>• 00:49 — Dave introduces the topic and Pam Lindemoen’s professional journey.</p><p>• 02:49 — Career reflections: from IT foundations to cybersecurity leadership.</p><p>• 04:23 — Inside RH-ISAC: a trusted model for cross-industry collaboration.</p><p>• 07:06 — Navigating dual responsibilities—defending RH-ISAC and empowering members.</p><p>• 09:09 — Governance, trust, and relationship management in a global community.</p><p>• 12:27 — RH-ISAC’s differentiation and member-driven value.</p><p>• 14:00 — Leadership through listening and connection.</p><p>• 20:50 — Advice for CISOs exploring nonprofit leadership paths.</p><p>• 24:26 — Real-world example: supply chain attack mitigation through shared intelligence.</p><p>• 27:55 — Final reflections on collective trust, collaboration, and resilience.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> - https://www.dchatte.com/episode-94-guardians-of-trust-the-cisos-strategic-role-in-global-non-profits/</p><p>﻿﻿</p><p><strong>Connect with Host Dr. Dave Chatterjee </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/guardians-of-trust-the-cisos-strategic-role-in-global-non-profits]]></link><guid isPermaLink="false">d1486493-32a6-4b2d-aa18-f5e8f24f3990</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 04 Nov 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/d1486493-32a6-4b2d-aa18-f5e8f24f3990.mp3" length="43060837" type="audio/mpeg"/><itunes:duration>29:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>94</itunes:episode><podcast:episode>94</podcast:episode></item><item><title>Episode 93 -- The New Browser Wars: Why the Enterprise Browser Has Become Cybersecurity’s Next Battleground</title><itunes:title>Episode 93 -- The New Browser Wars: Why the Enterprise Browser Has Become Cybersecurity’s Next Battleground</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/anupamupadhyaya/" rel="noopener noreferrer" target="_blank">Anupam Upadhyay</a>, Senior Vice President, Product Management, Palo Alto Networks, a seasoned product and cybersecurity leader, to unpack the “new browser wars” and why enterprise browsers are fast becoming a core battleground in the fight for digital trust. Drawing on over two decades of experience spanning Cisco, startups, and Palo Alto, Upadhyay traces the evolution of the humble browser from a passive content viewer into the primary interface for cloud applications, collaboration tools, and sensitive business data.</p><p>The conversation examines the browser’s expanding role as both a productivity hub and a primary attack vector—accounting for over 90 percent of initial intrusions via phishing, malicious extensions, or session hijacking. Through the lens of the Commitment-Preparedness-Discipline (CPD) Framework, Dr. Chatterjee and Anupam Upadhyay emphasize that securing the enterprise browser is not merely a technical exercise but a governance imperative: leadership commitment to zero-trust principles, preparedness through hardened configurations and employee training, and disciplined enforcement of consistent controls across devices and partners.</p><p><strong>Time Stamps</strong></p><p>• 00:49 — Dave’s introduction and guest overview.</p><p>• 03:00 — Anupam Upadhyay’s career journey and reinvention at Palo Alto Networks.</p><p>• 05:00 — Historical context: how browsers stayed outside the security spotlight.</p><p>• 08:40 — Cloud and SaaS migration shifting business to the browser.</p><p>• 11:20 — Emerging browser threats and data sanctity concerns.</p><p>• 14:30 — Malicious extensions and the limits of traditional EDR.</p><p>• 16:07 — Browser security as part of Zero Trust architecture.</p><p>• 18:30 — Balancing security and user experience.</p><p>• 22:10 — Operating in hostile environments and credential revocation.</p><p>• 25:00 — Dr. Chatterjee introduces the CPD framework for governance.</p><p>• 28:45 — Implementation and user adoption challenges.</p><p>• 30:00 — Continuous testing and discipline in browser security.</p><p>• 33:05 — Closing takeaways on Zero Trust mindset and defense-in-depth.</p><p><strong>Podcast summary with discussion highlights</strong>&nbsp;- <a href="https://www.dchatte.com/episode-93-the-new-browser-wars-why-the-enterprise-browser-has-become-cybersecuritys-next-battleground/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-93-the-new-browser-wars-why-the-enterprise-browser-has-become-cybersecuritys-next-battleground/</a></p><p>﻿﻿Connect with Host Dr. Dave Chatterjee </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/anupamupadhyaya/" rel="noopener noreferrer" target="_blank">Anupam Upadhyay</a>, Senior Vice President, Product Management, Palo Alto Networks, a seasoned product and cybersecurity leader, to unpack the “new browser wars” and why enterprise browsers are fast becoming a core battleground in the fight for digital trust. Drawing on over two decades of experience spanning Cisco, startups, and Palo Alto, Upadhyay traces the evolution of the humble browser from a passive content viewer into the primary interface for cloud applications, collaboration tools, and sensitive business data.</p><p>The conversation examines the browser’s expanding role as both a productivity hub and a primary attack vector—accounting for over 90 percent of initial intrusions via phishing, malicious extensions, or session hijacking. Through the lens of the Commitment-Preparedness-Discipline (CPD) Framework, Dr. Chatterjee and Anupam Upadhyay emphasize that securing the enterprise browser is not merely a technical exercise but a governance imperative: leadership commitment to zero-trust principles, preparedness through hardened configurations and employee training, and disciplined enforcement of consistent controls across devices and partners.</p><p><strong>Time Stamps</strong></p><p>• 00:49 — Dave’s introduction and guest overview.</p><p>• 03:00 — Anupam Upadhyay’s career journey and reinvention at Palo Alto Networks.</p><p>• 05:00 — Historical context: how browsers stayed outside the security spotlight.</p><p>• 08:40 — Cloud and SaaS migration shifting business to the browser.</p><p>• 11:20 — Emerging browser threats and data sanctity concerns.</p><p>• 14:30 — Malicious extensions and the limits of traditional EDR.</p><p>• 16:07 — Browser security as part of Zero Trust architecture.</p><p>• 18:30 — Balancing security and user experience.</p><p>• 22:10 — Operating in hostile environments and credential revocation.</p><p>• 25:00 — Dr. Chatterjee introduces the CPD framework for governance.</p><p>• 28:45 — Implementation and user adoption challenges.</p><p>• 30:00 — Continuous testing and discipline in browser security.</p><p>• 33:05 — Closing takeaways on Zero Trust mindset and defense-in-depth.</p><p><strong>Podcast summary with discussion highlights</strong>&nbsp;- <a href="https://www.dchatte.com/episode-93-the-new-browser-wars-why-the-enterprise-browser-has-become-cybersecuritys-next-battleground/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-93-the-new-browser-wars-why-the-enterprise-browser-has-become-cybersecuritys-next-battleground/</a></p><p>﻿﻿Connect with Host Dr. Dave Chatterjee </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Books Published</p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p>Articles Published</p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-93-the-new-browser-wars-why-the-enterprise-browser-has-become-cybersecuritys-next-battleground]]></link><guid isPermaLink="false">6f197a31-5b0e-4fa1-9e8d-4c093ed15729</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Sun, 19 Oct 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/6f197a31-5b0e-4fa1-9e8d-4c093ed15729.mp3" length="49036275" type="audio/mpeg"/><itunes:duration>34:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>93</itunes:episode><podcast:episode>93</podcast:episode></item><item><title>The AI Augmented SOC: Balancing Technology, Talent, and Trust</title><itunes:title>The AI Augmented SOC: Balancing Technology, Talent, and Trust</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/will-ledesma/" rel="noopener noreferrer" target="_blank">Will Ledesma, Director of MDR Cybersecurity Operations&nbsp;at Adlumin</a>, a veteran SOC leader and cyber defender with over two decades of experience in enterprise security and the U.S. Air Force Reserves. Ledesma shares his journey from IT systems administration to frontline cyber defense, and offers hard-earned insights into the realities of Security Operations Centers (SOCs) in the age of artificial intelligence.</p><p>The conversation explores how AI is transforming SOC effectiveness—from triaging millions of processes in seconds to surfacing hidden indicators of compromise. But the central message is clear: AI must serve as an enabler, not a replacement, for human judgment. Drawing on the CPD framework, the discussion highlights that the future SOC is founded on leadership commitment to responsible adoption, preparedness through data pipelines and training, and disciplined guardrails to maintain AI within safe operational boundaries.</p><p><strong>﻿Time Stamps</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;00:48 — Dave’s setup: AI’s impact on SOC operations and burnout.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;02:22 — Will’s origin story and pivot into cybersecurity.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;05:56 — “Augment the human”: keeping people in the loop.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;08:40 — Beyond enrichment: faster intel + compiled investigations.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;11:20 — Human governance and control of agentic AI.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;13:30 — Auto‑remediation tools: potential and limits.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;17:15 — Incident case: 10 IOCs in 60 min vs. 13 in ~10 sec with AI.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;21:40 — Scaling to millions of processes → four prioritized leads.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;22:34 — KPIs: AI handling ~70% of detections; QA and MT* metrics.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;26:52 — Platform vs. best‑of‑breed: avoid single failure domains.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;28:29 — Outsourcing SOC: costs, vendor selection, oversight.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;34:19 — CPD framework applied to AI in the SOC.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-92-the-ai-augmented-soc-balancing-technology-talent-and-trust/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-92-the-ai-augmented-soc-balancing-technology-talent-and-trust/</a></p><p><strong>﻿﻿Connect with Host Dr. Dave Chatterjee </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/will-ledesma/" rel="noopener noreferrer" target="_blank">Will Ledesma, Director of MDR Cybersecurity Operations&nbsp;at Adlumin</a>, a veteran SOC leader and cyber defender with over two decades of experience in enterprise security and the U.S. Air Force Reserves. Ledesma shares his journey from IT systems administration to frontline cyber defense, and offers hard-earned insights into the realities of Security Operations Centers (SOCs) in the age of artificial intelligence.</p><p>The conversation explores how AI is transforming SOC effectiveness—from triaging millions of processes in seconds to surfacing hidden indicators of compromise. But the central message is clear: AI must serve as an enabler, not a replacement, for human judgment. Drawing on the CPD framework, the discussion highlights that the future SOC is founded on leadership commitment to responsible adoption, preparedness through data pipelines and training, and disciplined guardrails to maintain AI within safe operational boundaries.</p><p><strong>﻿Time Stamps</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;00:48 — Dave’s setup: AI’s impact on SOC operations and burnout.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;02:22 — Will’s origin story and pivot into cybersecurity.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;05:56 — “Augment the human”: keeping people in the loop.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;08:40 — Beyond enrichment: faster intel + compiled investigations.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;11:20 — Human governance and control of agentic AI.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;13:30 — Auto‑remediation tools: potential and limits.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;17:15 — Incident case: 10 IOCs in 60 min vs. 13 in ~10 sec with AI.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;21:40 — Scaling to millions of processes → four prioritized leads.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;22:34 — KPIs: AI handling ~70% of detections; QA and MT* metrics.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;26:52 — Platform vs. best‑of‑breed: avoid single failure domains.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;28:29 — Outsourcing SOC: costs, vendor selection, oversight.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;34:19 — CPD framework applied to AI in the SOC.</p><p>To access and download the entire podcast summary with discussion highlights - <a href="https://www.dchatte.com/episode-92-the-ai-augmented-soc-balancing-technology-talent-and-trust/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-92-the-ai-augmented-soc-balancing-technology-talent-and-trust/</a></p><p><strong>﻿﻿Connect with Host Dr. Dave Chatterjee </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/the-augmented-analyst-inside-the-soc-of-the-future-today]]></link><guid isPermaLink="false">341e820f-493c-4578-9b9a-fb6b864f43e1</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 08 Oct 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/341e820f-493c-4578-9b9a-fb6b864f43e1.mp3" length="38524800" type="audio/mpeg"/><itunes:duration>40:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>92</itunes:episode><podcast:episode>92</podcast:episode></item><item><title>Leading Under Fire: Legal and Leadership Lessons from Cyber Crises</title><itunes:title>Leading Under Fire: Legal and Leadership Lessons from Cyber Crises</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/jnc2000/" rel="noopener noreferrer" target="_blank">Josh Cook</a>, a seasoned cybersecurity and privacy attorney who has guided multinational corporations and mid-sized businesses through high-stakes cyber crises. Drawing on his experience as the first Global Cyber Counsel for a Fortune Global 500 company, Cook shares how he built a global cyber legal function from scratch and why legal teams must be engaged long before an incident occurs.</p><p>Together, they explore the human, organizational, and legal dynamics of crisis leadership: from building attorney-client privilege into preparation, to developing muscle memory through tabletop exercises, to ensuring the C-suite speaks with one unified voice when every second counts. Anchored in Dr. Chatterjee’s <strong>Commitment–Preparedness–Discipline (CPD) framework</strong>, the discussion underscores how legal, leadership, and security functions must converge to preserve trust and resilience in the face of relentless cyber threats.</p><p><strong>Time Stamps</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>00:49</strong> — Introduction to Josh Cook and his career journey</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>02:43</strong> — Building the global cyber legal function</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>06:18</strong> — Why legal must be engaged early in cyber strategy</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>09:10</strong> — Prepared vs. unprepared organizations and the “B-OODA loop”</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>10:58</strong> — Dr. Chatterjee introduces the CPD framework in crisis leadership</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>14:30</strong> — Leadership commitment and the ROI of prevention</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>17:11</strong> — Tabletop exercises and developing organizational muscle memory</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>19:45</strong> — Crisis leadership styles and their impact on teams</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>21:55</strong> — Cybersecurity as strategic enabler and trust foundation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>27:03</strong> — Preparing for the <em>next</em> attack, not the last one</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>29:45</strong> — Common crisis weakness: fractured C-suite response</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>33:58</strong> — Unified communication and trust building</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>38:02</strong> — Clear, simple, consistent crisis communications</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>41:17</strong> — The importance of genuine care for stakeholders</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>43:08</strong> — Josh Cook’s closing reflections: cyber crises are business problems rooted in people</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-91-leading-under-fire-legal-and-leadership-lessons-from-cyber-crises/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-91-leading-under-fire-legal-and-leadership-lessons-from-cyber-crises/</a></p><p><strong>Connect with Host Dr. Dave Chatterjee </strong></p><p><strong>LinkedIn</strong>: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p><strong>Website</strong>: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/jnc2000/" rel="noopener noreferrer" target="_blank">Josh Cook</a>, a seasoned cybersecurity and privacy attorney who has guided multinational corporations and mid-sized businesses through high-stakes cyber crises. Drawing on his experience as the first Global Cyber Counsel for a Fortune Global 500 company, Cook shares how he built a global cyber legal function from scratch and why legal teams must be engaged long before an incident occurs.</p><p>Together, they explore the human, organizational, and legal dynamics of crisis leadership: from building attorney-client privilege into preparation, to developing muscle memory through tabletop exercises, to ensuring the C-suite speaks with one unified voice when every second counts. Anchored in Dr. Chatterjee’s <strong>Commitment–Preparedness–Discipline (CPD) framework</strong>, the discussion underscores how legal, leadership, and security functions must converge to preserve trust and resilience in the face of relentless cyber threats.</p><p><strong>Time Stamps</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>00:49</strong> — Introduction to Josh Cook and his career journey</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>02:43</strong> — Building the global cyber legal function</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>06:18</strong> — Why legal must be engaged early in cyber strategy</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>09:10</strong> — Prepared vs. unprepared organizations and the “B-OODA loop”</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>10:58</strong> — Dr. Chatterjee introduces the CPD framework in crisis leadership</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>14:30</strong> — Leadership commitment and the ROI of prevention</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>17:11</strong> — Tabletop exercises and developing organizational muscle memory</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>19:45</strong> — Crisis leadership styles and their impact on teams</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>21:55</strong> — Cybersecurity as strategic enabler and trust foundation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>27:03</strong> — Preparing for the <em>next</em> attack, not the last one</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>29:45</strong> — Common crisis weakness: fractured C-suite response</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>33:58</strong> — Unified communication and trust building</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>38:02</strong> — Clear, simple, consistent crisis communications</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>41:17</strong> — The importance of genuine care for stakeholders</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>43:08</strong> — Josh Cook’s closing reflections: cyber crises are business problems rooted in people</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-91-leading-under-fire-legal-and-leadership-lessons-from-cyber-crises/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-91-leading-under-fire-legal-and-leadership-lessons-from-cyber-crises/</a></p><p><strong>Connect with Host Dr. Dave Chatterjee </strong></p><p><strong>LinkedIn</strong>: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p><strong>Website</strong>: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Books Published</strong></p><p><a href="https://www.amazon.com/dp/1966481705" rel="noopener noreferrer" target="_blank">The DeepFake Conspiracy</a></p><p><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: A Holistic and High-Performance Approach</a></p><p><strong>Articles Published</strong></p><p><a href="https://www.iveypublishing.ca/s/product/trusona-recruiting-for-the-hacker-mindset/01tOF000009tqwsYAA" rel="noopener noreferrer" target="_blank">Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2024/11/Ignorance-is-Not-Bliss-Article_Pre-Proof-Version_Oct-29-2024-1.pdf" rel="noopener noreferrer" target="_blank">Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,”&nbsp;<em>Business Horizons,</em>&nbsp;Accepted on Oct 29, 2024.</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024.&nbsp;</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2023). “Mission critical – How American Cancer Society successfully and securely migrated to the cloud amid the pandemic,”&nbsp;<em>I by IMD</em>, March 13, 2023.</a></p><p><a href="https://iby.imd.org/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Preventing security breaches must start at the top,”&nbsp;<em>I by IMD</em>, September 28, 2022,&nbsp;Institute for Management Development, Lausanne, Switzerland</a></p><p><a href="https://www.netspi.com/blog/executive/security-industry-trends/making-cybersecurity-readiness-mainstream/" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2022). “Making Cybersecurity Readiness Mainstream,” Executive Blog Post, NETSPI, March 1, 2022</a></p><p><a href="https://www.sciencedirect.com/science/article/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Benz, M. and Chatterjee, D. (2020). “Calculated Risk? A Cybersecurity Evaluation Tool for SMEs,”&nbsp;<em>Business Horizons,</em>&nbsp;available online from May 4, 2020</a></p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10919392.2019.1568713" rel="noopener noreferrer" target="_blank">Chatterjee, D. (2019). “Should Executives Go To Jail Over Cyber Attacks,”&nbsp;<em>Journal of Organizational Computing and Electronic Commerce,&nbsp;</em>Vol 29, Issue 1, pp. 1-3.</a></p><p><a href="https://hbsp.harvard.edu/product/BH994-PDF-ENG?Ntt=&amp;itemFindingMethod=Recommendation&amp;recommendedBy=IN1332-PDF-ENG" rel="noopener noreferrer" target="_blank">Abraham, C., Chatterjee, D., and Sims, R. (2019). “Muddling through cybersecurity: Insights from the U.S. healthcare industry,”&nbsp;<em>Business Horizons,&nbsp;</em>July 2019.</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/leading-under-fire-legal-and-leadership-lessons-from-cyber-crises]]></link><guid isPermaLink="false">6d33fa46-2b25-4633-945c-671b052d87f8</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 23 Sep 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/6d33fa46-2b25-4633-945c-671b052d87f8.mp3" length="64944229" type="audio/mpeg"/><itunes:duration>45:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>91</itunes:episode><podcast:episode>91</podcast:episode></item><item><title>AI vs. AI: Automating Defense to Outpace Automated Attacks</title><itunes:title>AI vs. AI: Automating Defense to Outpace Automated Attacks</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/roicohen/" rel="noopener noreferrer" target="_blank">Roi Cohen, CEO and Co-Founder of Vicarius</a>, about the urgent need to counter AI-driven attacks with equally automated defenses. Cohen, who began his career managing mission-critical systems in the military, shares his journey through leadership roles at CyberArk and the launch of Vicarius. Drawing from real-world penetration tests at hospitals and Ivy League institutions, he illustrates how attackers exploit simple misconfigurations to access sensitive data. Together, they examine why defenders must move beyond manual, ticket-based remediation to keep pace with adversaries leveraging agentic AI.</p><p>The conversation highlights that automation, while essential, is insufficient without human oversight and governance discipline. Anchored in Dr. Chatterjee’s Commitment–Preparedness–Discipline (CPD) framework, the discussion highlights the organizational mindsets and technological building blocks needed to sustain resilience. Cohen emphasizes the hybrid future of AI and human collaboration, where transparent reasoning and flexible control are vital for trust.</p><p>To access and download the entire podcast summary with discussion highlights -<a href="https://www.dchatte.com/episode-90-ai-vs-ai-automating-defense-to-outpace-automated-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-90-ai-vs-ai-automating-defense-to-outpace-automated-attacks/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿﻿<strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> speaks with <a href="https://www.linkedin.com/in/roicohen/" rel="noopener noreferrer" target="_blank">Roi Cohen, CEO and Co-Founder of Vicarius</a>, about the urgent need to counter AI-driven attacks with equally automated defenses. Cohen, who began his career managing mission-critical systems in the military, shares his journey through leadership roles at CyberArk and the launch of Vicarius. Drawing from real-world penetration tests at hospitals and Ivy League institutions, he illustrates how attackers exploit simple misconfigurations to access sensitive data. Together, they examine why defenders must move beyond manual, ticket-based remediation to keep pace with adversaries leveraging agentic AI.</p><p>The conversation highlights that automation, while essential, is insufficient without human oversight and governance discipline. Anchored in Dr. Chatterjee’s Commitment–Preparedness–Discipline (CPD) framework, the discussion highlights the organizational mindsets and technological building blocks needed to sustain resilience. Cohen emphasizes the hybrid future of AI and human collaboration, where transparent reasoning and flexible control are vital for trust.</p><p>To access and download the entire podcast summary with discussion highlights -<a href="https://www.dchatte.com/episode-90-ai-vs-ai-automating-defense-to-outpace-automated-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-90-ai-vs-ai-automating-defense-to-outpace-automated-attacks/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿﻿<strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/ai-vs-ai-automating-defense-to-outpace-automated-attacks]]></link><guid isPermaLink="false">c3bb3c68-f169-4d08-b44b-1bff5c87a873</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 08 Sep 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/c3bb3c68-f169-4d08-b44b-1bff5c87a873.mp3" length="38970240" type="audio/mpeg"/><itunes:duration>40:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>90</itunes:episode><podcast:episode>90</podcast:episode></item><item><title>Beyond Passwords: Making Identity-Based Attacks Impossible in the Age of AI</title><itunes:title>Beyond Passwords: Making Identity-Based Attacks Impossible in the Age of AI</itunes:title><description><![CDATA[<p>In this episode, <a href="https://dchatte.com" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>sits down with <a href="https://www.linkedin.com/in/jassoncasey/" rel="noopener noreferrer" target="_blank">Jasson Casey, CEO &amp; Co-Founder @ Beyond Identity</a>, to dissect the growing threat of identity-based attacks, which now account for nearly 80% of breaches. Casey explains how adversaries increasingly “log in” instead of breaking in, leveraging techniques such as MFA fatigue, session hijacking, and phishing kits. He shares lessons from his professional journey—ranging from building telco networks to advising the U.S. Government and launching Beyond Identity—and explains how his team's identity defense solution eliminates&nbsp;root causes of credential theft while reducing SOC workloads. The discussion also addresses why traditional human training cannot withstand adversaries armed with deepfakes and agentic AI, underscoring the need for technology to carry the defensive burden. Together, Chatterjee and Casey explore the double-edged role of AI, strategies for phased deployments (“ring deployments”), and the importance of embedding identity defense into board-level governance through the Commitment–Preparedness–Discipline (CPD) framework.</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-89-beyond-passwords-making-identity-based-attacks-impossible-in-the-age-of-ai-2/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-89-beyond-passwords-making-identity-based-attacks-impossible-in-the-age-of-ai-2/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://dchatte.com" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>sits down with <a href="https://www.linkedin.com/in/jassoncasey/" rel="noopener noreferrer" target="_blank">Jasson Casey, CEO &amp; Co-Founder @ Beyond Identity</a>, to dissect the growing threat of identity-based attacks, which now account for nearly 80% of breaches. Casey explains how adversaries increasingly “log in” instead of breaking in, leveraging techniques such as MFA fatigue, session hijacking, and phishing kits. He shares lessons from his professional journey—ranging from building telco networks to advising the U.S. Government and launching Beyond Identity—and explains how his team's identity defense solution eliminates&nbsp;root causes of credential theft while reducing SOC workloads. The discussion also addresses why traditional human training cannot withstand adversaries armed with deepfakes and agentic AI, underscoring the need for technology to carry the defensive burden. Together, Chatterjee and Casey explore the double-edged role of AI, strategies for phased deployments (“ring deployments”), and the importance of embedding identity defense into board-level governance through the Commitment–Preparedness–Discipline (CPD) framework.</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-89-beyond-passwords-making-identity-based-attacks-impossible-in-the-age-of-ai-2/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-89-beyond-passwords-making-identity-based-attacks-impossible-in-the-age-of-ai-2/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/beyond-passwords-making-identity-based-attacks-impossible-in-the-age-of-ai]]></link><guid isPermaLink="false">6a5c75aa-cd60-4e5d-b83a-50fb629ced32</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 26 Aug 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/6a5c75aa-cd60-4e5d-b83a-50fb629ced32.mp3" length="34520448" type="audio/mpeg"/><itunes:duration>35:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>89</itunes:episode><podcast:episode>89</podcast:episode></item><item><title>Closing the Remediation Gap with Agentic AI</title><itunes:title>Closing the Remediation Gap with Agentic AI</itunes:title><description><![CDATA[<p>In this compelling episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> engages with <a href="https://www.linkedin.com/in/john-amaral-a359241/" rel="noopener noreferrer" target="_blank">John Amaral</a>, a serial entrepreneur and cybersecurity innovator, to explore how his company Root is using agentic AI to tackle one of cybersecurity’s biggest challenges—remediation delay. The conversation unpacks the dangers of security debt, the power of human-AI collaboration in patching vulnerabilities, and how organizations can evolve from reactive to proactive postures. The discussion also explores the limitations of AI, the critical role of human oversight, and the importance of aligning emerging technologies with broader risk management goals. Whether you're a CISO, a tech innovator, or a startup founder, this episode offers timely insights into the future of cybersecurity resilience. Amaral also shares candid insights into his journey from engineer to founder and provides valuable advice for aspiring entrepreneurs.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-88-closing-the-remediation-gap-with-agentic-ai/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-88-closing-the-remediation-gap-with-agentic-ai/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿﻿<strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this compelling episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> engages with <a href="https://www.linkedin.com/in/john-amaral-a359241/" rel="noopener noreferrer" target="_blank">John Amaral</a>, a serial entrepreneur and cybersecurity innovator, to explore how his company Root is using agentic AI to tackle one of cybersecurity’s biggest challenges—remediation delay. The conversation unpacks the dangers of security debt, the power of human-AI collaboration in patching vulnerabilities, and how organizations can evolve from reactive to proactive postures. The discussion also explores the limitations of AI, the critical role of human oversight, and the importance of aligning emerging technologies with broader risk management goals. Whether you're a CISO, a tech innovator, or a startup founder, this episode offers timely insights into the future of cybersecurity resilience. Amaral also shares candid insights into his journey from engineer to founder and provides valuable advice for aspiring entrepreneurs.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-88-closing-the-remediation-gap-with-agentic-ai/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-88-closing-the-remediation-gap-with-agentic-ai/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿﻿<strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/closing-the-remediation-gap-with-agentic-ai]]></link><guid isPermaLink="false">b8cdc0e3-f529-4ebe-ac9a-83046ea52aa1</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 21 Jul 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/b8cdc0e3-f529-4ebe-ac9a-83046ea52aa1.mp3" length="61910784" type="audio/mpeg"/><itunes:duration>32:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>88</itunes:episode><podcast:episode>88</podcast:episode></item><item><title>AI Security in the Public Sector: Balancing Innovation and Risk</title><itunes:title>AI Security in the Public Sector: Balancing Innovation and Risk</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/burnie-legette-37169a/" rel="noopener noreferrer" target="_blank">Burnie Legette, Director of IoT and AI at Intel Corporation and former professional football player</a>. Their conversation explores the evolving landscape of AI deployment within the public sector, with a particular focus on the security challenges and governance strategies required to harness AI responsibly. Drawing on his cross-sectoral experience, Burnie offers insights into the cultural, technical, and ethical nuances of AI adoption. Dr. Chatterjee brings in his empirically grounded Commitment-Preparedness-Discipline (CPD) cybersecurity governance framework to emphasize the importance of planning, transparency, and stakeholder engagement.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-87-ai-security-in-the-public-sector-balancing-innovation-and-risk/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-87-ai-security-in-the-public-sector-balancing-innovation-and-risk/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> is joined by <a href="https://www.linkedin.com/in/burnie-legette-37169a/" rel="noopener noreferrer" target="_blank">Burnie Legette, Director of IoT and AI at Intel Corporation and former professional football player</a>. Their conversation explores the evolving landscape of AI deployment within the public sector, with a particular focus on the security challenges and governance strategies required to harness AI responsibly. Drawing on his cross-sectoral experience, Burnie offers insights into the cultural, technical, and ethical nuances of AI adoption. Dr. Chatterjee brings in his empirically grounded Commitment-Preparedness-Discipline (CPD) cybersecurity governance framework to emphasize the importance of planning, transparency, and stakeholder engagement.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-87-ai-security-in-the-public-sector-balancing-innovation-and-risk/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-87-ai-security-in-the-public-sector-balancing-innovation-and-risk/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/ai-security-in-the-public-sector]]></link><guid isPermaLink="false">31a61fc2-07c8-47f3-bd67-863646e334cd</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 17 Jun 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/31a61fc2-07c8-47f3-bd67-863646e334cd.mp3" length="68982528" type="audio/mpeg"/><itunes:duration>35:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>87</itunes:episode><podcast:episode>87</podcast:episode></item><item><title>Holistic Identity Security: Shifting the Paradigm from Reactive to Proactive</title><itunes:title>Holistic Identity Security: Shifting the Paradigm from Reactive to Proactive</itunes:title><description><![CDATA[<p>In this compelling episode, Dr. Dave Chatterjee is joined by <a href="https://www.linkedin.com/in/damonfleury/" rel="noopener noreferrer" target="_blank">Damon Fleury, Chief Product Officer, SpyCloud</a> to dissect one of cybersecurity’s most exploited and least understood attack surfaces—identity. With nearly three decades of experience in security, Damon shares real-world insights into how identity compromises serve as the entry point for major breaches, why a holistic approach to identity security is urgent, and how organizations can move from reactive defense to proactive resilience. The discussion underscores the convergence of people, processes, and technology in building durable identity security frameworks.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> -- https://www.dchatte.com/episode-86-holistic-identity-security-shifting-the-paradigm-from-reactive-to-proactive/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿﻿<strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this compelling episode, Dr. Dave Chatterjee is joined by <a href="https://www.linkedin.com/in/damonfleury/" rel="noopener noreferrer" target="_blank">Damon Fleury, Chief Product Officer, SpyCloud</a> to dissect one of cybersecurity’s most exploited and least understood attack surfaces—identity. With nearly three decades of experience in security, Damon shares real-world insights into how identity compromises serve as the entry point for major breaches, why a holistic approach to identity security is urgent, and how organizations can move from reactive defense to proactive resilience. The discussion underscores the convergence of people, processes, and technology in building durable identity security frameworks.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> -- https://www.dchatte.com/episode-86-holistic-identity-security-shifting-the-paradigm-from-reactive-to-proactive/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿﻿<strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/a-cpos-call-for-holistic-identity-threat-protection]]></link><guid isPermaLink="false">d60d5b87-9f77-40ab-9e77-4568432fca8c</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Sat, 17 May 2025 00:00:00 -0500</pubDate><enclosure url="https://episodes.captivate.fm/episode/d60d5b87-9f77-40ab-9e77-4568432fca8c.mp3" length="37993728" type="audio/mpeg"/><itunes:duration>39:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>86</itunes:episode><podcast:episode>86</podcast:episode></item><item><title>From Botnets to AI: Defending Against the Future of DDoS Warfare</title><itunes:title>From Botnets to AI: Defending Against the Future of DDoS Warfare</itunes:title><description><![CDATA[<p>In this episode of the Cybersecurity Readiness Podcast, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>sits down with <a href="https://RichardHummel,DirectorofThreatIntelligenceatNETSCOUT" rel="noopener noreferrer" target="_blank">Richard Hummel, Director of Threat Intelligence at NETSCOUT</a>, to unpack the fast-evolving Distributed Denial of Service (DDoS) threat landscape. Richard shares unique insights from NETSCOUT’s latest global threat intelligence report, discussing the strategic weaponization of DDoS attacks in geopolitical conflict, the role of AI in modern attack infrastructure, and why proactive preparation, not prevention, is key. Together, they explore how leaders must adopt a “resilience by design” mindset to secure their digital frontlines.</p><p><strong>To access and download the entire podcast summary with discussion highlights </strong>-- <a href="https://www.dchatte.com/episode-85-from-botnets-to-ai-defending-against-the-future-of-ddos-warfare/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-85-from-botnets-to-ai-defending-against-the-future-of-ddos-warfare/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Cybersecurity Readiness Podcast, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>sits down with <a href="https://RichardHummel,DirectorofThreatIntelligenceatNETSCOUT" rel="noopener noreferrer" target="_blank">Richard Hummel, Director of Threat Intelligence at NETSCOUT</a>, to unpack the fast-evolving Distributed Denial of Service (DDoS) threat landscape. Richard shares unique insights from NETSCOUT’s latest global threat intelligence report, discussing the strategic weaponization of DDoS attacks in geopolitical conflict, the role of AI in modern attack infrastructure, and why proactive preparation, not prevention, is key. Together, they explore how leaders must adopt a “resilience by design” mindset to secure their digital frontlines.</p><p><strong>To access and download the entire podcast summary with discussion highlights </strong>-- <a href="https://www.dchatte.com/episode-85-from-botnets-to-ai-defending-against-the-future-of-ddos-warfare/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-85-from-botnets-to-ai-defending-against-the-future-of-ddos-warfare/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/from-botnets-to-ai-defending-against-the-future-of-ddos-warfare]]></link><guid isPermaLink="false">ed25b4f7-252c-4efd-82ed-f9fd302f6643</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Sat, 03 May 2025 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/11393c30-f71a-40c1-9144-6117dbd0c56b/CSR-EP-85-Audio-v3.mp3" length="41922816" type="audio/mpeg"/><itunes:duration>43:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>85</itunes:episode><podcast:episode>85</podcast:episode></item><item><title>Stopping Social Engineered Vishing Attacks Before They Start</title><itunes:title>Stopping Social Engineered Vishing Attacks Before They Start</itunes:title><description><![CDATA[<p><em>S</em>ocial engineering continues to be the primary gateway for cyberattacks, responsible for nearly 80% of fraud and ransomware incidents. And notably, 1 in 4 of these social engineering attacks originate via phone calls. Yet many enterprises continue to leave their phone systems exposed. In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> engages <a href="https://www.linkedin.com/in/rquattrocchi/" rel="noopener noreferrer" target="_blank">Richard Quattrocchi</a>, Vice President of Digital Transformation, Mutare Inc., in a compelling discussion on the often-overlooked threat of voice-based cyberattacks, particularly vishing (voice phishing). Richard shares his professional journey, personal motivation rooted in a family scam incident, and the alarming rise of social engineering via phone calls—especially in the era of AI and deepfakes. The conversation underscores how organizations continue to leave phone systems vulnerable due to siloed ownership and outdated assumptions.</p><p>Richard presents a layered defense strategy combining people, process, and technology, and introduces Mutare’s voice traffic filtering solution. This technology proactively intercepts malicious calls using metadata analysis before they reach users, drastically reducing exposure to fraud. The discussion also dives into real-world cases, including the MGM breach, and offers actionable guidance for enterprises and individuals to better secure voice channels.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> -- <a href="https://www.dchatte.com/episode-84-stopping-social-engineered-vishing-attacks-before-they-start/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-84-stopping-social-engineered-vishing-attacks-before-they-start/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p><em>S</em>ocial engineering continues to be the primary gateway for cyberattacks, responsible for nearly 80% of fraud and ransomware incidents. And notably, 1 in 4 of these social engineering attacks originate via phone calls. Yet many enterprises continue to leave their phone systems exposed. In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee</a> engages <a href="https://www.linkedin.com/in/rquattrocchi/" rel="noopener noreferrer" target="_blank">Richard Quattrocchi</a>, Vice President of Digital Transformation, Mutare Inc., in a compelling discussion on the often-overlooked threat of voice-based cyberattacks, particularly vishing (voice phishing). Richard shares his professional journey, personal motivation rooted in a family scam incident, and the alarming rise of social engineering via phone calls—especially in the era of AI and deepfakes. The conversation underscores how organizations continue to leave phone systems vulnerable due to siloed ownership and outdated assumptions.</p><p>Richard presents a layered defense strategy combining people, process, and technology, and introduces Mutare’s voice traffic filtering solution. This technology proactively intercepts malicious calls using metadata analysis before they reach users, drastically reducing exposure to fraud. The discussion also dives into real-world cases, including the MGM breach, and offers actionable guidance for enterprises and individuals to better secure voice channels.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> -- <a href="https://www.dchatte.com/episode-84-stopping-social-engineered-vishing-attacks-before-they-start/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-84-stopping-social-engineered-vishing-attacks-before-they-start/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications &amp; Press Releases:</strong></p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://www.dchatte.com/wp-content/uploads/2025/04/Dr.-Dave-Chatterjee-On-A-Proactive-Behavioral-Approach-To-Cyber-Readiness-Forbes-Scotland.pdf" rel="noopener noreferrer" target="_blank">"Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness," <em>Forbes</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://riskonnect.com/content-library/cybersecurity-2024-lessons-frontlines/" rel="noopener noreferrer" target="_blank">Speaker, “From Breaches to Resilience: Lessons from 2024’s Biggest Cyber Incidents and Building Stronger Defenses for 2025,” Riskonnect Webinar, April 3, 2025.</a></p><p><a href="https://www.rsaconference.com/library/webcast/186-cyber-readiness" rel="noopener noreferrer" target="_blank">A Proactive Behavioral Approach to Cyber Readiness: Insights from a Clinical Psychologist and a Social Scientist</a>, RSA Webcast, January 31, 2025</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/stopping-social-engineered-vishing-attacks-before-they-start]]></link><guid isPermaLink="false">235fd1d2-332c-44e4-9d26-f45f469b8264</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 22 Apr 2025 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b118f230-74db-407e-bd4f-d394addec010/CSR-EP-84-Audio-v4.mp3" length="80392704" type="audio/mpeg"/><itunes:duration>41:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>84</itunes:episode><podcast:episode>84</podcast:episode></item><item><title>Future-Proofing Your Data: Preparing for the Post-Quantum Era</title><itunes:title>Future-Proofing Your Data: Preparing for the Post-Quantum Era</itunes:title><description><![CDATA[<p>Dr. Dave Chatterjee and David Close discuss the implications of post-quantum cryptography (PQC) on cybersecurity readiness. <a href="https://www.linkedin.com/in/davidclose/" rel="noopener noreferrer" target="_blank">David, a Chief Solutions Architect at Futurex</a>, explains the evolution of cryptographic methods to counter quantum computing threats. He highlights the importance of NIST's role in standardizing quantum-resistant algorithms like Kyber and Dilithium. David shares practical examples, such as Google and Cloudflare's hybrid TLS implementation and a financial institution's use of PQC for data storage. They emphasize the need for organizations to develop roadmaps, inventory cryptographic assets, and ensure vendor readiness. <a href="https://dchatte.com" rel="noopener noreferrer" target="_blank">Dr. Chatterjee</a> stresses the importance of a proactive, holistic approach to cybersecurity governance.</p><p><strong>To access and download the entire podcast summary with discussion highlights -- </strong><a href="https://www.dchatte.com/episode-83-future-proofing-your-data-preparing-for-the-post-quantum-era/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-83-future-proofing-your-data-preparing-for-the-post-quantum-era/</a></p><p>Latest Articles and Press Releases on The Cybersecurity Readiness Podcast Series:</p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center">Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>﻿Latest Publications &amp; Press Releases:</p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://forbesswitzerland.com/dr-dave-chatterjee-on-a-proactive-behavioral-approach-to-cyber-readiness/" rel="noopener noreferrer" target="_blank">“Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness,”&nbsp;<em>Forbes Switzerland</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>Dr. Dave Chatterjee and David Close discuss the implications of post-quantum cryptography (PQC) on cybersecurity readiness. <a href="https://www.linkedin.com/in/davidclose/" rel="noopener noreferrer" target="_blank">David, a Chief Solutions Architect at Futurex</a>, explains the evolution of cryptographic methods to counter quantum computing threats. He highlights the importance of NIST's role in standardizing quantum-resistant algorithms like Kyber and Dilithium. David shares practical examples, such as Google and Cloudflare's hybrid TLS implementation and a financial institution's use of PQC for data storage. They emphasize the need for organizations to develop roadmaps, inventory cryptographic assets, and ensure vendor readiness. <a href="https://dchatte.com" rel="noopener noreferrer" target="_blank">Dr. Chatterjee</a> stresses the importance of a proactive, holistic approach to cybersecurity governance.</p><p><strong>To access and download the entire podcast summary with discussion highlights -- </strong><a href="https://www.dchatte.com/episode-83-future-proofing-your-data-preparing-for-the-post-quantum-era/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-83-future-proofing-your-data-preparing-for-the-post-quantum-era/</a></p><p>Latest Articles and Press Releases on The Cybersecurity Readiness Podcast Series:</p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center">Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>﻿Latest Publications &amp; Press Releases:</p><p>“<a href="https://www.dchatte.com/wp-content/uploads/2025/02/Meet-Dr.-Dave-Chatterjee-the-mind-behind-the-Commitment-Preparedness-Discipline-method-for-cybersecurity-%E2%80%93-Chicago-Tribune-1.pdf" rel="noopener noreferrer" target="_blank">Meet Dr. Dave Chatterjee, the mind behind the CommitmentPreparedness-Discipline method for cybersecurity</a>,”&nbsp;<em>Chicago Tribune</em>,&nbsp;February 24, 2025.</p><p><a href="https://forbesswitzerland.com/dr-dave-chatterjee-on-a-proactive-behavioral-approach-to-cyber-readiness/" rel="noopener noreferrer" target="_blank">“Dr. Dave Chatterjee On A Proactive Behavioral Approach To Cyber Readiness,”&nbsp;<em>Forbes Switzerland</em>, February 21, 2025.</a></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/future-proofing-your-data-preparing-for-the-post-quantum-era]]></link><guid isPermaLink="false">e2f63b58-eaf6-4d72-ba8b-bacb625262d5</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 31 Mar 2025 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8927d146-5a5a-4a04-985d-34755c4ef986/CSR-EP-83-Audio-v2.mp3" length="49923877" type="audio/mpeg"/><itunes:duration>34:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>83</itunes:episode><podcast:episode>83</podcast:episode></item><item><title>Securing AI&apos;s Blind Spots: The Hidden Risks in Enterprise AI Adoption</title><itunes:title>Securing AI&apos;s Blind Spots: The Hidden Risks in Enterprise AI Adoption</itunes:title><description><![CDATA[<p>The adoption of Artificial Intelligence (AI) and Generative Artificial Intelligence (Gen-AI) applications and tools are exploding. The global AI infrastructure market is projected to reach over $96 billion by 2027. AI applications are being used to empower every organizational function and industry, from logistics and supply chain to manufacturing, healthcare, finance and banking, marketing and sales, and customer sales. However, such adoption and use of AI tools and platforms has greatly expanded the attack surfaces and the attack vectors. They are presenting many more opportunities for hackers to break into systems and networks and also violate individual privacy and reputation, thereby causing irreparable harm and damage. In this episode, Dr. Dave Chatterjee and&nbsp;<a href="https://www.linkedin.com/in/oliverfriedrichs/" rel="noopener noreferrer" target="_blank">Oliver Friedrichs, Founder, and CEO of Pangea,</a>&nbsp;discuss the risks associated with adopting and using AI and Generative AI applications and platforms. They share examples of AI-powered attacks, such as deepfake scams and ransomware attacks, and stress the need for continuous learning and proactive security measures. They also underscore the importance of continuous security assessments, incident response plans, and AI literacy for individuals and organizations.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> </p><p>https://www.dchatte.com/episode-82-securing-ais-blind-spots-the-hidden-risks-in-enterprise-ai-adoption/</p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>The adoption of Artificial Intelligence (AI) and Generative Artificial Intelligence (Gen-AI) applications and tools are exploding. The global AI infrastructure market is projected to reach over $96 billion by 2027. AI applications are being used to empower every organizational function and industry, from logistics and supply chain to manufacturing, healthcare, finance and banking, marketing and sales, and customer sales. However, such adoption and use of AI tools and platforms has greatly expanded the attack surfaces and the attack vectors. They are presenting many more opportunities for hackers to break into systems and networks and also violate individual privacy and reputation, thereby causing irreparable harm and damage. In this episode, Dr. Dave Chatterjee and&nbsp;<a href="https://www.linkedin.com/in/oliverfriedrichs/" rel="noopener noreferrer" target="_blank">Oliver Friedrichs, Founder, and CEO of Pangea,</a>&nbsp;discuss the risks associated with adopting and using AI and Generative AI applications and platforms. They share examples of AI-powered attacks, such as deepfake scams and ransomware attacks, and stress the need for continuous learning and proactive security measures. They also underscore the importance of continuous security assessments, incident response plans, and AI literacy for individuals and organizations.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> </p><p>https://www.dchatte.com/episode-82-securing-ais-blind-spots-the-hidden-risks-in-enterprise-ai-adoption/</p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/securing-ais-blind-spots-the-hidden-risks-in-enterprise-ai-adoption]]></link><guid isPermaLink="false">5ee1c07d-7512-49bb-9eb0-31d48feb8cb5</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 05 Mar 2025 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e3873fca-03f4-42a4-9872-07dac1e912ff/CSR-EP-82-Audio-v3.mp3" length="58850149" type="audio/mpeg"/><itunes:duration>40:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>82</itunes:episode><podcast:episode>82</podcast:episode></item><item><title>Elevating Your Offensive Security Program</title><itunes:title>Elevating Your Offensive Security Program</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>hosts a discussion on elevating your offensive program with <a href="https://www.linkedin.com/in/carneymark/" rel="noopener noreferrer" target="_blank">Mark Carney, CEO @ Evolve Security</a>, and <a href="https://www.linkedin.com/in/yaronrl/" rel="noopener noreferrer" target="_blank">Yaron Levi, Chief Information Security Officer (CISO) at Dolby Labs</a>. They emphasize the importance of a proactive, continuous approach to cybersecurity, contrasting it with traditional reactive measures. Key points include the need for a threat-informed, programmatic mindset, continuous threat exposure management (CTEM), and the integration of business objectives. They stress the importance of intelligence, risk assessment, and the role of third-party providers as partners. The conversation highlights the necessity of senior leadership commitment and the challenges of defining and measuring risk in cybersecurity.</p><p><strong>To access and download the entire podcast summary with discussion highlights -- </strong></p><p>https://www.dchatte.com/episode-81-elevating-your-offensive-security-program/</p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee </a>hosts a discussion on elevating your offensive program with <a href="https://www.linkedin.com/in/carneymark/" rel="noopener noreferrer" target="_blank">Mark Carney, CEO @ Evolve Security</a>, and <a href="https://www.linkedin.com/in/yaronrl/" rel="noopener noreferrer" target="_blank">Yaron Levi, Chief Information Security Officer (CISO) at Dolby Labs</a>. They emphasize the importance of a proactive, continuous approach to cybersecurity, contrasting it with traditional reactive measures. Key points include the need for a threat-informed, programmatic mindset, continuous threat exposure management (CTEM), and the integration of business objectives. They stress the importance of intelligence, risk assessment, and the role of third-party providers as partners. The conversation highlights the necessity of senior leadership commitment and the challenges of defining and measuring risk in cybersecurity.</p><p><strong>To access and download the entire podcast summary with discussion highlights -- </strong></p><p>https://www.dchatte.com/episode-81-elevating-your-offensive-security-program/</p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/offensive-security-best-practices]]></link><guid isPermaLink="false">60c62164-b572-479e-8522-e5c1a37726b4</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 18 Feb 2025 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2e6a9dd5-c1b7-4dbf-90cb-8fa518c93a38/CSR-Episode-81-Audio-v2.mp3" length="62043493" type="audio/mpeg"/><itunes:duration>43:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>81</itunes:episode><podcast:episode>81</podcast:episode></item><item><title>Using Blockchain Technology to Make Messaging Apps More Secure and Private</title><itunes:title>Using Blockchain Technology to Make Messaging Apps More Secure and Private</itunes:title><description><![CDATA[<p>Dr. Dave Chatterjee and <a href="https://www.linkedin.com/in/kee-j-090502157/" rel="noopener noreferrer" target="_blank">Kee Jefferys, Technical Co-Founder of Session</a>, discuss the use of blockchain technology in enhancing the security and privacy of messaging apps, specifically Session. Session, which has over a million monthly active users, uses a decentralized network of nodes incentivized by Session tokens. Unlike traditional messaging apps, Session does not require a phone number for sign-up and employs onion routing and end-to-end encryption to protect user data. Kee emphasizes the importance of considering the threat model and user needs when choosing a messaging app. Session is best suited for high-threat scenarios, while other apps may be more appropriate for regulatory compliance. Session is free, with potential future premium features, and is primarily for individual users.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> -- <a href="https://www.dchatte.com/episode-80-using-blockchain-technology-to-make-messaging-apps-more-secure-and-private/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-80-using-blockchain-technology-to-make-messaging-apps-more-secure-and-private/</a></p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>Dr. Dave Chatterjee and <a href="https://www.linkedin.com/in/kee-j-090502157/" rel="noopener noreferrer" target="_blank">Kee Jefferys, Technical Co-Founder of Session</a>, discuss the use of blockchain technology in enhancing the security and privacy of messaging apps, specifically Session. Session, which has over a million monthly active users, uses a decentralized network of nodes incentivized by Session tokens. Unlike traditional messaging apps, Session does not require a phone number for sign-up and employs onion routing and end-to-end encryption to protect user data. Kee emphasizes the importance of considering the threat model and user needs when choosing a messaging app. Session is best suited for high-threat scenarios, while other apps may be more appropriate for regulatory compliance. Session is free, with potential future premium features, and is primarily for individual users.</p><p><strong>To access and download the entire podcast summary with discussion highlights</strong> -- <a href="https://www.dchatte.com/episode-80-using-blockchain-technology-to-make-messaging-apps-more-secure-and-private/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-80-using-blockchain-technology-to-make-messaging-apps-more-secure-and-private/</a></p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/using-blockchain-technology-to-make-messaging-apps-more-secure-and-private]]></link><guid isPermaLink="false">01af35d6-a76f-4bc6-8227-81ac5d6960fb</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 03 Feb 2025 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6485db60-5dd5-415e-bdb6-894387ae0b05/CSR-Episode-80-Audio-v4-1.mp3" length="37655808" type="audio/mpeg"/><itunes:duration>39:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>80</itunes:episode><podcast:episode>80</podcast:episode></item><item><title>Authenticate without Storing Credentials: MIT Scientist Cracks the Code</title><itunes:title>Authenticate without Storing Credentials: MIT Scientist Cracks the Code</itunes:title><description><![CDATA[<p>Despite companies’ best efforts, stored access credentials inevitably get stolen or misused.  Whether it is a disgruntled employee posting the data, an employee that makes an innocent mistake exposing that data, a company needing revenue selling the information, a criminal hacker group stealing the information, or a government-backed group stealing the information, etc. it is simply a matter of when not if that information will be stolen.</p><p>“The only truly safe way to handle people’s secrets is never to store them in the first place – what is not stored cannot be stolen,” says <a href="https://TinaSrivastava,anMIT-trainedrocketscientistandprivacyexpert" rel="noopener noreferrer" target="_blank">Tina Srivastava, Ph.D., an MIT-trained rocket scientist and privacy expert </a>who has cracked the code on stored credentials She is the co-founder of Badge, a platform that allows users to enroll and authenticate on any device without storing Personally Identifiable Information (PII). In this episode, Tina and I discuss how the new technology works, its implications, and how organizations should ensure they are not storing user credentials.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-79-authenticate-without-storing-credentials-mit-scientist-cracks-the-code/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-79-authenticate-without-storing-credentials-mit-scientist-cracks-the-code/</a></p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a><strong>, </strong><em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications &amp; Press Releases:</p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>Despite companies’ best efforts, stored access credentials inevitably get stolen or misused.  Whether it is a disgruntled employee posting the data, an employee that makes an innocent mistake exposing that data, a company needing revenue selling the information, a criminal hacker group stealing the information, or a government-backed group stealing the information, etc. it is simply a matter of when not if that information will be stolen.</p><p>“The only truly safe way to handle people’s secrets is never to store them in the first place – what is not stored cannot be stolen,” says <a href="https://TinaSrivastava,anMIT-trainedrocketscientistandprivacyexpert" rel="noopener noreferrer" target="_blank">Tina Srivastava, Ph.D., an MIT-trained rocket scientist and privacy expert </a>who has cracked the code on stored credentials She is the co-founder of Badge, a platform that allows users to enroll and authenticate on any device without storing Personally Identifiable Information (PII). In this episode, Tina and I discuss how the new technology works, its implications, and how organizations should ensure they are not storing user credentials.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-79-authenticate-without-storing-credentials-mit-scientist-cracks-the-code/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-79-authenticate-without-storing-credentials-mit-scientist-cracks-the-code/</a></p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a><strong>, </strong><em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications &amp; Press Releases:</p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/authenticate-without-storing-credentials-mit-scientist-cracks-the-code]]></link><guid isPermaLink="false">91e561e7-df3c-4b45-b3c0-82237ee8d577</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 13 Jan 2025 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/101ee015-f986-4df9-9f99-0eae78d641ee/CSR-Tina-Srivastava-Audio-v4.mp3" length="27808512" type="audio/mpeg"/><itunes:duration>28:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>79</itunes:episode><podcast:episode>79</podcast:episode></item><item><title>Lessons from 2024&apos;s Biggest Cyber Incidents and Building Stronger Defenses for 2025</title><itunes:title>Lessons from 2024&apos;s Biggest Cyber Incidents and Building Stronger Defenses for 2025</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/shravmehta/" rel="noopener noreferrer" target="_blank">Shrav Mehta, Founder, and CEO at Secureframe</a>, joins me to discuss major cybersecurity incidents in 2024, highlighting five significant breaches: National Public Data (2.7 billion records), AT&amp;T (50 billion), Ticketmaster (500 million), Change Healthcare (145 million), and Dell (49 million). We emphasize the importance of proactive measures, such as data minimization, continuous training, and zero-trust models. I stressed the need for leadership engagement, robust incident response plans, and a holistic approach to security. Shrav underscores the role of automation and continuous monitoring in enhancing protection. We both agreed on the necessity of evolving security practices to counter emerging threats like deepfakes and AI-enabled attacks.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-78-lessons-from-2024s-biggest-cyber-incidents-and-building-stronger-defenses-for-2025/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-78-lessons-from-2024s-biggest-cyber-incidents-and-building-stronger-defenses-for-2025/</a></p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/shravmehta/" rel="noopener noreferrer" target="_blank">Shrav Mehta, Founder, and CEO at Secureframe</a>, joins me to discuss major cybersecurity incidents in 2024, highlighting five significant breaches: National Public Data (2.7 billion records), AT&amp;T (50 billion), Ticketmaster (500 million), Change Healthcare (145 million), and Dell (49 million). We emphasize the importance of proactive measures, such as data minimization, continuous training, and zero-trust models. I stressed the need for leadership engagement, robust incident response plans, and a holistic approach to security. Shrav underscores the role of automation and continuous monitoring in enhancing protection. We both agreed on the necessity of evolving security practices to counter emerging threats like deepfakes and AI-enabled attacks.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-78-lessons-from-2024s-biggest-cyber-incidents-and-building-stronger-defenses-for-2025/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-78-lessons-from-2024s-biggest-cyber-incidents-and-building-stronger-defenses-for-2025/</a></p><p><strong>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</strong></p><p><a href="https://finance.yahoo.com/news/dr-dave-chatterjee-hosts-global-195700523.html" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Yahoo!Finance, </em>Dec 16, 2024</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, <em>Marketers Media</em>, Dec 12, 2024.</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, <em>Business Insider/Markets Insider</em>, Dec 10, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>﻿Latest Publications &amp; Press Releases:</strong></p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/lessons-from-2024s-biggest-cyber-incidents-and-building-stronger-defenses-for-2025]]></link><guid isPermaLink="false">4afa1b44-49a4-454d-bae5-1027f6e6706c</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 31 Dec 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1a69b332-bad1-48c3-a9ab-0a7b279e86be/CSR-Episode-78-Audio-v3.mp3" length="34717440" type="audio/mpeg"/><itunes:duration>36:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>78</itunes:episode><podcast:episode>78</podcast:episode></item><item><title>Stopping Deepfake Threats Through Identity Verification</title><itunes:title>Stopping Deepfake Threats Through Identity Verification</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/aaronpainter/" rel="noopener noreferrer" target="_blank">Aaron Painter, CEO at Nametag</a>, joins me in discussing the Deepfake fraud phenomenon and how organizations and individuals should protect themselves from such scams. A recent study conducted by finance software provider Medius finds that over 53% of businesses in the U.S. and U.K. have been targets of financial scams powered by “deepfake” technology, with 43% falling victim to such attacks. 85% of the finance professionals polled view such scams as an “existential” threat to their organization’s financial security. In the United States, families lose an average of $11,000 in each fake kidnapping scam. According to data from the Federal Trade Commission, Americans lost $2.6 billion last year in imposter scams.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-77-stopping-deepfake-threats-protecting-organizations-through-identity-verification/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-77-stopping-deepfake-threats-protecting-organizations-through-identity-verification/</a></p><p>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, Business Insider/Markets Insider, Dec 10, 2024.</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, Marketers Media, Dec 12, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications &amp; Press Releases:</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, Business Insider/Markets Insider, Dec 10, 2024.</p><p>Press Release —&nbsp;<a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, Marketers Media, Dec 12, 2024.</p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/aaronpainter/" rel="noopener noreferrer" target="_blank">Aaron Painter, CEO at Nametag</a>, joins me in discussing the Deepfake fraud phenomenon and how organizations and individuals should protect themselves from such scams. A recent study conducted by finance software provider Medius finds that over 53% of businesses in the U.S. and U.K. have been targets of financial scams powered by “deepfake” technology, with 43% falling victim to such attacks. 85% of the finance professionals polled view such scams as an “existential” threat to their organization’s financial security. In the United States, families lose an average of $11,000 in each fake kidnapping scam. According to data from the Federal Trade Commission, Americans lost $2.6 billion last year in imposter scams.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-77-stopping-deepfake-threats-protecting-organizations-through-identity-verification/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-77-stopping-deepfake-threats-protecting-organizations-through-identity-verification/</a></p><p>Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, Business Insider/Markets Insider, Dec 10, 2024.</p><p><a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, Marketers Media, Dec 12, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications &amp; Press Releases:</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, Business Insider/Markets Insider, Dec 10, 2024.</p><p>Press Release —&nbsp;<a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, Marketers Media, Dec 12, 2024.</p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/stopping-deepfake-threats-protecting-organizations-through-identity-verification]]></link><guid isPermaLink="false">73b923ad-80dc-453c-b6e6-e80122c07000</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Sat, 14 Dec 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/8f74c83c-a159-46c9-9876-9e91e124038f/CSR-Episode-77-Audio-v4.mp3" length="32135040" type="audio/mpeg"/><itunes:duration>33:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>77</itunes:episode><podcast:episode>77</podcast:episode></item><item><title>From reactive to proactive: How behavioral psychology is transforming enterprise security</title><itunes:title>From reactive to proactive: How behavioral psychology is transforming enterprise security</itunes:title><description><![CDATA[<p>IBM recently reported a 71% year-over-year increase in attacks using valid credentials. This continued use of stolen credentials is also evident through ongoing public incidents like the string of attacks targeting Snowflake's customers that resulted in breaches at AT&amp;T and Advanced Auto Parts. <a href="https://www.linkedin.com/in/lynseywolf/" rel="noopener noreferrer" target="_blank">Lynsey Wolf, Team Lead and Insider Threat Analyst at DTEX Systems</a>&nbsp;believes that users' psychological and behavioral traits are being overlooked when it comes to defending against credential misuse. In this episode, we discuss how best to mitigate such threats using a proactive approach to insider risk management by focusing on user behavior and indicators rather than just incident response.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-76-from-reactive-to-proactive-how-behavioral-psychology-is-transforming-enterprise-security/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-76-from-reactive-to-proactive-how-behavioral-psychology-is-transforming-enterprise-security/</a></p><p>Latest Press Release:</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, Business Insider/Markets Insider, Dec 10, 2024.</p><p>Press Release —&nbsp;<a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, Marketers Media, Dec 12, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>IBM recently reported a 71% year-over-year increase in attacks using valid credentials. This continued use of stolen credentials is also evident through ongoing public incidents like the string of attacks targeting Snowflake's customers that resulted in breaches at AT&amp;T and Advanced Auto Parts. <a href="https://www.linkedin.com/in/lynseywolf/" rel="noopener noreferrer" target="_blank">Lynsey Wolf, Team Lead and Insider Threat Analyst at DTEX Systems</a>&nbsp;believes that users' psychological and behavioral traits are being overlooked when it comes to defending against credential misuse. In this episode, we discuss how best to mitigate such threats using a proactive approach to insider risk management by focusing on user behavior and indicators rather than just incident response.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-76-from-reactive-to-proactive-how-behavioral-psychology-is-transforming-enterprise-security/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-76-from-reactive-to-proactive-how-behavioral-psychology-is-transforming-enterprise-security/</a></p><p>Latest Press Release:</p><p><a href="https://markets.businessinsider.com/news/stocks/cybersecurity-readiness-podcast-by-dr-dave-chatterjee-reaches-10-000-downloads-globally-1034116472" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally</a>, Business Insider/Markets Insider, Dec 10, 2024.</p><p>Press Release —&nbsp;<a href="https://news.marketersmedia.com/dr-dave-chatterjee-hosts-global-podcast-series-on-cyber-readiness/89148082" rel="noopener noreferrer" target="_blank">Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness</a>, Marketers Media, Dec 12, 2024.</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/from-reactive-to-proactive-how-behavioral-psychology-is-transforming-enterprise-security]]></link><guid isPermaLink="false">47fbe8b9-be3e-40aa-96a3-c83350bc5226</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 20 Nov 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3bf17aa7-1704-4557-8e60-21c147750562/CSR-Episode-76-Audio-v3.mp3" length="53808768" type="audio/mpeg"/><itunes:duration>56:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>76</itunes:episode><podcast:episode>76</podcast:episode></item><item><title>Compliance in the Cloud: Challenges and Best Practices</title><itunes:title>Compliance in the Cloud: Challenges and Best Practices</itunes:title><description><![CDATA[<p>Accelerating into the cloud without caution often brings complexities that can cause more harm than good. Gartner has noted that cloud configuration errors cause 95% of cybersecurity breaches. With the rapid pace of cloud adoption, less time is spent ensuring systems are built and operated effectively with proper cyber hygiene. In this episode, <a href="https://www.linkedin.com/in/dalehoakcyberpro/" rel="noopener noreferrer" target="_blank">Dale Hoak, Director of Information Security at RegScale</a>, joins me in discussing cloud compliance-related challenges and best practices. Here are some terrific Dale Hoak one-liners:</p><p>"Compliance is essentially where fun went to die."</p><p>"Nobody steals your work. So, we need to use automation to do the work."</p><p>"Compliance is a key driver of trust in our world."</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-75-compliance-in-the-cloud-challenges-and-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-75-compliance-in-the-cloud-challenges-and-best-practices/</a></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>Accelerating into the cloud without caution often brings complexities that can cause more harm than good. Gartner has noted that cloud configuration errors cause 95% of cybersecurity breaches. With the rapid pace of cloud adoption, less time is spent ensuring systems are built and operated effectively with proper cyber hygiene. In this episode, <a href="https://www.linkedin.com/in/dalehoakcyberpro/" rel="noopener noreferrer" target="_blank">Dale Hoak, Director of Information Security at RegScale</a>, joins me in discussing cloud compliance-related challenges and best practices. Here are some terrific Dale Hoak one-liners:</p><p>"Compliance is essentially where fun went to die."</p><p>"Nobody steals your work. So, we need to use automation to do the work."</p><p>"Compliance is a key driver of trust in our world."</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-75-compliance-in-the-cloud-challenges-and-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-75-compliance-in-the-cloud-challenges-and-best-practices/</a></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://doi.org/10.1016/j.bushor.2024.10.009" rel="noopener noreferrer" target="_blank">Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness</a></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/compliance-in-the-cloud]]></link><guid isPermaLink="false">f3b65b12-a651-44a6-8573-972a1c948faf</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Fri, 01 Nov 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6d7d471f-928e-4c7a-a3cc-fc79c1d947aa/CSR-Episode-75-Audio-v3.mp3" length="33670272" type="audio/mpeg"/><itunes:duration>35:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>75</itunes:episode><podcast:episode>75</podcast:episode></item><item><title>Reducing the Risk of Social Engineering to Exploit IT Help Desk</title><itunes:title>Reducing the Risk of Social Engineering to Exploit IT Help Desk</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/manrod/" rel="noopener noreferrer" target="_blank">Mike Manrod, the Chief Information Security Officer (CISO) of Grand Canyon Education</a>, and <a href="https://www.linkedin.com/in/orieisen/" rel="noopener noreferrer" target="_blank">Ori Eisen, the Founder and CEO of Trusona</a>, joined me to discuss how best to reduce the risks of social engineering attacks on IT support and help desk personnel. This episode was motivated by the major cyber attack that brought MGM Resorts International's operations to a screeching halt. It was a social engineering attack where the attackers gained super administrator privileges by providing the MGM Help Desk with basic employee information.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-74-reducing-the-risk-of-social-engineering-to-exploit-it-help-desk/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-74-reducing-the-risk-of-social-engineering-to-exploit-it-help-desk/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/manrod/" rel="noopener noreferrer" target="_blank">Mike Manrod, the Chief Information Security Officer (CISO) of Grand Canyon Education</a>, and <a href="https://www.linkedin.com/in/orieisen/" rel="noopener noreferrer" target="_blank">Ori Eisen, the Founder and CEO of Trusona</a>, joined me to discuss how best to reduce the risks of social engineering attacks on IT support and help desk personnel. This episode was motivated by the major cyber attack that brought MGM Resorts International's operations to a screeching halt. It was a social engineering attack where the attackers gained super administrator privileges by providing the MGM Help Desk with basic employee information.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-74-reducing-the-risk-of-social-engineering-to-exploit-it-help-desk/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-74-reducing-the-risk-of-social-engineering-to-exploit-it-help-desk/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/unlocking-cyber-potential-the-power-of-collaboration-in-k-12-cyber-education]]></link><guid isPermaLink="false">50feb29f-9c77-4c0a-bbe2-c41fb6d01299</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Sun, 20 Oct 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/92286f35-c3b9-457d-99d0-4f800129f8dc/CSR-Episode-74-Audio-v7.mp3" length="33917184" type="audio/mpeg"/><itunes:duration>35:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>74</itunes:episode><podcast:episode>74</podcast:episode></item><item><title>Unlocking Cyber Potential: The Power of Collaboration in K-12 Cyber Education</title><itunes:title>Unlocking Cyber Potential: The Power of Collaboration in K-12 Cyber Education</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/cyber-director/" rel="noopener noreferrer" target="_blank">Laurie Salvail, Ph.D., Executive Director of CYBER.ORG</a>, joins me to discuss the importance of cybersecurity education for K-12 students. Primarily funded by the Cybersecurity and Infrastructure Security Agency (CISA), CYBER.ORG is a powerful and free resource available to K-12 students and educators in the United States. CYBER.ORG’s Range, a cloud-based virtual environment, empowers K-12 students with real-world cybersecurity skills in a secure platform.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-73-unlocking-cyber-potential-the-power-of-collaboration-in-k-12-cyber-education/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-73-unlocking-cyber-potential-the-power-of-collaboration-in-k-12-cyber-education/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/cyber-director/" rel="noopener noreferrer" target="_blank">Laurie Salvail, Ph.D., Executive Director of CYBER.ORG</a>, joins me to discuss the importance of cybersecurity education for K-12 students. Primarily funded by the Cybersecurity and Infrastructure Security Agency (CISA), CYBER.ORG is a powerful and free resource available to K-12 students and educators in the United States. CYBER.ORG’s Range, a cloud-based virtual environment, empowers K-12 students with real-world cybersecurity skills in a secure platform.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-73-unlocking-cyber-potential-the-power-of-collaboration-in-k-12-cyber-education/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-73-unlocking-cyber-potential-the-power-of-collaboration-in-k-12-cyber-education/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/unlocking-cyber-potential-the-power-of-collaboration-in-k-12-cyber-education]]></link><guid isPermaLink="false">2e97d1a9-c0d9-47ff-82d8-5be29f905646</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Sun, 06 Oct 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a076feee-0e4b-4994-a882-c29651ed6282/CSR-Episode-73-Audio-RE.mp3" length="32648832" type="audio/mpeg"/><itunes:duration>34:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>73</itunes:episode><podcast:episode>73</podcast:episode></item><item><title>Large Language Model (LLM) Risks and Mitigation Strategies</title><itunes:title>Large Language Model (LLM) Risks and Mitigation Strategies</itunes:title><description><![CDATA[<p>As machine learning algorithms continue to evolve, Large Language Models (LLMs) like GPT-4 are gaining popularity. While these models hold great promise in revolutionizing various functions and industries—ranging from content generation and customer service to research and development—they also come with their own set of risks and ethical concerns.&nbsp;In this episode,&nbsp;<a href="https://www.linkedin.com/in/rssathe/" rel="noopener noreferrer" target="_blank">Rohan Sathe, Co-founder &amp; CTO/Head of R&amp;D at Nightfall.ai,</a>&nbsp;and I review the LLM-related risks and how best to mitigate them.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-72-large-language-model-llm-risks-and-mitigation-strategies/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-72-large-language-model-llm-risks-and-mitigation-strategies/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>As machine learning algorithms continue to evolve, Large Language Models (LLMs) like GPT-4 are gaining popularity. While these models hold great promise in revolutionizing various functions and industries—ranging from content generation and customer service to research and development—they also come with their own set of risks and ethical concerns.&nbsp;In this episode,&nbsp;<a href="https://www.linkedin.com/in/rssathe/" rel="noopener noreferrer" target="_blank">Rohan Sathe, Co-founder &amp; CTO/Head of R&amp;D at Nightfall.ai,</a>&nbsp;and I review the LLM-related risks and how best to mitigate them.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-72-large-language-model-llm-risks-and-mitigation-strategies/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-72-large-language-model-llm-risks-and-mitigation-strategies/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/novel-risks-of-large-language-models-llms-and-how-to-mitigate-them]]></link><guid isPermaLink="false">03cf5b6c-ba0f-4184-bfec-873dc75a8679</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 23 Sep 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1ef93efa-8908-4a2e-aa2b-ee0e53ecf08f/CSR-Episode-72-Audio-v3.mp3" length="27805440" type="audio/mpeg"/><itunes:duration>28:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>72</itunes:episode><podcast:episode>72</podcast:episode></item><item><title>Identity Continuity in Multi-Cloud Environments</title><itunes:title>Identity Continuity in Multi-Cloud Environments</itunes:title><description><![CDATA[<p>The importance of maintaining uninterrupted services cannot be overemphasized, especially in light of the recent global IT outage fiasco. With the increasing dependence on cloud-based services, uninterrupted connectivity is essential to maintaining business continuity. Since identity providers control access to an organization's application and data, any downtime can shut down mission-critical operations. It was great to have <a href="https://www.linkedin.com/in/boughtnotsold/" rel="noopener noreferrer" target="_blank">Eric Olden,  Co-Founder, Chairman, and Chief Executive Officer of Strata Identity</a>, share his thoughts and perspectives on this critical topic.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-71-identity-continuity-in-multi-cloud-environments/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-71-identity-continuity-in-multi-cloud-environments/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>The importance of maintaining uninterrupted services cannot be overemphasized, especially in light of the recent global IT outage fiasco. With the increasing dependence on cloud-based services, uninterrupted connectivity is essential to maintaining business continuity. Since identity providers control access to an organization's application and data, any downtime can shut down mission-critical operations. It was great to have <a href="https://www.linkedin.com/in/boughtnotsold/" rel="noopener noreferrer" target="_blank">Eric Olden,  Co-Founder, Chairman, and Chief Executive Officer of Strata Identity</a>, share his thoughts and perspectives on this critical topic.</p><p>To access and download the entire podcast summary with discussion highlights -- <a href="https://www.dchatte.com/episode-71-identity-continuity-in-multi-cloud-environments/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-71-identity-continuity-in-multi-cloud-environments/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/maintaining-uninterrupted-identity-services]]></link><guid isPermaLink="false">acdfe23c-c613-458d-bdf3-6f38f527ba8c</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Mon, 02 Sep 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2adcab32-5431-41f9-92d3-ca5773b11f30/CSR-Episode-71-Audio-V3.mp3" length="28171008" type="audio/mpeg"/><itunes:duration>39:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>71</itunes:episode><podcast:episode>71</podcast:episode></item><item><title>Securing SMBs Serving Defense Industrial Base and U.S. Critical Infrastructure</title><itunes:title>Securing SMBs Serving Defense Industrial Base and U.S. Critical Infrastructure</itunes:title><description><![CDATA[<p>In this episode, <a href="https://ChrisPeterson,Co-FounderandCEOofRADICL" rel="noopener noreferrer" target="_blank">Chris Petersen, Co-Founder and CEO of RADICL</a>, and I discuss the challenges of securing the small and medium-sized businesses (SMBs) that serve the United States defense industrial base (DIB) and critical infrastructure. These SMBs play a significant role in supporting the Advanced Defense Systems that protect our nation from domestic and international threats. So, it is imperative to review what it takes to keep these SMBs safe from cyber-attacks.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-70-securing-smbs-serving-defense-industrial-base-and-u-s-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-70-securing-smbs-serving-defense-industrial-base-and-u-s-critical-infrastructure/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://ChrisPeterson,Co-FounderandCEOofRADICL" rel="noopener noreferrer" target="_blank">Chris Petersen, Co-Founder and CEO of RADICL</a>, and I discuss the challenges of securing the small and medium-sized businesses (SMBs) that serve the United States defense industrial base (DIB) and critical infrastructure. These SMBs play a significant role in supporting the Advanced Defense Systems that protect our nation from domestic and international threats. So, it is imperative to review what it takes to keep these SMBs safe from cyber-attacks.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-70-securing-smbs-serving-defense-industrial-base-and-u-s-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-70-securing-smbs-serving-defense-industrial-base-and-u-s-critical-infrastructure/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://www.youtube.com/watch?v=shaTbXRAR20" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness: Essential Actions For CXOs, August 12, 2024</a></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/securing-smbs-serving-defense-industrial-base-and-u-s-critical-infrastructure]]></link><guid isPermaLink="false">8c14f3ce-05b7-4f28-80e6-964a855a1d95</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 20 Aug 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7b849dec-55a2-46ad-b7ad-9c5becd1e895/CSR-Episode-70-Audio-v3.mp3" length="29503584" type="audio/mpeg"/><itunes:duration>40:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>70</itunes:episode><podcast:episode>70</podcast:episode></item><item><title>2024 Cyber Trends and Predictions: Global IT Outage and More</title><itunes:title>2024 Cyber Trends and Predictions: Global IT Outage and More</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/johnfunge/" rel="noopener noreferrer" target="_blank">John Funge, Managing Director at DataTribe</a>, and I discuss the Global IT Outage caused by a flawed update to CrowdStrike's cloud-based security software. We also review DataTribe's recently published <a href="https://datatribe.com/news/cyber-trends-predictions-for-2024/" rel="noopener noreferrer" target="_blank">report on cybersecurity trends and predictions for 2024.</a> In closing, John shares some tips and recommendations for those seeking cybersecurity funding. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-69-2024-cyber-trends-and-predictions-global-it-outage-and-more/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-69-2024-cyber-trends-and-predictions-global-it-outage-and-more/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/johnfunge/" rel="noopener noreferrer" target="_blank">John Funge, Managing Director at DataTribe</a>, and I discuss the Global IT Outage caused by a flawed update to CrowdStrike's cloud-based security software. We also review DataTribe's recently published <a href="https://datatribe.com/news/cyber-trends-predictions-for-2024/" rel="noopener noreferrer" target="_blank">report on cybersecurity trends and predictions for 2024.</a> In closing, John shares some tips and recommendations for those seeking cybersecurity funding. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-69-2024-cyber-trends-and-predictions-global-it-outage-and-more/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-69-2024-cyber-trends-and-predictions-global-it-outage-and-more/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://cmr.berkeley.edu/2024/07/getting-cybersecurity-right/" rel="noopener noreferrer" target="_blank">"Getting Cybersecurity Right,” California Management Review — Insights, July 8, 2024. </a></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/cyber-trends-and-predictions-global-it-outage-and-more]]></link><guid isPermaLink="false">177f03a6-318c-438e-9331-0c6a7b44e85f</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 31 Jul 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c57d19b8-0c5c-4fb7-acba-bcd9f922609a/CSR-Episode-69-Audio-v3.mp3" length="31796928" type="audio/mpeg"/><itunes:duration>44:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>69</itunes:episode><podcast:episode>69</podcast:episode></item><item><title>Fortifying Healthcare Data: Proactive Defense Strategies</title><itunes:title>Fortifying Healthcare Data: Proactive Defense Strategies</itunes:title><description><![CDATA[<p>The recent breach of the Change Healthcare platform serves as a strong reminder that the healthcare sector remains extremely vulnerable to different types of attacks. In late February, a ransomware gang known as Black Cat claimed responsibility for hacking Change Healthcare, a subsidiary of UnitedHealth Group. The intruders disrupted operations and stole up to four terabytes of data, including personal information, payment details, insurance records, and other sensitive information. It is also reported that a ransom payment of $22 million was made. What is even more concerning is that Change Healthcare is being extorted again by another ransomware group. Incidents such as this jeopardize the survival of countless healthcare providers nationwide due to delays in patient care and delays in making reimbursements. This hack generated massive economic and legal shockwaves across the US healthcare industry, from major industry players to small-town, rural physician practices. In this episode, <a href="https://www.linkedin.com/in/amer-deeba-39276/" rel="noopener noreferrer" target="_blank">Amer Deeba, CEO and Co-founder at Normalyze</a> joins me to review the state of cyber security and maturity of the healthcare industry and talk about proactive defense strategies to fortify sensitive healthcare data.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-68-fortifying-healthcare-data-proactive-defense-strategies/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-68-fortifying-healthcare-data-proactive-defense-strategies/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>The recent breach of the Change Healthcare platform serves as a strong reminder that the healthcare sector remains extremely vulnerable to different types of attacks. In late February, a ransomware gang known as Black Cat claimed responsibility for hacking Change Healthcare, a subsidiary of UnitedHealth Group. The intruders disrupted operations and stole up to four terabytes of data, including personal information, payment details, insurance records, and other sensitive information. It is also reported that a ransom payment of $22 million was made. What is even more concerning is that Change Healthcare is being extorted again by another ransomware group. Incidents such as this jeopardize the survival of countless healthcare providers nationwide due to delays in patient care and delays in making reimbursements. This hack generated massive economic and legal shockwaves across the US healthcare industry, from major industry players to small-town, rural physician practices. In this episode, <a href="https://www.linkedin.com/in/amer-deeba-39276/" rel="noopener noreferrer" target="_blank">Amer Deeba, CEO and Co-founder at Normalyze</a> joins me to review the state of cyber security and maturity of the healthcare industry and talk about proactive defense strategies to fortify sensitive healthcare data.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-68-fortifying-healthcare-data-proactive-defense-strategies/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-68-fortifying-healthcare-data-proactive-defense-strategies/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/fortifying-healthcare-data-proactive-defense-strategies]]></link><guid isPermaLink="false">c2c68017-5c18-4286-b7b5-17caf135d76f</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 25 Jun 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/49c85aa0-3870-4134-b34e-446c5e05c409/CSR-Episode-68-Audio-v3.mp3" length="52669440" type="audio/mpeg"/><itunes:duration>36:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>68</itunes:episode><podcast:episode>68</podcast:episode></item><item><title>Quantum Computing and Cybersecurity – Examining Trends and Implications</title><itunes:title>Quantum Computing and Cybersecurity – Examining Trends and Implications</itunes:title><description><![CDATA[<p>The fast-evolving quantum computing phenomenon represents a paradigm shift in how computers process data. Due to its ability to process vast amounts of data and solve complex problems at an unprecedented speed, quantum computing holds great promise for new material discovery through the simulation of physical systems, portfolio optimization in finance, and more. It also poses a significant threat to cybersecurity, requiring a change in how we encrypt our data. Even though quantum computers don’t technically have the power to break most of the current forms of encryption yet, we need to stay ahead of the threat and come up with quantum-proof solutions now. If we wait until those powerful quantum computers start breaking our encryption, it will be too late. I had the pleasure of discussing the quantum computing phenomenon and its cybersecurity implications with <a href="https://www.linkedin.com/in/duncanjones/" rel="noopener noreferrer" target="_blank">Duncan Jones, Head of Cybersecurity, at Quantinuum</a>. We discussed the potential threats and opportunities of quantum computing for cybersecurity, as well as its potential to revolutionize various industries. We recognized the need for new algorithms resistant to quantum computing, staying ahead of technological innovations, investing in cybersecurity measures, and prioritizing the migration of sensitive data to quantum-resistant algorithms. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-67-quantum-computing-and-cybersecurity-examining-trends-and-implications/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-67-quantum-computing-and-cybersecurity-examining-trends-and-implications/</a></p><p class="ql-align-center"><br></p><p>﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></description><content:encoded><![CDATA[<p>The fast-evolving quantum computing phenomenon represents a paradigm shift in how computers process data. Due to its ability to process vast amounts of data and solve complex problems at an unprecedented speed, quantum computing holds great promise for new material discovery through the simulation of physical systems, portfolio optimization in finance, and more. It also poses a significant threat to cybersecurity, requiring a change in how we encrypt our data. Even though quantum computers don’t technically have the power to break most of the current forms of encryption yet, we need to stay ahead of the threat and come up with quantum-proof solutions now. If we wait until those powerful quantum computers start breaking our encryption, it will be too late. I had the pleasure of discussing the quantum computing phenomenon and its cybersecurity implications with <a href="https://www.linkedin.com/in/duncanjones/" rel="noopener noreferrer" target="_blank">Duncan Jones, Head of Cybersecurity, at Quantinuum</a>. We discussed the potential threats and opportunities of quantum computing for cybersecurity, as well as its potential to revolutionize various industries. We recognized the need for new algorithms resistant to quantum computing, staying ahead of technological innovations, investing in cybersecurity measures, and prioritizing the migration of sensitive data to quantum-resistant algorithms. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-67-quantum-computing-and-cybersecurity-examining-trends-and-implications/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-67-quantum-computing-and-cybersecurity-examining-trends-and-implications/</a></p><p class="ql-align-center"><br></p><p>﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿Latest Webinars &amp; Podcasts with Dr. Chatterjee as the Guest</strong></p><p><a href="https://podcasts.apple.com/us/podcast/mission-markets/id1673844450?i=1000655952320" rel="noopener noreferrer" target="_blank">Non-profits and Cybersecurity, a CAPTRUST podcast</a></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust?utm_campaign=2023_q3_digital_experience&amp;utm_medium=soc_org_gbl&amp;utm_source=t_link&amp;utm_content=episode-4-audiogram-data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?, A TELUS International podcast</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness In the Age of Generative AI and LLM,” Let’s Talk About (Secur) IT Webinar, with Phillip de Souza</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee, a HALO Security Webinar</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/quantum-computing-and-cybersecurity-examining-the-trends-and-implications]]></link><guid isPermaLink="false">6d6fbc77-7d5b-47b2-9a78-08ae8f91ad33</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 05 Jun 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/dbceedb7-628d-4892-8fca-707a0b41fae3/CSR-Episode-67-Audio-v4.mp3" length="56897856" type="audio/mpeg"/><itunes:duration>39:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>67</itunes:episode><podcast:episode>67</podcast:episode></item><item><title>Creating a Security-Minded Culture</title><itunes:title>Creating a Security-Minded Culture</itunes:title><description><![CDATA[<p>In this podcast, I enjoyed talking with <a href="https://www.linkedin.com/in/cbshah/" rel="noopener noreferrer" target="_blank">Chirag Shah, Model N's Global Information Security Officer and Data Privacy Officer</a>, about creating a security-minded culture. Infusing a security culture within organizations starts with leadership buy-in and support. Chirag highlighted the need for interactive and engaging training programs tailored to specific departments, involving real-world examples and practical scenarios. He stressed the significance of fostering a security mindset among employees through daily reminders and reinforcement and leveraging free or low-cost resources to implement effective security awareness programs. Chirag also emphasized the need for a strategic approach to security and a security-minded culture where employees are empowered and responsible for maintaining a strong security posture.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-66-creating-a-security-minded-culture/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-66-creating-a-security-minded-culture/</a></p><p class="ql-align-center"><strong>﻿﻿</strong></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>In this podcast, I enjoyed talking with <a href="https://www.linkedin.com/in/cbshah/" rel="noopener noreferrer" target="_blank">Chirag Shah, Model N's Global Information Security Officer and Data Privacy Officer</a>, about creating a security-minded culture. Infusing a security culture within organizations starts with leadership buy-in and support. Chirag highlighted the need for interactive and engaging training programs tailored to specific departments, involving real-world examples and practical scenarios. He stressed the significance of fostering a security mindset among employees through daily reminders and reinforcement and leveraging free or low-cost resources to implement effective security awareness programs. Chirag also emphasized the need for a strategic approach to security and a security-minded culture where employees are empowered and responsible for maintaining a strong security posture.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-66-creating-a-security-minded-culture/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-66-creating-a-security-minded-culture/</a></p><p class="ql-align-center"><strong>﻿﻿</strong></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/making-cybersecurity-second-nature-keys-to-changing-employee-behavior]]></link><guid isPermaLink="false">2670efeb-14de-4cbe-a91b-c6dcf29973eb</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 22 May 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa66787f-0f4d-4d9d-a96d-910daf5dd5fd/CSR-Episode-66-Audio-v3-converted.mp3" length="19120941" type="audio/mpeg"/><itunes:duration>39:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>66</itunes:episode><podcast:episode>66</podcast:episode></item><item><title>Securing the Future: Inside Student-Led Cybersecurity Clinics</title><itunes:title>Securing the Future: Inside Student-Led Cybersecurity Clinics</itunes:title><description><![CDATA[<p>Student-led cybersecurity clinics are increasingly playing an essential role in strengthening the digital defenses of nonprofits, hospitals, municipalities, small businesses, and other under-resourced organizations in our communities while also developing a talent pipeline for cyber-civil defense. <a href="https://www.linkedin.com/in/s-powazek/" rel="noopener noreferrer" target="_blank">Sarah Powazek, Program Director - Public Interest Cybersecurity at the University of California, Berkeley Center for Long Term Cybersecurity (CLTC)</a>, sheds light on this important development. One of the highlights of the discussion was the recognition that the cybersecurity field is such a melting pot of different skill sets. In Sarah's words, "it's actually one of the biggest advantages we have; threats are changing every day. If we don't have folks from different backgrounds and different life experiences, we're really not going to be prepared; we're not going to be able to adapt."</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-65-securing-the-future-inside-student-led-cybersecurity-clinics/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-65-securing-the-future-inside-student-led-cybersecurity-clinics/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>Student-led cybersecurity clinics are increasingly playing an essential role in strengthening the digital defenses of nonprofits, hospitals, municipalities, small businesses, and other under-resourced organizations in our communities while also developing a talent pipeline for cyber-civil defense. <a href="https://www.linkedin.com/in/s-powazek/" rel="noopener noreferrer" target="_blank">Sarah Powazek, Program Director - Public Interest Cybersecurity at the University of California, Berkeley Center for Long Term Cybersecurity (CLTC)</a>, sheds light on this important development. One of the highlights of the discussion was the recognition that the cybersecurity field is such a melting pot of different skill sets. In Sarah's words, "it's actually one of the biggest advantages we have; threats are changing every day. If we don't have folks from different backgrounds and different life experiences, we're really not going to be prepared; we're not going to be able to adapt."</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-65-securing-the-future-inside-student-led-cybersecurity-clinics/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-65-securing-the-future-inside-student-led-cybersecurity-clinics/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/securing-the-future-inside-student-led-cybersecurity-clinics]]></link><guid isPermaLink="false">2393d961-bb65-4e75-8f81-351438afbb9b</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Sun, 05 May 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bdf650e7-6e3e-4964-a127-163c6e101714/CSR-Episode-65-Audio-v4-converted.mp3" length="13541997" type="audio/mpeg"/><itunes:duration>28:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>65</itunes:episode><podcast:episode>65</podcast:episode></item><item><title>Developing Resilient and Secure Mission Critical Facilities (Data Centers)</title><itunes:title>Developing Resilient and Secure Mission Critical Facilities (Data Centers)</itunes:title><description><![CDATA[<p>Developing and maintaining resilient and secure data centers is a huge part of cybersecurity readiness. <a href="https://www.linkedin.com/in/spirosliolis/" rel="noopener noreferrer" target="_blank">Spiros Liolis, Chief Technologist and Managing Consultant, EYP Mission Critical Facilities, Part of Ramboll</a>, joins me to discuss the challenges and best practices of creating and maintaining state-of-the-art data centers. Topics covered include a) elements and attributes of resilient data centers, b) creating and maintaining a resilient and adaptive data center, and c) the different types of risks – geological, meteorological, and human – that must be considered when building and maintaining the data centers.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-64-developing-resilient-and-secure-mission-critical-facilities-data-centers/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-64-developing-resilient-and-secure-mission-critical-facilities-data-centers/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>Developing and maintaining resilient and secure data centers is a huge part of cybersecurity readiness. <a href="https://www.linkedin.com/in/spirosliolis/" rel="noopener noreferrer" target="_blank">Spiros Liolis, Chief Technologist and Managing Consultant, EYP Mission Critical Facilities, Part of Ramboll</a>, joins me to discuss the challenges and best practices of creating and maintaining state-of-the-art data centers. Topics covered include a) elements and attributes of resilient data centers, b) creating and maintaining a resilient and adaptive data center, and c) the different types of risks – geological, meteorological, and human – that must be considered when building and maintaining the data centers.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-64-developing-resilient-and-secure-mission-critical-facilities-data-centers/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-64-developing-resilient-and-secure-mission-critical-facilities-data-centers/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/developing-resilient-and-secure-mission-critical-facilities-data-centers]]></link><guid isPermaLink="false">b43b3947-61b5-4ad9-bba6-b292a41db325</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 24 Apr 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/04803acb-9989-4c71-adea-1e8d809b2de1/CSR-Episode-64-Audio.mp3" length="48951853" type="audio/mpeg"/><itunes:duration>33:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>64</itunes:episode><podcast:episode>64</podcast:episode></item><item><title>Securing Application Programming Interfaces (APIs)</title><itunes:title>Securing Application Programming Interfaces (APIs)</itunes:title><description><![CDATA[<p>Application Programming Interfaces (APIs) play a vital role in modern software development, enabling the integration of services and facilitating the exchange of information. The ubiquity of APIs is a testament to their success in supporting many functions. However, their prominence has also made APIs a target for cyberattacks. <a href="https://www.linkedin.com/in/jeremysnyder/" rel="noopener noreferrer" target="_blank">Jeremy Snyder, Founder &amp; CEO of Firetail.io</a>, joins me in discussing how to secure APIs effectively. Our discussion revolves around the following questions:</p><p>What do we need APIs for? Why do we need API security? What are the consequences of lax API security?</p><p>What are the risks of APIs today? How can we remedy current API security issues?</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-63-securing-application-programming-interfaces-apis/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-63-securing-application-programming-interfaces-apis/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>Application Programming Interfaces (APIs) play a vital role in modern software development, enabling the integration of services and facilitating the exchange of information. The ubiquity of APIs is a testament to their success in supporting many functions. However, their prominence has also made APIs a target for cyberattacks. <a href="https://www.linkedin.com/in/jeremysnyder/" rel="noopener noreferrer" target="_blank">Jeremy Snyder, Founder &amp; CEO of Firetail.io</a>, joins me in discussing how to secure APIs effectively. Our discussion revolves around the following questions:</p><p>What do we need APIs for? Why do we need API security? What are the consequences of lax API security?</p><p>What are the risks of APIs today? How can we remedy current API security issues?</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-63-securing-application-programming-interfaces-apis/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-63-securing-application-programming-interfaces-apis/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.usatoday.com/story/special/contributor-content/2024/04/08/dave-chatterjee-drops-the-cybersecurity-jargon-encouraging-proactiveness-rather-than-reactiveness/73247201007/" rel="noopener noreferrer" target="_blank">Published in USA Today —&nbsp;“Dave Chatterjee Drops the Cybersecurity Jargon, Encouraging Proactiveness Rather than Reactiveness,” April 8, 2024</a></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/securing-your-apis-in-a-time-of-rapidly-rising-cyber-threats]]></link><guid isPermaLink="false">6662f049-c83d-4293-b04c-a68eb216587a</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 10 Apr 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fb525761-b0d6-49df-a791-0ae96b55e1f4/Cybersecurity-Readiness-Episode-63-v1.mp3" length="55787821" type="audio/mpeg"/><itunes:duration>38:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>63</itunes:episode><podcast:episode>63</podcast:episode></item><item><title>The Last Line of Defense Against a Ransomware Attack</title><itunes:title>The Last Line of Defense Against a Ransomware Attack</itunes:title><description><![CDATA[<p>Attackers have started increasingly targeting victims' backups to prevent organizations from restoring their data. Veeam's "2023 Ransomware Trends Report" found more than 93% of ransomware attacks specifically targeted backup data. My discussion with <a href="https://www.linkedin.com/in/gabrielgambill/" rel="noopener noreferrer" target="_blank">Gabe Gambill, VP of Product and Technical Operations at Quorum</a>, revolves around the following questions: </p><p>•	What vulnerabilities of data backups do ransomware hackers exploit?</p><p>•	What are the common mistakes and barriers when recovering against a ransomware attack?</p><p>•	How to successfully recover from a ransomware attack?</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-62-the-last-line-of-defense-against-a-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-62-the-last-line-of-defense-against-a-ransomware-attack/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>Attackers have started increasingly targeting victims' backups to prevent organizations from restoring their data. Veeam's "2023 Ransomware Trends Report" found more than 93% of ransomware attacks specifically targeted backup data. My discussion with <a href="https://www.linkedin.com/in/gabrielgambill/" rel="noopener noreferrer" target="_blank">Gabe Gambill, VP of Product and Technical Operations at Quorum</a>, revolves around the following questions: </p><p>•	What vulnerabilities of data backups do ransomware hackers exploit?</p><p>•	What are the common mistakes and barriers when recovering against a ransomware attack?</p><p>•	How to successfully recover from a ransomware attack?</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-62-the-last-line-of-defense-against-a-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-62-the-last-line-of-defense-against-a-ransomware-attack/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/episode-62-the-last-line-of-defense-against-a-ransomware-attack]]></link><guid isPermaLink="false">033b96df-850f-48db-90e1-e6390339b4d9</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 27 Mar 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7e4fc2b1-04ed-4556-96ad-b3d817ac82c9/CSR-Episode-62-Audio-v2-converted.mp3" length="16776045" type="audio/mpeg"/><itunes:duration>34:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode></item><item><title>Overcoming the Stale Nature of Tabletop Exercises</title><itunes:title>Overcoming the Stale Nature of Tabletop Exercises</itunes:title><description><![CDATA[<p>While tabletop exercises (TTX) are considered a proven tool for finding gaps in an organization’s security posture, they can be painstakingly challenging to plan and implement effectively. In a time where information security teams are understaffed and overworked, are TTX still worth the time and resources? Or are there other ways of ensuring incident response readiness? <a href="https://www.linkedin.com/in/navroop/" rel="noopener noreferrer" target="_blank"><strong>Navroop Mitter, the CEO of ArmorText</strong></a>, a mobile security and privacy startup, sheds light on the various aspects of tabletop exercises and their effectiveness as a preparedness tool.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-61-overcoming-the-stale-nature-of-tabletop-exercises/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-61-overcoming-the-stale-nature-of-tabletop-exercises/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>While tabletop exercises (TTX) are considered a proven tool for finding gaps in an organization’s security posture, they can be painstakingly challenging to plan and implement effectively. In a time where information security teams are understaffed and overworked, are TTX still worth the time and resources? Or are there other ways of ensuring incident response readiness? <a href="https://www.linkedin.com/in/navroop/" rel="noopener noreferrer" target="_blank"><strong>Navroop Mitter, the CEO of ArmorText</strong></a>, a mobile security and privacy startup, sheds light on the various aspects of tabletop exercises and their effectiveness as a preparedness tool.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-61-overcoming-the-stale-nature-of-tabletop-exercises/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-61-overcoming-the-stale-nature-of-tabletop-exercises/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/overcoming-the-stale-nature-of-tabletop-exercises]]></link><guid isPermaLink="false">0898e524-5a35-4c8e-8854-a3a3791a97db</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 13 Mar 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4afb1df7-e38f-4aa7-ab68-74123852503e/CSR-Episode-61-Audio-v3.mp3" length="37052160" type="audio/mpeg"/><itunes:duration>38:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode></item><item><title>Securing Artificial Intelligence (AI) Applications</title><itunes:title>Securing Artificial Intelligence (AI) Applications</itunes:title><description><![CDATA[<p>As artificial intelligence (AI) technologies continue to evolve and be leveraged, organizations need to make a concerted effort to safeguard their AI models and related data from different types of cyber-attacks and threats. <a href="https://www.linkedin.com/in/ctito/" rel="noopener noreferrer" target="_blank">Chris Sestito (Tito), Co-Founder and CEO of Hidden Layer</a><strong>, </strong>shares his thoughts and insights on the vulnerabilities of AI technologies and how best to secure AI applications.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-60-securing-artificial-intelligence-ai-applications/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-60-securing-artificial-intelligence-ai-applications/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>As artificial intelligence (AI) technologies continue to evolve and be leveraged, organizations need to make a concerted effort to safeguard their AI models and related data from different types of cyber-attacks and threats. <a href="https://www.linkedin.com/in/ctito/" rel="noopener noreferrer" target="_blank">Chris Sestito (Tito), Co-Founder and CEO of Hidden Layer</a><strong>, </strong>shares his thoughts and insights on the vulnerabilities of AI technologies and how best to secure AI applications.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-60-securing-artificial-intelligence-ai-applications/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-60-securing-artificial-intelligence-ai-applications/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/securing-artificial-intelligence-ai-applications]]></link><guid isPermaLink="false">fdab1da1-8688-42e5-8053-dffa690ad5ed</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 28 Feb 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4dd3de58-025b-4376-9b28-adae732d016f/Cybersecurity-Readiness-Episode-60-v2.mp3" length="29832960" type="audio/mpeg"/><itunes:duration>31:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode></item><item><title>Building a Resilient Disaster Recovery Infrastructure</title><itunes:title>Building a Resilient Disaster Recovery Infrastructure</itunes:title><description><![CDATA[<p>The latest disaster recovery statistics reveal that modern businesses still face costly interruptions&nbsp;due to a variety of threats, ranging from&nbsp;ransomware attacks to sudden hardware failures.&nbsp;The monetary costs of disasters and outages can be significant. According to results from Uptime Institute's "Annual Outage Analysis 2023"&nbsp;survey, 25% of respondents reported that their latest outage incurred more than $1 million in direct and indirect costs. In addition, 45% reported that the cost of their most recent outage ranged between $100,000 and $1 million. Another research report reveals that just over half of organizations have disaster recover plans and around 7% of organizations never test their disaster recovery plans. It was a real pleasure having <a href="https://www.linkedin.com/in/sagi-brody/" rel="noopener noreferrer" target="_blank"><strong>Sagi Brody, Co-Founder and CTO at Opti9</strong></a><strong> </strong>on the podcast<strong> </strong>to shed light on the various aspects of disaster recovery and how to do it well.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-59-building-a-resilient-disaster-recovery-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-59-building-a-resilient-disaster-recovery-infrastructure/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>The latest disaster recovery statistics reveal that modern businesses still face costly interruptions&nbsp;due to a variety of threats, ranging from&nbsp;ransomware attacks to sudden hardware failures.&nbsp;The monetary costs of disasters and outages can be significant. According to results from Uptime Institute's "Annual Outage Analysis 2023"&nbsp;survey, 25% of respondents reported that their latest outage incurred more than $1 million in direct and indirect costs. In addition, 45% reported that the cost of their most recent outage ranged between $100,000 and $1 million. Another research report reveals that just over half of organizations have disaster recover plans and around 7% of organizations never test their disaster recovery plans. It was a real pleasure having <a href="https://www.linkedin.com/in/sagi-brody/" rel="noopener noreferrer" target="_blank"><strong>Sagi Brody, Co-Founder and CTO at Opti9</strong></a><strong> </strong>on the podcast<strong> </strong>to shed light on the various aspects of disaster recovery and how to do it well.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-59-building-a-resilient-disaster-recovery-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-59-building-a-resilient-disaster-recovery-infrastructure/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/how-to-ensure-your-disaster-recovery-infrastructure-does-not-become-your-next-security-incident-]]></link><guid isPermaLink="false">a4cd06c4-8261-47cc-93d0-a04d12464725</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 14 Feb 2024 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/139bc184-b8f0-4586-9dc7-d1fc7594c7e9/Cybersecurity-Readiness-Episode-59-v2.mp3" length="25351053" type="audio/mpeg"/><itunes:duration>26:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode></item><item><title>Unraveling the Positive and Negative Impacts of Generative AI</title><itunes:title>Unraveling the Positive and Negative Impacts of Generative AI</itunes:title><description><![CDATA[<p><span style="font-family: var(--bs-font-sans-serif); font-size: 1.125rem; color: var(--bs-accordion-color);">In a very thought-provoking discussion, Artificial Intelligence (AI) expert&nbsp;</span><a href="https://www.linkedin.com/in/tonyphoang/" target="_blank" style="font-family: var(--bs-font-sans-serif); font-size: 1.125rem;">Tony Hoang, Ph.D</a><span style="font-family: var(--bs-font-sans-serif); font-size: 1.125rem; color: var(--bs-accordion-color);">., traced the evolution of Gen AI, highlighted the many benefits, and also shared his concerns about the irresponsible and abusive use of this technology.</span> What got my attention were the following realities:</p><ol><li>Innovators often prioritize speed over responsible AI development, leading to potential negative consequences.</li><li>How easy it is to create a software-generated duplicate of someone's voice or video avatar without their consent, using online content such as images and videos.</li><li>There are no current safeguards to prevent someone from exploiting AI-generated images of someone else, making it a challenge for parents to advise their children on how to protect themselves.</li></ol><br/><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-58-unraveling-the-positive-and-negative-impacts-of-generative-ai/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-58-unraveling-the-positive-and-negative-impacts-of-generative-ai/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p><span style="font-family: var(--bs-font-sans-serif); font-size: 1.125rem; color: var(--bs-accordion-color);">In a very thought-provoking discussion, Artificial Intelligence (AI) expert&nbsp;</span><a href="https://www.linkedin.com/in/tonyphoang/" target="_blank" style="font-family: var(--bs-font-sans-serif); font-size: 1.125rem;">Tony Hoang, Ph.D</a><span style="font-family: var(--bs-font-sans-serif); font-size: 1.125rem; color: var(--bs-accordion-color);">., traced the evolution of Gen AI, highlighted the many benefits, and also shared his concerns about the irresponsible and abusive use of this technology.</span> What got my attention were the following realities:</p><ol><li>Innovators often prioritize speed over responsible AI development, leading to potential negative consequences.</li><li>How easy it is to create a software-generated duplicate of someone's voice or video avatar without their consent, using online content such as images and videos.</li><li>There are no current safeguards to prevent someone from exploiting AI-generated images of someone else, making it a challenge for parents to advise their children on how to protect themselves.</li></ol><br/><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-58-unraveling-the-positive-and-negative-impacts-of-generative-ai/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-58-unraveling-the-positive-and-negative-impacts-of-generative-ai/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>﻿Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/unraveling-the-positive-and-negative-impacts-of-generative-ai]]></link><guid isPermaLink="false">8a4be7ab-bbf6-4d0d-b7a4-414d4a2b7789</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 22 Nov 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/dd7754e3-c901-41f1-9c6f-c7e0040e4b4b/Cyber-Security-Readiness-Episode-58-v4.mp3" length="30187584" type="audio/mpeg"/><itunes:duration>41:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode></item><item><title>Best Practices for Overcoming Troublesome Vulnerability Management Trends</title><itunes:title>Best Practices for Overcoming Troublesome Vulnerability Management Trends</itunes:title><description><![CDATA[<p>A 2023 State of Vulnerability Management Report finds that only half of the surveyed organizations (51%) have, at best, a moderate level of visibility into vulnerabilities. Several other vulnerability management metrics, such as maturity levels, frequency of vulnerability scans, and patch deployment speed, reveal an alarming and troublesome trend. In this episode, <a href="https://www.linkedin.com/in/ashleydleonard/" rel="noopener noreferrer" target="_blank">Ashley Leonard, CEO at Syxsense</a>, joins me in reviewing the research report findings and discussing vulnerability management challenges and best practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-57-best-practices-for-overcoming-troublesome-vulnerability-management-trends/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-57-best-practices-for-overcoming-troublesome-vulnerability-management-trends/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿Latest Webinars:</strong></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>A 2023 State of Vulnerability Management Report finds that only half of the surveyed organizations (51%) have, at best, a moderate level of visibility into vulnerabilities. Several other vulnerability management metrics, such as maturity levels, frequency of vulnerability scans, and patch deployment speed, reveal an alarming and troublesome trend. In this episode, <a href="https://www.linkedin.com/in/ashleydleonard/" rel="noopener noreferrer" target="_blank">Ashley Leonard, CEO at Syxsense</a>, joins me in reviewing the research report findings and discussing vulnerability management challenges and best practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-57-best-practices-for-overcoming-troublesome-vulnerability-management-trends/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-57-best-practices-for-overcoming-troublesome-vulnerability-management-trends/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p><strong>﻿Latest Webinars:</strong></p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/best-practices-for-overcoming-troublesome-vulnerability-management-trends-]]></link><guid isPermaLink="false">e81d8b24-e5b7-44c3-84e1-24bf915a4d15</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 01 Nov 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/428bc524-4277-4895-996e-3a5759c91c5e/Cyber-Security-Readiness-Episode-57-V5-128kbps.mp3" length="47003520" type="audio/mpeg"/><itunes:duration>48:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode></item><item><title>Streamlining and Improving Security by Standardizing Identity Management</title><itunes:title>Streamlining and Improving Security by Standardizing Identity Management</itunes:title><description><![CDATA[<p>While cloud computing has become a great digitization enabler to enterprises, multiple clouds—especially when intersecting with on-premises systems and one another—can produce some challenges. Many organizations can end up with an "identity gridlock" of competing identity systems and protocols since each cloud platform cannot exchange access policy data with other cloud providers. It was an absolute pleasure having <a href="https://www.linkedin.com/in/gerry-gebel/" rel="noopener noreferrer" target="_blank">Gerry Gebel, Head of Standards at Strata Identity</a>, join me to discuss the significance of standardizing identity management.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-56-streamlining-and-improving-security-by-standardizing-identity-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-56-streamlining-and-improving-security-by-standardizing-identity-management/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>While cloud computing has become a great digitization enabler to enterprises, multiple clouds—especially when intersecting with on-premises systems and one another—can produce some challenges. Many organizations can end up with an "identity gridlock" of competing identity systems and protocols since each cloud platform cannot exchange access policy data with other cloud providers. It was an absolute pleasure having <a href="https://www.linkedin.com/in/gerry-gebel/" rel="noopener noreferrer" target="_blank">Gerry Gebel, Head of Standards at Strata Identity</a>, join me to discuss the significance of standardizing identity management.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-56-streamlining-and-improving-security-by-standardizing-identity-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-56-streamlining-and-improving-security-by-standardizing-identity-management/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/streamlining-and-improving-security-by-standardizing-identity-management]]></link><guid isPermaLink="false">f7bd7e9c-c742-47b1-9636-69d4c96cb0ee</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 18 Oct 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2da76339-a21f-4409-aaeb-72cb34846e25/Cybersecurity-Readiness-Episode-56-v2.mp3" length="30819456" type="audio/mpeg"/><itunes:duration>32:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode></item><item><title>How Informed is the Board of Directors on Cybersecurity Risks?</title><itunes:title>How Informed is the Board of Directors on Cybersecurity Risks?</itunes:title><description><![CDATA[<p>With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the&nbsp;<a href="https://www.diligentinstitute.com/research/what-directors-think-2023/" rel="noopener noreferrer" target="_blank">Diligent Institute survey 'What Directors Think</a>,' board members ranked cybersecurity as the most challenging issue to oversee. Even though boards say cybersecurity is a priority, they have a long way to go to help their organizations become resilient to cyberattacks. <a href="https://www.linkedin.com/in/kaynemcgladrey/" rel="noopener noreferrer" target="_blank">Kayne McGladrey, Field CISO at Hyperproof and a senior IEEE member</a>, sheds light on this important aspect of cybersecurity governance. The driving question being: How informed is the Board of Directors to provide effective oversight of cybersecurity governance?</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-55-how-informed-is-the-board-of-directors-on-cybersecurity-risks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-55-how-informed-is-the-board-of-directors-on-cybersecurity-risks/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></description><content:encoded><![CDATA[<p>With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the&nbsp;<a href="https://www.diligentinstitute.com/research/what-directors-think-2023/" rel="noopener noreferrer" target="_blank">Diligent Institute survey 'What Directors Think</a>,' board members ranked cybersecurity as the most challenging issue to oversee. Even though boards say cybersecurity is a priority, they have a long way to go to help their organizations become resilient to cyberattacks. <a href="https://www.linkedin.com/in/kaynemcgladrey/" rel="noopener noreferrer" target="_blank">Kayne McGladrey, Field CISO at Hyperproof and a senior IEEE member</a>, sheds light on this important aspect of cybersecurity governance. The driving question being: How informed is the Board of Directors to provide effective oversight of cybersecurity governance?</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-55-how-informed-is-the-board-of-directors-on-cybersecurity-risks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-55-how-informed-is-the-board-of-directors-on-cybersecurity-risks/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://www.telusinternational.com/insights/digital-experience/resource/data-security-customer-trust" rel="noopener noreferrer" target="_blank">How can brands rethink data security to maintain customer trust?</a></p><p><a href="https://www.youtube.com/watch?v=HROm__eHzrM" rel="noopener noreferrer" target="_blank">Cybersecurity Readiness in the Age of Generative AI and LLM</a></p><p><a href="https://www.halosecurity.com/resources/webinar-cybersecurity-readiness" rel="noopener noreferrer" target="_blank">Insights for 2023, Cybersecurity Readiness with Dr. Dave Chatterjee</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/how-informed-is-the-board-of-directors-on-cybersecurity-risks]]></link><guid isPermaLink="false">dc914ed3-d5b6-4317-bb21-04d5e4492029</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 03 Oct 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3ae9904b-cf56-4055-94b0-1c2a5986dc5a/Cybersecurity-Readiness-EP-55-v5.mp3" length="50206464" type="audio/mpeg"/><itunes:duration>52:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>55</itunes:episode><podcast:episode>55</podcast:episode></item><item><title>Enhancing Incident Response Effectiveness</title><itunes:title>Enhancing Incident Response Effectiveness</itunes:title><description><![CDATA[<p>According to a 2023 IBM report, companies take 197 days to identify a breach and 69 days to contain one on average. The delay between infection, detection, and containment can cost businesses millions of dollars. Only 45% of the companies polled had an incident response plan in place. In this episode, <a href="https://www.linkedin.com/in/lassfolk/" rel="noopener noreferrer" target="_blank"><strong>Markus Lassfolk</strong>, <strong>VP of Incident Response, Truesec</strong></a>, and <a href="https://www.linkedin.com/in/vonseelen/" rel="noopener noreferrer" target="_blank"><strong>Morten von Seelen, Vice President of the Truesec Group</strong></a>, who have extensive hands-on experience in dealing with major cyber attack incidents, shed light on this very important subject matter. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-54-enhancing-incident-response-effectiveness/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-54-enhancing-incident-response-effectiveness/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>According to a 2023 IBM report, companies take 197 days to identify a breach and 69 days to contain one on average. The delay between infection, detection, and containment can cost businesses millions of dollars. Only 45% of the companies polled had an incident response plan in place. In this episode, <a href="https://www.linkedin.com/in/lassfolk/" rel="noopener noreferrer" target="_blank"><strong>Markus Lassfolk</strong>, <strong>VP of Incident Response, Truesec</strong></a>, and <a href="https://www.linkedin.com/in/vonseelen/" rel="noopener noreferrer" target="_blank"><strong>Morten von Seelen, Vice President of the Truesec Group</strong></a>, who have extensive hands-on experience in dealing with major cyber attack incidents, shed light on this very important subject matter. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-54-enhancing-incident-response-effectiveness/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-54-enhancing-incident-response-effectiveness/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/enhancing-incident-response-effectiveness]]></link><guid isPermaLink="false">4de14574-2fc8-4653-ac34-e6793db69011</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 06 Sep 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0b8a577f-50ec-4595-b2b8-eadc3a4f1517/Cybersecurity-Readiness-Podcast-Ep-54-v4.mp3" length="52823808" type="audio/mpeg"/><itunes:duration>55:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode></item><item><title>Cybersecurity in the Age of AI</title><itunes:title>Cybersecurity in the Age of AI</itunes:title><description><![CDATA[<p>While large language models such as ChatGPT can be used to write malicious code, AI tools are increasingly used to proactively detect and thwart cyber-attacks. There is growing recognition of AI’s potential to fight cybercrime. <a href="Ian L. Paterson, CEO, Plurilock" rel="noopener noreferrer" target="_blank">Ian L. Paterson, CEO, Plurilock</a>, sheds light on how AI has impacted the cybersecurity industry, especially how Generative AI is changing the industry. Describing the role of the AI as a co-pilot, he says, "The way&nbsp;I think about leveraging AI is typically having a human do the first 10%, and the last 10%, an AI is really good at doing the 80% in the middle. So it's not a replacement for the human, but it's an enabler for that human and allows them to do more with less."</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-53-cybersecurity-in-the-age-of-ai/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-53-cybersecurity-in-the-age-of-ai/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>While large language models such as ChatGPT can be used to write malicious code, AI tools are increasingly used to proactively detect and thwart cyber-attacks. There is growing recognition of AI’s potential to fight cybercrime. <a href="Ian L. Paterson, CEO, Plurilock" rel="noopener noreferrer" target="_blank">Ian L. Paterson, CEO, Plurilock</a>, sheds light on how AI has impacted the cybersecurity industry, especially how Generative AI is changing the industry. Describing the role of the AI as a co-pilot, he says, "The way&nbsp;I think about leveraging AI is typically having a human do the first 10%, and the last 10%, an AI is really good at doing the 80% in the middle. So it's not a replacement for the human, but it's an enabler for that human and allows them to do more with less."</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-53-cybersecurity-in-the-age-of-ai/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-53-cybersecurity-in-the-age-of-ai/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/cybersecurity-in-the-age-of-ai]]></link><guid isPermaLink="false">9b9379d3-ec97-4d3c-b207-533829e0d498</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 12 Jul 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2d90a076-aaf1-4059-a61f-4954ccc37edf/Cybersecurity-Readiness-Podcast-Ep-53-v3.mp3" length="27796320" type="audio/mpeg"/><itunes:duration>38:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode></item><item><title>Identity Orchestration Strategies and Best Practices</title><itunes:title>Identity Orchestration Strategies and Best Practices</itunes:title><description><![CDATA[<p>Cloud migration and remote work requirements are forcing organizations to modernize their applications and identity systems. Making the transition is both time-consuming and expensive using traditional software development practices. By decoupling applications from identity, orchestration can alleviate the burden while allowing companies to seamlessly mix and match different cloud providers as well as MFA and passwordless technologies. In this episode,<a href="https://www.linkedin.com/in/boughtnotsold/" rel="noopener noreferrer" target="_blank"> Eric Olden, Co-founder and CEO at Strata Identity</a> sheds light on identity orchestration strategies and best practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-52-identity-orchestration-strategies-and-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-52-identity-orchestration-strategies-and-best-practices/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>&nbsp;</strong></p><p><strong>&nbsp;</strong></p><p><strong>&nbsp;</strong></p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>&nbsp;</strong></p>]]></description><content:encoded><![CDATA[<p>Cloud migration and remote work requirements are forcing organizations to modernize their applications and identity systems. Making the transition is both time-consuming and expensive using traditional software development practices. By decoupling applications from identity, orchestration can alleviate the burden while allowing companies to seamlessly mix and match different cloud providers as well as MFA and passwordless technologies. In this episode,<a href="https://www.linkedin.com/in/boughtnotsold/" rel="noopener noreferrer" target="_blank"> Eric Olden, Co-founder and CEO at Strata Identity</a> sheds light on identity orchestration strategies and best practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-52-identity-orchestration-strategies-and-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-52-identity-orchestration-strategies-and-best-practices/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.dchatte.com/wp-content/uploads/2023/06/Preventing-security-breaches-must-start-at-the-top.pdf" rel="noopener noreferrer" target="_blank">Preventing Security Breaches Must Start at the Top</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/?utm_source=ORG_FACEBOOK&amp;utm_medium=referral&amp;utm_campaign=IbyIMD2023" rel="noopener noreferrer" target="_blank">Mission Critical --How the American Cancer Society successfully and securely migrated to the cloud amid the pandemic</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>&nbsp;</strong></p><p><strong>&nbsp;</strong></p><p><strong>&nbsp;</strong></p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>&nbsp;</strong></p>]]></content:encoded><link><![CDATA[https://dchatte.com/identity-orchestration-strategies-and-best-practices]]></link><guid isPermaLink="false">768a6e7d-451d-41b3-b211-48acd6235e14</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 28 Jun 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a42f652d-48c3-4aca-9c70-68c7d8f76f69/Cybersecurity-Readiness-Podcast-Ep-52-v2.mp3" length="40948608" type="audio/mpeg"/><itunes:duration>42:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode></item><item><title>Creating a Diverse Cybersecurity Workforce and Solving the Talent Shortage</title><itunes:title>Creating a Diverse Cybersecurity Workforce and Solving the Talent Shortage</itunes:title><description><![CDATA[<p>Recent cybersecurity workforce study reports reveal that a) there’s still a global shortage of 3.4 million workers in this field, and b) only 25% of the global cybersecurity workforce are women. In this episode, I had an engaging discussion with panelists <a href="https://www.linkedin.com/in/ashley-podhradsky-64312032/" rel="noopener noreferrer" target="_blank">Ashley Podhradsky, Vice President of Research and Economic Development at Dakota State University</a>, and <a href="https://www.linkedin.com/in/kritisharma92/" rel="noopener noreferrer" target="_blank">Kriti Arora, Security Global black belt, Threat Intelligence and External Attack Surface Management, Microsoft, North America</a>, on attracting more talent, especially motivating and inspiring women to become cybersecurity professionals. One of the key messages that came out of the discussion was not to allow a certain stereotype or image to influence career decisions. A woman's innate traits and abilities, such as multitasking, problem-solving, organizational skills, curiosity, and the zeal to go above and beyond, will serve her very well as a cybersecurity professional.</p><p>Here are links to some useful cybersecurity training and awareness resources:</p><p><a href="https://www.girlsecurity.org/" rel="noopener noreferrer" target="_blank">https://www.girlsecurity.org</a></p><p><a href="https://www.sans.org/" rel="noopener noreferrer" target="_blank">https://www.sans.org</a></p><p><a href="http://www.cybher.org/" rel="noopener noreferrer" target="_blank">www.CybHER.org</a></p><p><a href="http://www.wicys.org/" rel="noopener noreferrer" target="_blank">Www.WiCyS.org</a></p><p><a href="https://www.isc2.org/" rel="noopener noreferrer" target="_blank">https://www.isc2.org</a></p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-51-identity-orchestration-strategies-and-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-51-identity-orchestration-strategies-and-best-practices/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Recent cybersecurity workforce study reports reveal that a) there’s still a global shortage of 3.4 million workers in this field, and b) only 25% of the global cybersecurity workforce are women. In this episode, I had an engaging discussion with panelists <a href="https://www.linkedin.com/in/ashley-podhradsky-64312032/" rel="noopener noreferrer" target="_blank">Ashley Podhradsky, Vice President of Research and Economic Development at Dakota State University</a>, and <a href="https://www.linkedin.com/in/kritisharma92/" rel="noopener noreferrer" target="_blank">Kriti Arora, Security Global black belt, Threat Intelligence and External Attack Surface Management, Microsoft, North America</a>, on attracting more talent, especially motivating and inspiring women to become cybersecurity professionals. One of the key messages that came out of the discussion was not to allow a certain stereotype or image to influence career decisions. A woman's innate traits and abilities, such as multitasking, problem-solving, organizational skills, curiosity, and the zeal to go above and beyond, will serve her very well as a cybersecurity professional.</p><p>Here are links to some useful cybersecurity training and awareness resources:</p><p><a href="https://www.girlsecurity.org/" rel="noopener noreferrer" target="_blank">https://www.girlsecurity.org</a></p><p><a href="https://www.sans.org/" rel="noopener noreferrer" target="_blank">https://www.sans.org</a></p><p><a href="http://www.cybher.org/" rel="noopener noreferrer" target="_blank">www.CybHER.org</a></p><p><a href="http://www.wicys.org/" rel="noopener noreferrer" target="_blank">Www.WiCyS.org</a></p><p><a href="https://www.isc2.org/" rel="noopener noreferrer" target="_blank">https://www.isc2.org</a></p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-51-identity-orchestration-strategies-and-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-51-identity-orchestration-strategies-and-best-practices/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/creating-a-diverse-cybersecurity-workforce-and-solving-the-talent-shortage]]></link><guid isPermaLink="false">a1f5b698-0565-4832-9735-d35b73a8d8a6</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 14 Jun 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b11ed56d-59e1-404a-9fb6-0a46cbe828df/Cybersecurity-Readiness-Podcast-Kriti-Arora-Dr-Podhradsky-v7.mp3" length="54576768" type="audio/mpeg"/><itunes:duration>56:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode></item><item><title>Countering Insider Threats: Seven Science-Based Commandments</title><itunes:title>Countering Insider Threats: Seven Science-Based Commandments</itunes:title><description><![CDATA[<p>Research finds that there was a 44% increase in insider threat incidents across all types of organizations, and 56% of the reported incidents were due to negligence. Equally alarming is that the average annual cost to remediate a negligence incident was $6.6 million. <a href="https://www.linkedin.com/in/dr-eric-l-lang/" rel="noopener noreferrer" target="_blank">Dr. Eric Lang, Ph.D., Director, Personnel and Security Research Center (PERSEREC), United States Department of Defense</a>, draws upon his research to share some of the (science-based) commandments for understanding and countering insider threats. Emphasizing the criticality of human factors, Dr. Lang contends that "without individuals’ sincere commitments, the most extensive insider threat policies will fail."</p><p><strong>﻿</strong>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-50-countering-insider-threats-seven-science-based-commandments/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-50-countering-insider-threats-seven-science-based-commandments/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Research finds that there was a 44% increase in insider threat incidents across all types of organizations, and 56% of the reported incidents were due to negligence. Equally alarming is that the average annual cost to remediate a negligence incident was $6.6 million. <a href="https://www.linkedin.com/in/dr-eric-l-lang/" rel="noopener noreferrer" target="_blank">Dr. Eric Lang, Ph.D., Director, Personnel and Security Research Center (PERSEREC), United States Department of Defense</a>, draws upon his research to share some of the (science-based) commandments for understanding and countering insider threats. Emphasizing the criticality of human factors, Dr. Lang contends that "without individuals’ sincere commitments, the most extensive insider threat policies will fail."</p><p><strong>﻿</strong>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-50-countering-insider-threats-seven-science-based-commandments/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-50-countering-insider-threats-seven-science-based-commandments/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/countering-insider-threats-the-seven-commandments]]></link><guid isPermaLink="false">b8d379e6-7a38-4e87-af81-e66db9892e09</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 26 Apr 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a78f5632-8b64-4bf3-82af-38ff3be961b9/Cybersecurity-Readiness-Podcast-Episode-47-Eric-Lang-v3.mp3" length="44080128" type="audio/mpeg"/><itunes:duration>45:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode></item><item><title>Mitigating Risks from Unmonitored Communication Channels</title><itunes:title>Mitigating Risks from Unmonitored Communication Channels</itunes:title><description><![CDATA[<p>﻿Significant fines in excess of $2 billion have been levied on organizations in the financial services sector for failing to capture, retain and supervise communications. This crackdown on non-compliant communications is the clearest indicator yet that regulators have lost patience with firms that still haven't addressed supervision and record-keeping risks that were exacerbated by the pandemic. In this episode, <a href="https://www.linkedin.com/in/garthlanders/" rel="noopener noreferrer" target="_blank">Garth Landers, Director of Global Product Marketing at Theta Lake</a>, discusses how businesses can mitigate risks from unmonitored communication channels.</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-49-mitigating-risks-from-unmonitored-communication-channels/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-49-mitigating-risks-from-unmonitored-communication-channels/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>﻿Significant fines in excess of $2 billion have been levied on organizations in the financial services sector for failing to capture, retain and supervise communications. This crackdown on non-compliant communications is the clearest indicator yet that regulators have lost patience with firms that still haven't addressed supervision and record-keeping risks that were exacerbated by the pandemic. In this episode, <a href="https://www.linkedin.com/in/garthlanders/" rel="noopener noreferrer" target="_blank">Garth Landers, Director of Global Product Marketing at Theta Lake</a>, discusses how businesses can mitigate risks from unmonitored communication channels.</p><p>To access and download the entire podcast summary with discussion highlights -</p><p><a href="https://www.dchatte.com/episode-49-mitigating-risks-from-unmonitored-communication-channels/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-49-mitigating-risks-from-unmonitored-communication-channels/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/mitigating-risks-from-unmonitored-communication-channels]]></link><guid isPermaLink="false">189270af-2e30-4749-a687-56c79fe68ae0</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Fri, 14 Apr 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/712bd40e-89ab-42a4-b259-5beee3325f01/Cybersecurity-Readiness-Podcast-Episode-50-v2.mp3" length="54379392" type="audio/mpeg"/><itunes:duration>56:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode></item><item><title>Implementing Secure and Fast Authentication Processes</title><itunes:title>Implementing Secure and Fast Authentication Processes</itunes:title><description><![CDATA[<p>﻿Traditional authentication methods are outdated and need many layers of code, which can take time and resources away from developer teams. If developments like FIDO2, WebAuthn, and passkeys are to be the cornerstones of a passwordless future, then every application (not just Apple, Google, and Microsoft) needs an easy way to adopt these methods and weave them into current user authentication flows. <a href="https://www.linkedin.com/in/slavikm/" rel="noopener noreferrer" target="_blank">Slavik Markovich, Co-founder and CEO, Descope</a>, discusses current and future authentication trends and the importance of building a low-code/no-code passwordless authentication solution for app developers.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-48-implementing-secure-and-fast-authentication-processes/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-48-implementing-secure-and-fast-authentication-processes/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p><strong>Latest Webinars:</strong></p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>﻿Traditional authentication methods are outdated and need many layers of code, which can take time and resources away from developer teams. If developments like FIDO2, WebAuthn, and passkeys are to be the cornerstones of a passwordless future, then every application (not just Apple, Google, and Microsoft) needs an easy way to adopt these methods and weave them into current user authentication flows. <a href="https://www.linkedin.com/in/slavikm/" rel="noopener noreferrer" target="_blank">Slavik Markovich, Co-founder and CEO, Descope</a>, discusses current and future authentication trends and the importance of building a low-code/no-code passwordless authentication solution for app developers.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-48-implementing-secure-and-fast-authentication-processes/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-48-implementing-secure-and-fast-authentication-processes/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Dr. Chatterjee's Professional Profile and Media Kit: <a href="https://tinyurl.com/bdenv88p" rel="noopener noreferrer" target="_blank">https://tinyurl.com/bdenv88p</a></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p><strong>Latest Publications: </strong></p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p><strong>Latest Webinars:</strong></p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/implementing-secure-and-fast-authentication-processes]]></link><guid isPermaLink="false">611b2cf2-c63f-4700-88c5-e64149b6a818</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Thu, 30 Mar 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2daa07d9-aa39-4d40-bda5-df08105a7c15/Cybersecurity-Readiness-Podcast-Episode-48-Slavik-Markovich-v4.mp3" length="40181376" type="audio/mpeg"/><itunes:duration>41:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode></item><item><title>Proactive Resilient Approach to Cybersecurity</title><itunes:title>Proactive Resilient Approach to Cybersecurity</itunes:title><description><![CDATA[<p>It is well known that a proactive intelligence-driven approach to cyber governance is the way to go. But it is easier said than done. Embracing and sustaining such an approach requires high commitment, preparedness, and discipline. <a href="https://www.linkedin.com/in/kritisharma92/" rel="noopener noreferrer" target="_blank">Kriti Arora, Security Global Black Belt, Threat Intelligence and Enterprise Attack Surface Management, Microsoft</a>, shares her experiences guiding clients to adopt an intelligence-driven proactive approach to thwarting attacks. She also shares her passion for the field and the satisfaction of training and serving as a cyberwarrior.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-47-proactive-resilient-approach-to-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-47-proactive-resilient-approach-to-cybersecurity/</a></p><p class="ql-align-center"> </p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>It is well known that a proactive intelligence-driven approach to cyber governance is the way to go. But it is easier said than done. Embracing and sustaining such an approach requires high commitment, preparedness, and discipline. <a href="https://www.linkedin.com/in/kritisharma92/" rel="noopener noreferrer" target="_blank">Kriti Arora, Security Global Black Belt, Threat Intelligence and Enterprise Attack Surface Management, Microsoft</a>, shares her experiences guiding clients to adopt an intelligence-driven proactive approach to thwarting attacks. She also shares her passion for the field and the satisfaction of training and serving as a cyberwarrior.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-47-proactive-resilient-approach-to-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-47-proactive-resilient-approach-to-cybersecurity/</a></p><p class="ql-align-center"> </p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/proactive-resilient-approach-to-cybersecurity]]></link><guid isPermaLink="false">25209a7d-0467-4cb8-8194-4c50eacfebc5</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 15 Mar 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fcd7cfc3-cfa0-4205-90aa-92cef1110b71/Cybersecurity-Readiness-Podcast-Episode-47-Kriti-Arora-v2.mp3" length="47683584" type="audio/mpeg"/><itunes:duration>49:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode></item><item><title>The Challenges and Best Practices of Cyber Security in Emerging Markets</title><itunes:title>The Challenges and Best Practices of Cyber Security in Emerging Markets</itunes:title><description><![CDATA[<p>“While developed markets may today bear the brunt of cyber breaches, emerging markets are no less vulnerable. Their risks arise from weak processes and governance, the complexity of global supply chains, the need to remain low cost to attract investment, and the rapid adoption of technology without adequate cyber defenses.” <a href="https://www.linkedin.com/in/andrekeartland/" rel="noopener noreferrer" target="_blank">Andre Keartland, Solutions Architect at Netsurit, Johannesburg, South Africa</a>, speaks to these realities and offers guidance on managing cyber risks and implementing robust security solutions.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p>https://www.dchatte.com/episode-46-the-challenges-and-best-practices-of-cyber-security-in-emerging-markets/</p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>“While developed markets may today bear the brunt of cyber breaches, emerging markets are no less vulnerable. Their risks arise from weak processes and governance, the complexity of global supply chains, the need to remain low cost to attract investment, and the rapid adoption of technology without adequate cyber defenses.” <a href="https://www.linkedin.com/in/andrekeartland/" rel="noopener noreferrer" target="_blank">Andre Keartland, Solutions Architect at Netsurit, Johannesburg, South Africa</a>, speaks to these realities and offers guidance on managing cyber risks and implementing robust security solutions.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p>https://www.dchatte.com/episode-46-the-challenges-and-best-practices-of-cyber-security-in-emerging-markets/</p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publications: </p><p><a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p><p><a href="https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/strategy/mission-critical-how-the-american-cancer-society-successfully-and-securely-migrated-to-the-cloud-amid-the-pandemic/</a></p><p>Latest Webinars:</p><p><a href="https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip" rel="noopener noreferrer" target="_blank">https://us02web.zoom.us/rec/share/5H3vdv8eJgZRFMEa_w-JApCjpBczEcwpsqY6HRRZl6gOfanvhDLN1oiVnFA_qSE.kFJ0JGmlJt2d30Ip</a>&nbsp;</p>]]></content:encoded><link><![CDATA[https://dchatte.com/the-challenges-and-best-practices-of-cyber-security-in-emerging-markets]]></link><guid isPermaLink="false">9a17b4b5-e026-45d6-b69a-c1b4e97d3fcf</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 01 Mar 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/275095af-ee54-461c-bd1c-f7d49b944e87/Cybersecurity-Readiness-Podcast-Episode-46-v3.mp3" length="46785792" type="audio/mpeg"/><itunes:duration>48:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode></item><item><title>Cybersecurity Perspectives of a Community College President</title><itunes:title>Cybersecurity Perspectives of a Community College President</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/pgsenegal/" rel="noopener noreferrer" target="_blank">Pamela Senegal, President, Piedmont Community College</a>, shares several best practices, including having an information technology presence in each of the college-wide committees. I had the pleasure of meeting Pamela at a cybersecurity symposium organized by the World View Program at the University of North Carolina-Chapel Hill. <a href="https://www.linkedin.com/in/charl%C3%A9-lamonica-609b5a12/" rel="noopener noreferrer" target="_blank">Charle LaMonica, the Director of UNC's World View Program</a>, also shared her thoughts and perspectives during this very engaging discussion. Driven by the belief that students and instructors must actively engage in cybersecurity governance discussions, she and her team organized a conference to create such knowledge-sharing opportunities. </p><p>To access and download the entire podcast summary with discussion highlights -- https://www.dchatte.com/episode-45-cybersecurity-perspectives-of-a-community-college-president/</p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/pgsenegal/" rel="noopener noreferrer" target="_blank">Pamela Senegal, President, Piedmont Community College</a>, shares several best practices, including having an information technology presence in each of the college-wide committees. I had the pleasure of meeting Pamela at a cybersecurity symposium organized by the World View Program at the University of North Carolina-Chapel Hill. <a href="https://www.linkedin.com/in/charl%C3%A9-lamonica-609b5a12/" rel="noopener noreferrer" target="_blank">Charle LaMonica, the Director of UNC's World View Program</a>, also shared her thoughts and perspectives during this very engaging discussion. Driven by the belief that students and instructors must actively engage in cybersecurity governance discussions, she and her team organized a conference to create such knowledge-sharing opportunities. </p><p>To access and download the entire podcast summary with discussion highlights -- https://www.dchatte.com/episode-45-cybersecurity-perspectives-of-a-community-college-president/</p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/cybersecurity-perspectives-of-a-college-president]]></link><guid isPermaLink="false">47af8463-3563-4eb9-8cc9-1edc80277a0d</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 15 Feb 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2c3eb9be-6b02-4a0e-a36a-dad6d3f6efec/Cybersecurity-Readiness-Podcast-Episode-45-v3.mp3" length="42457728" type="audio/mpeg"/><itunes:duration>44:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode></item><item><title>From Law Enforcement Officer to Chief Information Security Officer</title><itunes:title>From Law Enforcement Officer to Chief Information Security Officer</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/brian-penders-30216b24/" rel="noopener noreferrer" target="_blank">Brian Penders, Chief Information Security Officer, at the University of North Carolina Chapel Hill Medical School</a>, shares his exciting but challenging journey from working as an engineering lab technician in the US nuclear submarine to being a  law enforcement officer with the Vermont State Police and then gravitating to his current role of Chief Information Security Officer at a major academic institution. He sheds light on the principles driving the high-reliability organizational culture in the US Nuclear Navy Propulsion Program and how those experiences influenced and shaped his growth as a cybersecurity leader.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p>https://www.dchatte.com/episode-44-from-law-enforcement-officer-to-chief-information-security-officer/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/brian-penders-30216b24/" rel="noopener noreferrer" target="_blank">Brian Penders, Chief Information Security Officer, at the University of North Carolina Chapel Hill Medical School</a>, shares his exciting but challenging journey from working as an engineering lab technician in the US nuclear submarine to being a  law enforcement officer with the Vermont State Police and then gravitating to his current role of Chief Information Security Officer at a major academic institution. He sheds light on the principles driving the high-reliability organizational culture in the US Nuclear Navy Propulsion Program and how those experiences influenced and shaped his growth as a cybersecurity leader.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p>https://www.dchatte.com/episode-44-from-law-enforcement-officer-to-chief-information-security-officer/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/from-law-enforcement-officer-to-chief-information-security-officer]]></link><guid isPermaLink="false">c6ae5f55-0a44-4b36-956d-5283cbbfc4af</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 01 Feb 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9d5472ef-fb45-4ab6-8427-a6f42ff23ad3/Cybersecurity-Readiness-Podcast-Episode-44-v2.mp3" length="32617728" type="audio/mpeg"/><itunes:duration>33:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/d86d3322-b41d-4e04-9250-17348473d4dc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d86d3322-b41d-4e04-9250-17348473d4dc/index.html" type="text/html"/></item><item><title>To trust or not to trust: the overwhelming challenge</title><itunes:title>To trust or not to trust: the overwhelming challenge</itunes:title><description><![CDATA[<p>Clinical psychologist <a href="https://www.linkedin.com/in/beatricecadet/" rel="noopener noreferrer" target="_blank">Beatrice Cadet, Scientist Integrator at Netherland's Organization for Applied Scientific Research (TNO)</a>, draws upon multiple concepts such as 'learned helplessness' to explain why people still fall for phishing attacks despite the training. Beatrice emphasizes the need to factor in human behavioral traits and motivational triggers when developing social engineering solutions and training.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p> https://www.dchatte.com/episode-43-to-trust-or-not-to-trust-the-overwhelming-challenge/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></description><content:encoded><![CDATA[<p>Clinical psychologist <a href="https://www.linkedin.com/in/beatricecadet/" rel="noopener noreferrer" target="_blank">Beatrice Cadet, Scientist Integrator at Netherland's Organization for Applied Scientific Research (TNO)</a>, draws upon multiple concepts such as 'learned helplessness' to explain why people still fall for phishing attacks despite the training. Beatrice emphasizes the need to factor in human behavioral traits and motivational triggers when developing social engineering solutions and training.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p> https://www.dchatte.com/episode-43-to-trust-or-not-to-trust-the-overwhelming-challenge/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/to-trust-or-not-to-trust-the-overwhelming-challenge]]></link><guid isPermaLink="false">11d10195-5e85-478b-a474-468b003ed488</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 18 Jan 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fbd30bbc-9ee8-4be5-a33c-92490a4cd3af/Cybersecurity-Readiness-Podcast-Episode-43-v3.mp3" length="39065088" type="audio/mpeg"/><itunes:duration>40:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/0d9bb51a-cf7e-4231-8a00-4edfa9d450db/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0d9bb51a-cf7e-4231-8a00-4edfa9d450db/index.html" type="text/html"/></item><item><title>Useful Technology Should Be Attack Agnostic</title><itunes:title>Useful Technology Should Be Attack Agnostic</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/patricia-muoio-10037775/" rel="noopener noreferrer" target="_blank">Patricia Muoio, Ph.D., Partner at SineWave Ventures and Former Chief of Trusted Systems Research Group, National Security Agency</a>, sheds light on the cybersecurity technology landscape and emphasizes the need to develop technologies that are attack agnostic. Some of the questions driving the discussion include: a) what progress has been made in the development and use of cybersecurity technologies? b) What does it mean to be attack agnostic? c) how near or far are we from taking the burden off people trying to protect themselves from different cyber attacks? and d) the ideal government and industry partnership model to develop innovative solutions.  </p><p>To access and download the entire podcast summary with discussion highlights --</p><p>https://www.dchatte.com/episode-42-useful-technology-should-be-attack-agnostic/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/patricia-muoio-10037775/" rel="noopener noreferrer" target="_blank">Patricia Muoio, Ph.D., Partner at SineWave Ventures and Former Chief of Trusted Systems Research Group, National Security Agency</a>, sheds light on the cybersecurity technology landscape and emphasizes the need to develop technologies that are attack agnostic. Some of the questions driving the discussion include: a) what progress has been made in the development and use of cybersecurity technologies? b) What does it mean to be attack agnostic? c) how near or far are we from taking the burden off people trying to protect themselves from different cyber attacks? and d) the ideal government and industry partnership model to develop innovative solutions.  </p><p>To access and download the entire podcast summary with discussion highlights --</p><p>https://www.dchatte.com/episode-42-useful-technology-should-be-attack-agnostic/</p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/useful-technology-should-be-attack-agnostic]]></link><guid isPermaLink="false">22c73805-c780-4b32-bc7e-133ea52b5652</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 04 Jan 2023 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6d1e6f81-9637-4ec1-992b-abf541ef85a9/Cybersecurity-Readiness-Podcast-Episode-42-v3.mp3" length="41759367" type="audio/mpeg"/><itunes:duration>43:29</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/0409d501-e8fc-4829-8ab5-f0d10cddceb9/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0409d501-e8fc-4829-8ab5-f0d10cddceb9/index.html" type="text/html"/></item><item><title>Do you see what attackers see? Threat modeling done right</title><itunes:title>Do you see what attackers see? Threat modeling done right</itunes:title><description><![CDATA[<p>Threat modeling is an intrinsic part of information security governance and needs to be done well. However, research finds that many organizations don't do it well, some are pretty haphazard or chaotic in their approach. In this episode, <a href="https://www.linkedin.com/in/mhlira/" rel="noopener noreferrer" target="_blank">Marcos Lira, Lead Solutions Engineer at Halo Security</a>, sheds light on how to do threat modeling the right way. The key questions driving the discussion were: a) what is the scope and purpose of threat modeling?  b) what have people and organizations been getting wrong about threat modeling? c) what is the right way of doing threat modeling? and d) what is the future of threat modeling?  </p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-41-do-you-see-what-attackers-see-threat-modeling-done-right/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-41-do-you-see-what-attackers-see-threat-modeling-done-right/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></description><content:encoded><![CDATA[<p>Threat modeling is an intrinsic part of information security governance and needs to be done well. However, research finds that many organizations don't do it well, some are pretty haphazard or chaotic in their approach. In this episode, <a href="https://www.linkedin.com/in/mhlira/" rel="noopener noreferrer" target="_blank">Marcos Lira, Lead Solutions Engineer at Halo Security</a>, sheds light on how to do threat modeling the right way. The key questions driving the discussion were: a) what is the scope and purpose of threat modeling?  b) what have people and organizations been getting wrong about threat modeling? c) what is the right way of doing threat modeling? and d) what is the future of threat modeling?  </p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-41-do-you-see-what-attackers-see-threat-modeling-done-right/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-41-do-you-see-what-attackers-see-threat-modeling-done-right/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/do-you-see-what-attackers-see-threat-modeling-done-right]]></link><guid isPermaLink="false">9ea6bc88-7a85-450f-a2b6-04e9dc86f104</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 21 Dec 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6bebb7a4-cca7-4280-95b8-9f6ea8728733/Marcos-Lira-v3.mp3" length="51297664" type="audio/mpeg"/><itunes:duration>35:37</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/2a71b990-868b-4937-b3cd-ebc1f39bcb1e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2a71b990-868b-4937-b3cd-ebc1f39bcb1e/index.html" type="text/html"/></item><item><title>Implementing Phishing Resistant Multifactor Authentication</title><itunes:title>Implementing Phishing Resistant Multifactor Authentication</itunes:title><description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) recently (Oct 31, 2022) released fact sheets urging all organizations to implement phishing-resistant multi-factor authentication (MFA). In this episode, <a href="https://www.linkedin.com/in/georgegerchow/" rel="noopener noreferrer" target="_blank">George Gerchow, Chief Security Officer and Senior Vice President of IT, Sumo Logic</a>, and I have an in-depth discussion on this very important security subject matter. The scope of coverage ranges from providing an overview of MFA and its benefits to discussing the challenges and hurdles of implementing phishing-resistant MFA, recommended implementation approaches, and the future of MFA.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-40-implementing-phishing-resistant-multifactor-authentication/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-40-implementing-phishing-resistant-multifactor-authentication/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></description><content:encoded><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) recently (Oct 31, 2022) released fact sheets urging all organizations to implement phishing-resistant multi-factor authentication (MFA). In this episode, <a href="https://www.linkedin.com/in/georgegerchow/" rel="noopener noreferrer" target="_blank">George Gerchow, Chief Security Officer and Senior Vice President of IT, Sumo Logic</a>, and I have an in-depth discussion on this very important security subject matter. The scope of coverage ranges from providing an overview of MFA and its benefits to discussing the challenges and hurdles of implementing phishing-resistant MFA, recommended implementation approaches, and the future of MFA.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-40-implementing-phishing-resistant-multifactor-authentication/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-40-implementing-phishing-resistant-multifactor-authentication/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/implementing-phishing-resistant-multifactor-authentication]]></link><guid isPermaLink="false">6aae7c8a-d582-4d3e-a899-857afe80e7c7</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 07 Dec 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/d00ff1d6-c830-427f-81d1-d95b8fa22139/Cybersecurity-Readiness-Podcast-Episode-40-v3.mp3" length="38449364" type="audio/mpeg"/><itunes:duration>40:08</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/9499f93b-f095-4c0b-bc38-055031ac5044/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9499f93b-f095-4c0b-bc38-055031ac5044/index.html" type="text/html"/></item><item><title>How do SMBs protect themselves from ransomware attacks?</title><itunes:title>How do SMBs protect themselves from ransomware attacks?</itunes:title><description><![CDATA[<p>A recent Global SMB Ransomware survey finds that nearly half of small and medium-sized businesses (SMBs) have experienced a ransomware attack, yet the majority aren't sure they are a target, and most are not confident they can fend off such an attack. Since 60% of SMBs are known to go out of business within six months of being hacked, it is a very troubling state of affairs. In this episode, <a href="https://www.linkedin.com/in/themilbourne/" rel="noopener noreferrer" target="_blank">Grayson Milbourne, Security Intelligence Director at OpenText Security Solutions</a>, joins me in discussing the security challenges faced by SMBs and sharing success factors and best practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-39-how-do-smbs-protect-themselves-from-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-39-how-do-smbs-protect-themselves-from-ransomware-attacks/</a></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></description><content:encoded><![CDATA[<p>A recent Global SMB Ransomware survey finds that nearly half of small and medium-sized businesses (SMBs) have experienced a ransomware attack, yet the majority aren't sure they are a target, and most are not confident they can fend off such an attack. Since 60% of SMBs are known to go out of business within six months of being hacked, it is a very troubling state of affairs. In this episode, <a href="https://www.linkedin.com/in/themilbourne/" rel="noopener noreferrer" target="_blank">Grayson Milbourne, Security Intelligence Director at OpenText Security Solutions</a>, joins me in discussing the security challenges faced by SMBs and sharing success factors and best practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-39-how-do-smbs-protect-themselves-from-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-39-how-do-smbs-protect-themselves-from-ransomware-attacks/</a></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p><p>Latest Publication: <a href="https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/" rel="noopener noreferrer" target="_blank">https://www.imd.org/ibyimd/magazine/preventing-security-breaches-must-start-at-the-top/</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/how-do-smbs-protect-themselves-from-ransomware-attacks]]></link><guid isPermaLink="false">e6dfaf6e-000d-4e3b-af51-ce4e45732da1</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 23 Nov 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/9db9a209-9488-4ccc-8e2b-8e189cfdead0/Cybersecurity-20Readiness-20Podcast-20-20Episode-2039-20v3.mp3" length="38234496" type="audio/mpeg"/><itunes:duration>39:50</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/3fadf6e2-085e-4e4f-bb00-78b2fa0a6a69/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3fadf6e2-085e-4e4f-bb00-78b2fa0a6a69/index.html" type="text/html"/></item><item><title>Cybersecurity As A Strategic Opportunity</title><itunes:title>Cybersecurity As A Strategic Opportunity</itunes:title><description><![CDATA[<p>In this episode,<a href=" Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist" rel="noopener noreferrer" target="_blank"> Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist</a>, shares his vision of the future of cyber governance. According to him, the leadership mindset needs to change whereby they are optimistic and opportunistic about cybersecurity and view developing cybersecurity capabilities as a source of competitive advantage. Kal also emphasized the importance of attracting professionals from other fields. He said, “I think cyber security as a community should start embracing people with other skills. I think there is a lot of opportunity here, for people skilled in software development, program management, product management, and data analytics.”</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-38-cybersecurity-as-a-strategic-opportunity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-38-cybersecurity-as-a-strategic-opportunity/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p>]]></description><content:encoded><![CDATA[<p>In this episode,<a href=" Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist" rel="noopener noreferrer" target="_blank"> Kal Sambhangi, Senior Vice President, Cybersecurity Strategy and Architecture at Truist</a>, shares his vision of the future of cyber governance. According to him, the leadership mindset needs to change whereby they are optimistic and opportunistic about cybersecurity and view developing cybersecurity capabilities as a source of competitive advantage. Kal also emphasized the importance of attracting professionals from other fields. He said, “I think cyber security as a community should start embracing people with other skills. I think there is a lot of opportunity here, for people skilled in software development, program management, product management, and data analytics.”</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-38-cybersecurity-as-a-strategic-opportunity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-38-cybersecurity-as-a-strategic-opportunity/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/cybersecurity-as-a-strategic-opportunity]]></link><guid isPermaLink="false">1bad45d3-c2ab-4be0-b6e6-e3b6bfaabc6d</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 09 Nov 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c1f36424-6a5d-4806-b74e-cb6618762a1a/Cybersecurity-20Readiness-20Podcast-20-20Episode-2038-20-20Kal-.mp3" length="36726913" type="audio/mpeg"/><itunes:duration>38:15</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/30da2acb-3f5c-45ed-9a86-29db20971fcc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/30da2acb-3f5c-45ed-9a86-29db20971fcc/index.html" type="text/html"/></item><item><title>Comprehensive Asset Discovery</title><itunes:title>Comprehensive Asset Discovery</itunes:title><description><![CDATA[<p>Comprehensive asset discovery is foundational to robust and proactive cybersecurity governance. The Cybersecurity and Infrastructure Security Agency recently issued a directive (BOD 23-01) requiring federal enterprises (civilian executive branch) to perform automated asset discovery every 7 days. Among other things, the directive also requires federal enterprises to initiate vulnerability enumeration across all discovered assets, including all discovered nomadic/roaming devices (e.g., laptops), every 14 days. <a href="https://www.linkedin.com/in/jhbarbee/" rel="noopener noreferrer" target="_blank">Huxley Barbee, Security Evangelist at runZero and former Cybersecurity Practice Lead at Cisco</a>, discusses the various methods of comprehensive asset discovery and provides guidance in selecting an appropriate asset discovery tool.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-37-comprehensive-asset-discovery/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-37-comprehensive-asset-discovery/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p>]]></description><content:encoded><![CDATA[<p>Comprehensive asset discovery is foundational to robust and proactive cybersecurity governance. The Cybersecurity and Infrastructure Security Agency recently issued a directive (BOD 23-01) requiring federal enterprises (civilian executive branch) to perform automated asset discovery every 7 days. Among other things, the directive also requires federal enterprises to initiate vulnerability enumeration across all discovered assets, including all discovered nomadic/roaming devices (e.g., laptops), every 14 days. <a href="https://www.linkedin.com/in/jhbarbee/" rel="noopener noreferrer" target="_blank">Huxley Barbee, Security Evangelist at runZero and former Cybersecurity Practice Lead at Cisco</a>, discusses the various methods of comprehensive asset discovery and provides guidance in selecting an appropriate asset discovery tool.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-37-comprehensive-asset-discovery/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-37-comprehensive-asset-discovery/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p><p><a href="https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712" rel="noopener noreferrer" target="_blank">https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/comprehensive-asset-discovery]]></link><guid isPermaLink="false">dc854698-800f-4f08-a63f-4e6882029db0</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 26 Oct 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ec3f2f48-7d98-4e06-9d37-8cd688df37ce/Cybersecurity-20Readiness-20Podcast-20-20Episode-2037-20v4-converted.mp3" length="36868855" type="audio/mpeg"/><itunes:duration>38:24</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/561d9633-6a83-4187-8556-a9a6922715ba/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/561d9633-6a83-4187-8556-a9a6922715ba/index.html" type="text/html"/></item><item><title>Is Cybersecurity A Moving Target at Academic Institutions?</title><itunes:title>Is Cybersecurity A Moving Target at Academic Institutions?</itunes:title><description><![CDATA[<p>In a highly engrossing and in-depth discussion, <a href="https://www.linkedin.com/in/iamtejpatel/" rel="noopener noreferrer" target="_blank">Tej Patel, Vice President, and CIO at Stevens Institute of Technology</a> sheds light on the various information security challenges that plague academic institutions and how best to deal with them. He talks about establishing a highly collaborative and security-centric culture, structuring an ideal CIO-CISO relationship, effective execution strategies, and more.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-36-is-cybersecurity-a-moving-target-at-academic-institutions/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-36-is-cybersecurity-a-moving-target-at-academic-institutions/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>In a highly engrossing and in-depth discussion, <a href="https://www.linkedin.com/in/iamtejpatel/" rel="noopener noreferrer" target="_blank">Tej Patel, Vice President, and CIO at Stevens Institute of Technology</a> sheds light on the various information security challenges that plague academic institutions and how best to deal with them. He talks about establishing a highly collaborative and security-centric culture, structuring an ideal CIO-CISO relationship, effective execution strategies, and more.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-36-is-cybersecurity-a-moving-target-at-academic-institutions/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-36-is-cybersecurity-a-moving-target-at-academic-institutions/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/is-cybersecurity-a-moving-target-at-academic-institutions]]></link><guid isPermaLink="false">938199ff-f80c-46dd-a555-48928ad77280</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 12 Oct 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1abfad99-20b2-4841-8586-f53eec888cd3/Cybersecurity-20Readiness-20Podcast-20-20Episode-2036-20v8.mp3" length="42317112" type="audio/mpeg"/><itunes:duration>44:05</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/2c8b4133-9f55-41a3-86a9-0339ee160322/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2c8b4133-9f55-41a3-86a9-0339ee160322/index.html" type="text/html"/></item><item><title>Securely Migrating to the Cloud -- Insights from the American Cancer Society Experience</title><itunes:title>Securely Migrating to the Cloud -- Insights from the American Cancer Society Experience</itunes:title><description><![CDATA[<p>As more organizations embrace cloud-based services, securely migrating to the cloud is becoming an important capability. <a href="https://www.linkedin.com/in/keithaweller/" rel="noopener noreferrer" target="_blank">Keith Weller</a>, former Vice President, Enterprise Technology Services﻿, American Cancer Society (ACS), spearheaded a highly successful migration initiative where they transitioned a 5000-square-foot donation processing on-premise data center to the cloud. Keith and his team completed the implementation on time (in eight weeks), under budget, and helped the organization realize savings of $18 million in real estate and $2 million in technology costs (projected over three years). In this podcast, Keith shares some highlights of this cloud migration best practice. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-35-securely-migrating-to-the-cloud-insights-from-the-american-cancer-society-experience/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-35-securely-migrating-to-the-cloud-insights-from-the-american-cancer-society-experience/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>As more organizations embrace cloud-based services, securely migrating to the cloud is becoming an important capability. <a href="https://www.linkedin.com/in/keithaweller/" rel="noopener noreferrer" target="_blank">Keith Weller</a>, former Vice President, Enterprise Technology Services﻿, American Cancer Society (ACS), spearheaded a highly successful migration initiative where they transitioned a 5000-square-foot donation processing on-premise data center to the cloud. Keith and his team completed the implementation on time (in eight weeks), under budget, and helped the organization realize savings of $18 million in real estate and $2 million in technology costs (projected over three years). In this podcast, Keith shares some highlights of this cloud migration best practice. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-35-securely-migrating-to-the-cloud-insights-from-the-american-cancer-society-experience/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-35-securely-migrating-to-the-cloud-insights-from-the-american-cancer-society-experience/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/securely-migrating-to-the-cloud-insights-from-the-american-cancer-society-experience]]></link><guid isPermaLink="false">12399333-1a9b-407a-afc5-4f99b41fae9c</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 28 Sep 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/02260ad0-1f11-4d2b-aba3-00a0785d603a/Cybersecurity-20Readiness-20Podcast-20-20Episode-2035-20v2-converted.mp3" length="41785727" type="audio/mpeg"/><itunes:duration>43:31</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/fcc2e381-9ddc-4ec6-a5f8-95e9025bbee5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fcc2e381-9ddc-4ec6-a5f8-95e9025bbee5/index.html" type="text/html"/></item><item><title>Detecting Malicious Insider Threats by Monitoring User Journeys</title><itunes:title>Detecting Malicious Insider Threats by Monitoring User Journeys</itunes:title><description><![CDATA[<p><strong>﻿</strong>Insider threats are often considered the biggest risk for organizations because they can cause the most destruction. Survey reports, and studies, have found that organizations have spent millions of dollars to recover from insider threat attacks. Proactively detecting and thwarting such threats is a critical aspect of robust information security governance. <a href="https://www.linkedin.com/in/doron-hendler-63135/" rel="noopener noreferrer" target="_blank">Doron Hendler, CEO, and Co-Founder at RevealSecurit</a>y, sheds light on a context-based detection model that analyzes activity sequences performed when using an application. According to Doron, this User Journey Analytics method is a ubiquitous detection model that can be applied to any SaaS and custom-built application. Since no rules are required, it eliminates the need to fully understand the application business logic.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-34-detecting-malicious-insider-threats-by-monitoring-user-journeys/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-34-detecting-malicious-insider-threats-by-monitoring-user-journeys/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p><strong>﻿</strong>Insider threats are often considered the biggest risk for organizations because they can cause the most destruction. Survey reports, and studies, have found that organizations have spent millions of dollars to recover from insider threat attacks. Proactively detecting and thwarting such threats is a critical aspect of robust information security governance. <a href="https://www.linkedin.com/in/doron-hendler-63135/" rel="noopener noreferrer" target="_blank">Doron Hendler, CEO, and Co-Founder at RevealSecurit</a>y, sheds light on a context-based detection model that analyzes activity sequences performed when using an application. According to Doron, this User Journey Analytics method is a ubiquitous detection model that can be applied to any SaaS and custom-built application. Since no rules are required, it eliminates the need to fully understand the application business logic.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-34-detecting-malicious-insider-threats-by-monitoring-user-journeys/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-34-detecting-malicious-insider-threats-by-monitoring-user-journeys/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/detecting-malicious-insider-threats-by-monitoring-user-journeys]]></link><guid isPermaLink="false">34b20911-0f00-4b42-9ea7-a26a7edf76d8</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 14 Sep 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/6ef2cd2b-86cd-4ab1-b180-b2eb39e4f677/Cybersecurity-20Readiness-20Podcast-20-20Ep-2034-20v2.mp3" length="26309693" type="audio/mpeg"/><itunes:duration>27:24</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/e1db31ab-8f4a-4631-b693-ac732caf2c34/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e1db31ab-8f4a-4631-b693-ac732caf2c34/index.html" type="text/html"/></item><item><title>Skilling Up for Security Operations Center Roles</title><itunes:title>Skilling Up for Security Operations Center Roles</itunes:title><description><![CDATA[<p>The Security Operations Center (SOC) is at the heart of an organization's cyber defense system. Highly skilled and motivated personnel must work in these centers. <a href="https://www.linkedin.com/in/jrisler/" rel="noopener noreferrer" target="_blank">James Risler, Senior Manager, Cisco Learning and Certifications</a>, discussed the roles of the security engineer and the security analyst and the hard and soft skills needed to be effective in those functions. While the ability to code, learn computer forensics techniques, and know how to operationalize MITRE attacks are top skills, the ability to communicate effectively is equally important. Jim strongly recommends that academic institutions partner up with industry to provide hands-on training opportunities and also engage in security solutions-focused research. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-33-skilling-up-for-security-operations-center-roles/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-33-skilling-up-for-security-operations-center-roles/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>The Security Operations Center (SOC) is at the heart of an organization's cyber defense system. Highly skilled and motivated personnel must work in these centers. <a href="https://www.linkedin.com/in/jrisler/" rel="noopener noreferrer" target="_blank">James Risler, Senior Manager, Cisco Learning and Certifications</a>, discussed the roles of the security engineer and the security analyst and the hard and soft skills needed to be effective in those functions. While the ability to code, learn computer forensics techniques, and know how to operationalize MITRE attacks are top skills, the ability to communicate effectively is equally important. Jim strongly recommends that academic institutions partner up with industry to provide hands-on training opportunities and also engage in security solutions-focused research. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-33-skilling-up-for-security-operations-center-roles/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-33-skilling-up-for-security-operations-center-roles/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/skilling-up-for-security-operations-center-roles]]></link><guid isPermaLink="false">a626722c-9d16-4a66-b320-5eeacfcd1090</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 31 Aug 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7889bd4f-2c9f-4a4f-b846-78f6d549e26d/Cybersecurity-20Readiness-20Podcast-20-20Episode-2033-20v2.mp3" length="37834752" type="audio/mpeg"/><itunes:duration>39:25</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/e23763fe-7443-4d6b-bc1b-898104ba1af0/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e23763fe-7443-4d6b-bc1b-898104ba1af0/index.html" type="text/html"/></item><item><title>Bridging the Gap Between Intentions and Practicality in Cybersecurity</title><itunes:title>Bridging the Gap Between Intentions and Practicality in Cybersecurity</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/daniela-almeida-louren%C3%A7o-43825256/" rel="noopener noreferrer" target="_blank">Daniela Almeida Lourenco, Chief Information Security Officer (CISO) at Tinka</a>, firmly believes that CISOs have the very best of intentions -- "we all mean the best; we all want to protect the organization, and that is all we want to do." However, often the reality of the Board's lack of a cybersecurity mindset coupled with insufficient budget and resources results "in a reactive posture, unpreparedness, unclear risk management strategy, and low response maturity." She also highlights "the misinterpretation and implementation of the lines of defense model" to be another reason why right intentions do not get translated into good practices. Advocating for a more hands-on senior management role, Daniela says, "if you're on the second line of defense, you're not supposed to just sit on your highchair and disconnect from Operation." She also expresses concern about the excessive use of the 'fear factor' in cybersecurity communications. Finally, Daniela recommends against reinventing the current culture but making suitable adaptations by embedding new practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-32-bridging-the-gap-between-intentions-and-practicality-in-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-32-bridging-the-gap-between-intentions-and-practicality-in-cybersecurity/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/daniela-almeida-louren%C3%A7o-43825256/" rel="noopener noreferrer" target="_blank">Daniela Almeida Lourenco, Chief Information Security Officer (CISO) at Tinka</a>, firmly believes that CISOs have the very best of intentions -- "we all mean the best; we all want to protect the organization, and that is all we want to do." However, often the reality of the Board's lack of a cybersecurity mindset coupled with insufficient budget and resources results "in a reactive posture, unpreparedness, unclear risk management strategy, and low response maturity." She also highlights "the misinterpretation and implementation of the lines of defense model" to be another reason why right intentions do not get translated into good practices. Advocating for a more hands-on senior management role, Daniela says, "if you're on the second line of defense, you're not supposed to just sit on your highchair and disconnect from Operation." She also expresses concern about the excessive use of the 'fear factor' in cybersecurity communications. Finally, Daniela recommends against reinventing the current culture but making suitable adaptations by embedding new practices.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-32-bridging-the-gap-between-intentions-and-practicality-in-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-32-bridging-the-gap-between-intentions-and-practicality-in-cybersecurity/</a></p><p class="ql-align-center">﻿</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/bridging-the-gap-between-intentions-and-practicality-in-cybersecurity]]></link><guid isPermaLink="false">c2aea2df-2961-48d3-8d45-4cc270616bef</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 17 Aug 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/1e2e5db9-8fd2-4c31-bfc5-111fc556e4e5/Cybersecurity-20Readiness-20Podcast-20-20Episode-2032-20v3.mp3" length="40946688" type="audio/mpeg"/><itunes:duration>42:39</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/03b3f227-2d48-4b34-a428-066310db8286/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/03b3f227-2d48-4b34-a428-066310db8286/index.html" type="text/html"/></item><item><title>Preparing for the Future of Device Management</title><itunes:title>Preparing for the Future of Device Management</itunes:title><description><![CDATA[<p>With the growing move towards a hybrid and remote work environment, more and more people are relying on their smart devices to get work done. Keeping track of all of these devices, and ensuring that they are being used in a very secure manner, can be a challenging proposition. A recent survey finds organizations unprepared and overwhelmed with managing thousands or hundreds of thousands of these endpoint devices. <a href="https://www.linkedin.com/in/mikermcneil/" rel="noopener noreferrer" target="_blank">Mike McNeill, CEO, Fleet Device Management</a>, sheds light on some of these critical security issues and addresses questions such as: How does an organization manage its devices? Do they know if their devices are compliant and secure? Do they have ways to query them to learn more about their status in real-time? Mike also offers recommendations on how to prepare for the future of device management.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-31-preparing-for-the-future-of-device-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-31-preparing-for-the-future-of-device-management/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>With the growing move towards a hybrid and remote work environment, more and more people are relying on their smart devices to get work done. Keeping track of all of these devices, and ensuring that they are being used in a very secure manner, can be a challenging proposition. A recent survey finds organizations unprepared and overwhelmed with managing thousands or hundreds of thousands of these endpoint devices. <a href="https://www.linkedin.com/in/mikermcneil/" rel="noopener noreferrer" target="_blank">Mike McNeill, CEO, Fleet Device Management</a>, sheds light on some of these critical security issues and addresses questions such as: How does an organization manage its devices? Do they know if their devices are compliant and secure? Do they have ways to query them to learn more about their status in real-time? Mike also offers recommendations on how to prepare for the future of device management.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-31-preparing-for-the-future-of-device-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-31-preparing-for-the-future-of-device-management/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/preparing-for-the-future-of-device-management]]></link><guid isPermaLink="false">a70266b0-f1f3-4001-8a28-e7d21717e070</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 03 Aug 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a4874085-06f9-4e1a-814a-e1bb327b728c/Cybersecurity-20Readiness-20Podcast-20-20Episode-2031-20v3.mp3" length="31521024" type="audio/mpeg"/><itunes:duration>32:50</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/22d32a5d-e7dd-4d0e-81cc-42109b057720/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/22d32a5d-e7dd-4d0e-81cc-42109b057720/index.html" type="text/html"/></item><item><title>The State of Attack Surface Management</title><itunes:title>The State of Attack Surface Management</itunes:title><description><![CDATA[<p>With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge.  A recent survey report on the state of attack surface management (ASM) finds security teams drowning in a flood of legacy and ineffective tools with limited discovery capabilities. The need for ASM platforms with advanced digital asset detection capabilities is revealed in the survey findings.  <a href="https://www.linkedin.com/in/davidmonnier/" rel="noopener noreferrer" target="_blank">David Monnier, Team Cymru Fellow</a>, sheds light on the latest ASM platform capabilities and discusses the implementation challenges and success factors.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-30-the-state-of-attack-surface-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-30-the-state-of-attack-surface-management/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>With increasing digitization and the use of cloud-hosted assets, managing attack surfaces continues to be a major challenge.  A recent survey report on the state of attack surface management (ASM) finds security teams drowning in a flood of legacy and ineffective tools with limited discovery capabilities. The need for ASM platforms with advanced digital asset detection capabilities is revealed in the survey findings.  <a href="https://www.linkedin.com/in/davidmonnier/" rel="noopener noreferrer" target="_blank">David Monnier, Team Cymru Fellow</a>, sheds light on the latest ASM platform capabilities and discusses the implementation challenges and success factors.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-30-the-state-of-attack-surface-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-30-the-state-of-attack-surface-management/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/the-state-of-attack-surface-management]]></link><guid isPermaLink="false">d34a9be6-2006-45a5-ab26-71c5a24feeb8</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 20 Jul 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3afa357-26a9-466f-8fcc-a8813ab8b957/Cybersecurity-20Readiness-20Podcast-20-20Episode-2030-20v2.mp3" length="45170641" type="audio/mpeg"/><itunes:duration>47:03</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/5a47d14b-7267-4859-a61b-7322ae88a839/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5a47d14b-7267-4859-a61b-7322ae88a839/index.html" type="text/html"/></item><item><title>Global Security and Post Breach Management Best Practices</title><itunes:title>Global Security and Post Breach Management Best Practices</itunes:title><description><![CDATA[<p>"If you can plan for the zombie apocalypse, you can probably face just about anything," said  <a href="https://www.linkedin.com/in/tim-callahan-4b39241/" rel="noopener noreferrer" target="_blank">Tim Callahan, Senior Vice President, and Global Chief Information Security Officer, Aflac</a> during a talk in my Master's level class on cybersecurity readiness at Duke University. In this podcast, Tim describes the key elements of an effective crisis management framework and shares several best practices. Some of the highlights of a robust business resiliency and recovery posture include -- a) well thought-out and rehearsed plan that takes into consideration different scenarios; b) world-class forensics team; c) strong partnership with Legal, HR, Law Enforcement (local FBI and Secret Service), Department of Treasury, and independent agents; d) highly trained in-house teams focused on response and recovery; e) leveraging open-source and paid intelligence; f) CEO led strong commitment throughout the organization; g) honest and candid communication; h) rewards and incentive programs such as the Global Security Challenge Coin; and j) building a caring and empathetic work culture.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-29-global-security-and-post-breach-management-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-29-global-security-and-post-breach-management-best-practices/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>"If you can plan for the zombie apocalypse, you can probably face just about anything," said  <a href="https://www.linkedin.com/in/tim-callahan-4b39241/" rel="noopener noreferrer" target="_blank">Tim Callahan, Senior Vice President, and Global Chief Information Security Officer, Aflac</a> during a talk in my Master's level class on cybersecurity readiness at Duke University. In this podcast, Tim describes the key elements of an effective crisis management framework and shares several best practices. Some of the highlights of a robust business resiliency and recovery posture include -- a) well thought-out and rehearsed plan that takes into consideration different scenarios; b) world-class forensics team; c) strong partnership with Legal, HR, Law Enforcement (local FBI and Secret Service), Department of Treasury, and independent agents; d) highly trained in-house teams focused on response and recovery; e) leveraging open-source and paid intelligence; f) CEO led strong commitment throughout the organization; g) honest and candid communication; h) rewards and incentive programs such as the Global Security Challenge Coin; and j) building a caring and empathetic work culture.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-29-global-security-and-post-breach-management-best-practices/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-29-global-security-and-post-breach-management-best-practices/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/global-security-and-post-breach-management-best-practices]]></link><guid isPermaLink="false">0ca50ec8-c3f5-4fc8-bc87-baa861c86f5a</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 06 Jul 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e0da506d-eec8-48a8-b5fe-cbd8f3dc719b/Cybersecurity-20Readiness-20Podcast-20-20Episode-2029-20v9.mp3" length="38848322" type="audio/mpeg"/><itunes:duration>40:27</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/024f1d7b-644a-4cfe-a046-b114c3abf82c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/024f1d7b-644a-4cfe-a046-b114c3abf82c/index.html" type="text/html"/></item><item><title>How to Tackle Burnout in Cybersecurity</title><itunes:title>How to Tackle Burnout in Cybersecurity</itunes:title><description><![CDATA[<p>Security Operating Center (SOC) staff members are often consumed with tedious manual tasks that lead to burnout and can cost organizations millions of dollars in losses due to human error. <a href="https://www.linkedin.com/in/thomas-kinsella/" rel="noopener noreferrer" target="_blank">Thomas Kinsella, Co-Founder &amp; Chief Operating Officer at Tines</a> discusses at length the challenges faced by SOC team members and makes actionable recommendations on how to decrease burnouts, increase retention, and create a better work environment for the security analysts.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-28-how-to-tackle-burnout-in-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-28-how-to-tackle-burnout-in-cybersecurity/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>Security Operating Center (SOC) staff members are often consumed with tedious manual tasks that lead to burnout and can cost organizations millions of dollars in losses due to human error. <a href="https://www.linkedin.com/in/thomas-kinsella/" rel="noopener noreferrer" target="_blank">Thomas Kinsella, Co-Founder &amp; Chief Operating Officer at Tines</a> discusses at length the challenges faced by SOC team members and makes actionable recommendations on how to decrease burnouts, increase retention, and create a better work environment for the security analysts.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-28-how-to-tackle-burnout-in-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-28-how-to-tackle-burnout-in-cybersecurity/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">﻿<strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/how-to-tackle-burnout-in-cybersecurity]]></link><guid isPermaLink="false">d6ea5015-3582-4832-b054-0017322a6588</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 22 Jun 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/53607a7a-0852-4ee8-9949-5271bf3c6306/Cybersecurity-20Readiness-20Podcast-20-20Thomas-20Kinsella.mp3" length="50608146" type="audio/mpeg"/><itunes:duration>52:43</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/b70f3071-7a40-4588-b786-c4bcc1a16cea/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b70f3071-7a40-4588-b786-c4bcc1a16cea/index.html" type="text/html"/></item><item><title>Actionable Threat Intelligence and the Dark Web</title><itunes:title>Actionable Threat Intelligence and the Dark Web</itunes:title><description><![CDATA[<p>In a recent news release, Reuters reported that "United States has offered a $15 million reward for information on Conti ransomware group. The FBI estimates that more than 1,000 victims of the Conti group have paid a total in excess of $150 million in ransomware payments." <a href="https://www.linkedin.com/in/victoria-kivilevich-348786b5/" rel="noopener noreferrer" target="_blank">&nbsp;Victoria Kivilevich, Director of Threat Research at KELA Group</a>, describes the cybercrime ecosystem and provides guidance on how to gain and leverage actionable intelligence from dark and deep web resources.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-27-actionable-threat-intelligence-and-the-dark-web/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-27-actionable-threat-intelligence-and-the-dark-web/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>In a recent news release, Reuters reported that "United States has offered a $15 million reward for information on Conti ransomware group. The FBI estimates that more than 1,000 victims of the Conti group have paid a total in excess of $150 million in ransomware payments." <a href="https://www.linkedin.com/in/victoria-kivilevich-348786b5/" rel="noopener noreferrer" target="_blank">&nbsp;Victoria Kivilevich, Director of Threat Research at KELA Group</a>, describes the cybercrime ecosystem and provides guidance on how to gain and leverage actionable intelligence from dark and deep web resources.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-27-actionable-threat-intelligence-and-the-dark-web/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-27-actionable-threat-intelligence-and-the-dark-web/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>﻿Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/threat-intelligence-and-the-dark-web]]></link><guid isPermaLink="false">540a5c05-03e6-400c-802d-1e70b1db37e8</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 08 Jun 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0ebfa110-e566-4c46-b151-46e42d44005d/Cybersecurity-20Readiness-20Podcast-20-20Victoria-20kivilevich.mp3" length="34095877" type="audio/mpeg"/><itunes:duration>35:30</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/358d54ac-d26d-4502-b53a-990f40d133df/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/358d54ac-d26d-4502-b53a-990f40d133df/index.html" type="text/html"/></item><item><title>Reducing the Disconnect Between Security and Development Teams</title><itunes:title>Reducing the Disconnect Between Security and Development Teams</itunes:title><description><![CDATA[<p>How do you make security a first-class citizen of the software development process? According to an industry report, “many information security engineers don’t understand software development—and most software developers don’t understand security. Developers and their managers are focused on delivering features and meeting time-to-market expectations, rather than on making sure that software is secure.” <a href="https://www.linkedin.com/in/harshil/" rel="noopener noreferrer" target="_blank">Harshil Parikh, CEO and Co-Founder Tromzo</a>, shares best practices for reducing the disconnect between software development and information security engineers. One such practice is the establishing and automation of security guardrails for application development.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-26-reducing-the-disconnect-between-security-and-development-teams/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-26-reducing-the-disconnect-between-security-and-development-teams/</a> </p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>How do you make security a first-class citizen of the software development process? According to an industry report, “many information security engineers don’t understand software development—and most software developers don’t understand security. Developers and their managers are focused on delivering features and meeting time-to-market expectations, rather than on making sure that software is secure.” <a href="https://www.linkedin.com/in/harshil/" rel="noopener noreferrer" target="_blank">Harshil Parikh, CEO and Co-Founder Tromzo</a>, shares best practices for reducing the disconnect between software development and information security engineers. One such practice is the establishing and automation of security guardrails for application development.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-26-reducing-the-disconnect-between-security-and-development-teams/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-26-reducing-the-disconnect-between-security-and-development-teams/</a> </p><p class="ql-align-center"><br></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/reducing-the-disconnect-between-security-and-development-teams]]></link><guid isPermaLink="false">c4a364e0-a284-4d3d-82f9-f9e0991ce655</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 25 May 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4d14821e-9288-4a72-ab99-ee46b97d4618/Cybersecurity-20Readiness-20Podcast-20-20Harshil-20Parikh-20v2.mp3" length="30526562" type="audio/mpeg"/><itunes:duration>31:47</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/206bf2ca-c182-482b-84c0-2a82fdc28051/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/206bf2ca-c182-482b-84c0-2a82fdc28051/index.html" type="text/html"/></item><item><title>Perspectives of a Global Chief Information Security Officer</title><itunes:title>Perspectives of a Global Chief Information Security Officer</itunes:title><description><![CDATA[<p>In a wide-ranging discussion, <a href="https://www.linkedin.com/in/vishalsalvi/" rel="noopener noreferrer" target="_blank">Vishal Salvi, CISO &amp; Head of Cyber Practice at Infosys</a>, sheds light on a range of topics from CISO empowerment to creating and sustaining a high-performance information security culture. He highlights the importance of "delivering on your agenda" for CISOs to gain trust and credibility. Vishal also recommends making the CISO role independent of the CIO, uniformly enforcing security policies across the organizational hierarchy, and operating at a high state of readiness.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-25-perspectives-of-a-global-chief-information-security-officer/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-25-perspectives-of-a-global-chief-information-security-officer/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>In a wide-ranging discussion, <a href="https://www.linkedin.com/in/vishalsalvi/" rel="noopener noreferrer" target="_blank">Vishal Salvi, CISO &amp; Head of Cyber Practice at Infosys</a>, sheds light on a range of topics from CISO empowerment to creating and sustaining a high-performance information security culture. He highlights the importance of "delivering on your agenda" for CISOs to gain trust and credibility. Vishal also recommends making the CISO role independent of the CIO, uniformly enforcing security policies across the organizational hierarchy, and operating at a high state of readiness.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-25-perspectives-of-a-global-chief-information-security-officer/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-25-perspectives-of-a-global-chief-information-security-officer/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/perspectives-of-a-global-ciso]]></link><guid isPermaLink="false">79a824ce-52b7-41d2-a1ba-b0f38739256f</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 11 May 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a2d15846-8112-4db6-aba9-88d3733136df/Cyber-20Security-20Readiness-20Podcast-20-20Vishal-20Salvi-20Po.mp3" length="43390848" type="audio/mpeg"/><itunes:duration>45:12</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/9ed8641d-54c5-408e-a858-949c24395e18/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9ed8641d-54c5-408e-a858-949c24395e18/index.html" type="text/html"/></item><item><title>Thinking Like A Hacker</title><itunes:title>Thinking Like A Hacker</itunes:title><description><![CDATA[<p>Using compelling stories and metaphors, <a href="https://www.linkedin.com/in/securityted/" rel="noopener noreferrer" target="_blank">Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent Security Evaluators</a>, explains the process of hacking and the importance of being able to think like a hacker. He encourages leaders to get excited about information security investments and look for ways of gaining a competitive edge from those investments.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-24-thinking-like-a-hacker/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-24-thinking-like-a-hacker/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>Using compelling stories and metaphors, <a href="https://www.linkedin.com/in/securityted/" rel="noopener noreferrer" target="_blank">Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent Security Evaluators</a>, explains the process of hacking and the importance of being able to think like a hacker. He encourages leaders to get excited about information security investments and look for ways of gaining a competitive edge from those investments.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-24-thinking-like-a-hacker/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-24-thinking-like-a-hacker/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/thinking-like-a-hacker]]></link><guid isPermaLink="false">eb32ed1f-5410-40bb-8004-95efbfabd0da</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 27 Apr 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/262cc106-b223-4a67-8511-68f1288abdb6/Ted-20Harrington-20Interview-20V3.mp3" length="72618168" type="audio/mpeg"/><itunes:duration>50:23</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/fc03c503-4480-4c4e-80fe-9711dc90f571/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fc03c503-4480-4c4e-80fe-9711dc90f571/index.html" type="text/html"/></item><item><title>Is Cybersecurity Regulatory Compliance Good Enough?</title><itunes:title>Is Cybersecurity Regulatory Compliance Good Enough?</itunes:title><description><![CDATA[<p>"The story of the RMS Titanic has served as a grim reminder that regulatory compliance does not guarantee safety or security. The ship was carrying 2,224 passengers and crew when it sank one April night in 1912, killing over 1,500 people. The designers of Titanic had followed the British Board of Trade by equipping it with 20 lifeboats, and even threw in four more than the regulations required." (securicon.com) <a href="https://www.linkedin.com/in/dixon-wright-aab68321/" rel="noopener noreferrer" target="_blank">Dixon Wright, Vice President, Vice President, Compliance Management and Automation Platform, Coalfire</a>, speaks to the importance of moving beyond the check-the-box approach and engaging in substantive information security compliance efforts. He recommends the judicious adoption and use of appropriate compliance management and automation platforms.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-23-is-cybersecurity-regulatory-compliance-good-enough/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-23-is-cybersecurity-regulatory-compliance-good-enough/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>"The story of the RMS Titanic has served as a grim reminder that regulatory compliance does not guarantee safety or security. The ship was carrying 2,224 passengers and crew when it sank one April night in 1912, killing over 1,500 people. The designers of Titanic had followed the British Board of Trade by equipping it with 20 lifeboats, and even threw in four more than the regulations required." (securicon.com) <a href="https://www.linkedin.com/in/dixon-wright-aab68321/" rel="noopener noreferrer" target="_blank">Dixon Wright, Vice President, Vice President, Compliance Management and Automation Platform, Coalfire</a>, speaks to the importance of moving beyond the check-the-box approach and engaging in substantive information security compliance efforts. He recommends the judicious adoption and use of appropriate compliance management and automation platforms.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-23-is-cybersecurity-regulatory-compliance-good-enough/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-23-is-cybersecurity-regulatory-compliance-good-enough/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/is-cybersecurity-regulatory-compliance-good-enough]]></link><guid isPermaLink="false">465ffad4-c633-4301-8c1c-1178e982f3af</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 13 Apr 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/46a3bfa4-0a72-4924-92e6-a040c3c683a6/Dixon-20Wright-20Interview-20V4-mixdown.mp3" length="59339962" type="audio/mpeg"/><itunes:duration>41:10</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/8d960a92-3331-4eb8-b740-f31dcc4fcd4e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8d960a92-3331-4eb8-b740-f31dcc4fcd4e/index.html" type="text/html"/></item><item><title>Is Cyber Insurance Necessary?</title><itunes:title>Is Cyber Insurance Necessary?</itunes:title><description><![CDATA[<p>"Security experts are split on cyber insurance and its place in business, with just as many arguing that it is a useless add-on as an essential business enabler." A KPMG study indicated that these policies were not overly trusted by business leaders. In this podcast episode, <a href="https://www.linkedin.com/in/erica-davis-1287964a/" rel="noopener noreferrer" target="_blank">Erica Davis, Global Co-Head of Cyber, Guy Carpenter &amp; Co</a>, discusses at length the different types of coverages, how underwriters evaluate and assess cyber risks, the current state of the market, re-insurance mechanisms, and more. She also offers valuable guidance on how to plan and approach cyber insurance-related decisions. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-22-is-cyber-insurance-necessary/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-22-is-cyber-insurance-necessary/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>"Security experts are split on cyber insurance and its place in business, with just as many arguing that it is a useless add-on as an essential business enabler." A KPMG study indicated that these policies were not overly trusted by business leaders. In this podcast episode, <a href="https://www.linkedin.com/in/erica-davis-1287964a/" rel="noopener noreferrer" target="_blank">Erica Davis, Global Co-Head of Cyber, Guy Carpenter &amp; Co</a>, discusses at length the different types of coverages, how underwriters evaluate and assess cyber risks, the current state of the market, re-insurance mechanisms, and more. She also offers valuable guidance on how to plan and approach cyber insurance-related decisions. </p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-22-is-cyber-insurance-necessary/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-22-is-cyber-insurance-necessary/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/is-cyber-insurance-necessary]]></link><guid isPermaLink="false">091695d9-662b-4f63-8751-28a7d0f1f7fa</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 30 Mar 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e9d480ff-f999-4deb-a185-781a60a9db03/Erica-Davis-Interview-V2-mixdown.mp3" length="55953280" type="audio/mpeg"/><itunes:duration>38:49</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/5587593b-c548-45d5-b8b0-eda22e907883/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5587593b-c548-45d5-b8b0-eda22e907883/index.html" type="text/html"/></item><item><title>Dealing with Cyber Trauma</title><itunes:title>Dealing with Cyber Trauma</itunes:title><description><![CDATA[<p>The phenomenon of cyber trauma is very real and individuals and organizations are often not adequately prepared to deal with it. <a href="https://www.linkedin.com/in/kpatrickwheeler/" rel="noopener noreferrer" target="_blank">Patrick Wheeler</a>, a Luxembourg-based cybersecurity practitioner and Director of the <a href="https://www.cyberwayfinder.com/" rel="noopener noreferrer" target="_blank">Cyber Wayfinde</a>r program, shares his experience in dealing with cyber trauma incidents. He also talks about the Cyber Wayfinder program that is designed to help people with diverse life experiences and skillsets pivot to cybersecurity careers. Patrick passionately argues for removing the artificial barriers to attract a diverse cybersecurity talent pool. To quote him, "why is it that everyone says you have to be a STEM graduate to work in cybersecurity, some of my best colleagues and peers do not have a STEM degree. One of the best cryptographers I know has a degree in international business."</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-21-dealing-with-cyber-trauma/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-21-dealing-with-cyber-trauma/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>The phenomenon of cyber trauma is very real and individuals and organizations are often not adequately prepared to deal with it. <a href="https://www.linkedin.com/in/kpatrickwheeler/" rel="noopener noreferrer" target="_blank">Patrick Wheeler</a>, a Luxembourg-based cybersecurity practitioner and Director of the <a href="https://www.cyberwayfinder.com/" rel="noopener noreferrer" target="_blank">Cyber Wayfinde</a>r program, shares his experience in dealing with cyber trauma incidents. He also talks about the Cyber Wayfinder program that is designed to help people with diverse life experiences and skillsets pivot to cybersecurity careers. Patrick passionately argues for removing the artificial barriers to attract a diverse cybersecurity talent pool. To quote him, "why is it that everyone says you have to be a STEM graduate to work in cybersecurity, some of my best colleagues and peers do not have a STEM degree. One of the best cryptographers I know has a degree in international business."</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-21-dealing-with-cyber-trauma/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-21-dealing-with-cyber-trauma/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/dealing-with-cyber-trauma]]></link><guid isPermaLink="false">5f66229b-1377-453b-8fe4-3a25056c8458</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 16 Mar 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/030f706d-323a-4c90-b527-52da949731f1/patrick-wheeler-interview-v2-mixdown.mp3" length="58621080" type="audio/mpeg"/><itunes:duration>40:40</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/9351b769-6d44-46c0-80d5-33e2375ddd1a/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9351b769-6d44-46c0-80d5-33e2375ddd1a/index.html" type="text/html"/></item><item><title>A Deep Dive into Ransomware Attacks and Negotiations</title><itunes:title>A Deep Dive into Ransomware Attacks and Negotiations</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/art-ehuan-9826aa1/" rel="noopener noreferrer" target="_blank">Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent</a>, discusses at length the unfortunate evolution and escalation of ransomware attacks. He explains how the threat actors have upped their game and are now engaging in double, triple, and quadruple extortions. While lamenting that "organizations continue to make the same mistakes," Art also acknowledges the challenges of vulnerability management. He offers some interesting insights into ransomware negotiations and provides excellent advice and recommendations on how to proactively thwart such attacks.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-20-a-deep-dive-into-ransomware-attacks-and-negotiations/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-20-a-deep-dive-into-ransomware-attacks-and-negotiations/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/art-ehuan-9826aa1/" rel="noopener noreferrer" target="_blank">Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent</a>, discusses at length the unfortunate evolution and escalation of ransomware attacks. He explains how the threat actors have upped their game and are now engaging in double, triple, and quadruple extortions. While lamenting that "organizations continue to make the same mistakes," Art also acknowledges the challenges of vulnerability management. He offers some interesting insights into ransomware negotiations and provides excellent advice and recommendations on how to proactively thwart such attacks.</p><p>To access and download the entire podcast summary with discussion highlights -- </p><p><a href="https://www.dchatte.com/episode-20-a-deep-dive-into-ransomware-attacks-and-negotiations/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-20-a-deep-dive-into-ransomware-attacks-and-negotiations/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/a-deep-dive-into-ransomware-attacks-and-negotiations]]></link><guid isPermaLink="false">b1d2258b-df62-4719-a1b8-339f7f3f8d94</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 02 Mar 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a243f846-1770-40ff-8eb3-93ecec17a579/art-euhaninterview-v2-mixdown.mp3" length="80661170" type="audio/mpeg"/><itunes:duration>55:59</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/96a2611f-e1cd-44ab-af82-5704ff20fae6/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/96a2611f-e1cd-44ab-af82-5704ff20fae6/index.html" type="text/html"/></item><item><title>Making Cybersecurity Communication Effective</title><itunes:title>Making Cybersecurity Communication Effective</itunes:title><description><![CDATA[<p>Cybersecurity communication should be simple, immersive, attractive, continuous, and multi-channel, says <a href="https://www.linkedin.com/in/marcin-ganclerz-39519815b/" rel="noopener noreferrer" target="_blank">Marcin Ganclerz</a>, a subject matter expert. He passionately argues for creating a 'culture of enablement and not fear' so employees can play a vital role in enhancing cybersecurity communication effectiveness. Marcin also shares several examples and best practices in support of his recommendations.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-19-making-cybersecurity-communication-effective/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-19-making-cybersecurity-communication-effective/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>Cybersecurity communication should be simple, immersive, attractive, continuous, and multi-channel, says <a href="https://www.linkedin.com/in/marcin-ganclerz-39519815b/" rel="noopener noreferrer" target="_blank">Marcin Ganclerz</a>, a subject matter expert. He passionately argues for creating a 'culture of enablement and not fear' so employees can play a vital role in enhancing cybersecurity communication effectiveness. Marcin also shares several examples and best practices in support of his recommendations.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-19-making-cybersecurity-communication-effective/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-19-making-cybersecurity-communication-effective/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/making-cybersecurity-communication-effective]]></link><guid isPermaLink="false">19e26f34-193c-4bc7-9834-1bc609fe3bc7</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 16 Feb 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3769dec1-6c3f-4366-bb2a-6c5c0102464e/marcin-ganclerz-interview-v3-mixdown.mp3" length="68166865" type="audio/mpeg"/><itunes:duration>47:18</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/6068df2b-7373-4387-ab89-027176ecd889/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/6068df2b-7373-4387-ab89-027176ecd889/index.html" type="text/html"/></item><item><title>Securing the Smart Supply Chain</title><itunes:title>Securing the Smart Supply Chain</itunes:title><description><![CDATA[<p>In episode 18, <a href="https://www.linkedin.com/in/alanmihalic/" rel="noopener noreferrer" target="_blank">Alan Mihalic, President IoT Security Institute</a>, speaks to the challenges and success factors associated with securing Internet-of-Things (IoT) devices in smart supply chains. He draws upon the IoT Security Framework to share some guiding principles and practices to help supply chain participants specify, procure, install, integrate, operate, and maintain IoT securely for smart cities and critical infrastructure.  </p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-18-securing-the-smart-supply-chain/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-18-securing-the-smart-supply-chain/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>In episode 18, <a href="https://www.linkedin.com/in/alanmihalic/" rel="noopener noreferrer" target="_blank">Alan Mihalic, President IoT Security Institute</a>, speaks to the challenges and success factors associated with securing Internet-of-Things (IoT) devices in smart supply chains. He draws upon the IoT Security Framework to share some guiding principles and practices to help supply chain participants specify, procure, install, integrate, operate, and maintain IoT securely for smart cities and critical infrastructure.  </p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-18-securing-the-smart-supply-chain/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-18-securing-the-smart-supply-chain/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/securing-the-smart-supply-chain]]></link><guid isPermaLink="false">3a24b05b-2c2a-4a32-a688-0d8c459ba129</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 02 Feb 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2e1de697-1e03-4f8c-8f79-4bdfed1af32b/alan-mihalic-interview-v2.mp3" length="68904177" type="audio/mpeg"/><itunes:duration>47:49</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/234ca761-2d73-48c3-8274-82af68cf965c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/234ca761-2d73-48c3-8274-82af68cf965c/index.html" type="text/html"/></item><item><title>Reducing the Carbon Footprint</title><itunes:title>Reducing the Carbon Footprint</itunes:title><description><![CDATA[<p>When justifying cybersecurity investments, <a href="https://www.linkedin.com/in/andy-bates-3107b41/" rel="noopener noreferrer" target="_blank">Andy Bates, Chief Development and Strategic Partnership Officer, Global Cyber Alliance</a>, recommends making the business case from the standpoint of reducing the carbon footprint. He feels people will make a stronger emotional connection with the carbon reduction argument and thereby be more willing to fund and participate in cybersecurity initiatives. Changing up the cyber conversation and making it more relatable was one of the key takeaways from this discussion. Andy also talked about the vision and offerings of the non-profit organization <a href="https://www.globalcyberalliance.org/" rel="noopener noreferrer" target="_blank">Global Cyber Alliance</a>.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-17-reducing-the-carbon-footprint/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-17-reducing-the-carbon-footprint/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>When justifying cybersecurity investments, <a href="https://www.linkedin.com/in/andy-bates-3107b41/" rel="noopener noreferrer" target="_blank">Andy Bates, Chief Development and Strategic Partnership Officer, Global Cyber Alliance</a>, recommends making the business case from the standpoint of reducing the carbon footprint. He feels people will make a stronger emotional connection with the carbon reduction argument and thereby be more willing to fund and participate in cybersecurity initiatives. Changing up the cyber conversation and making it more relatable was one of the key takeaways from this discussion. Andy also talked about the vision and offerings of the non-profit organization <a href="https://www.globalcyberalliance.org/" rel="noopener noreferrer" target="_blank">Global Cyber Alliance</a>.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-17-reducing-the-carbon-footprint/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-17-reducing-the-carbon-footprint/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/reducing-the-carbon-footprint]]></link><guid isPermaLink="false">3b049e35-5d7b-4e1b-8428-932740763efd</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 19 Jan 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e572a475-38ac-4f67-a2ef-598a3115b769/andy-bates-interview-v3-mixdown.mp3" length="62489471" type="audio/mpeg"/><itunes:duration>43:23</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/17a58943-693e-4020-bd77-a79e58764ddf/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/17a58943-693e-4020-bd77-a79e58764ddf/index.html" type="text/html"/></item><item><title>Role of Emotional Intelligence in Creating a Healthy Information Security Culture</title><itunes:title>Role of Emotional Intelligence in Creating a Healthy Information Security Culture</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/nadja-elfertasi/" rel="noopener noreferrer" target="_blank">Nadia El Fertasi, Human Readiness and Resilience Expert and former NATO senior executive,</a> highlights the importance of leveraging emotional intelligence to create and sustain a healthy information security culture. During a very thought-provoking discussion, Nadja made some poignant statements and recommendations such as a) build a culture of empowerment and not fear, b) use empathy to counter social engineering attacks, c) make cyber hygiene practices non-technical and reduce human firewalls, and d) practice reason over fear.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-16-role-of-emotional-intelligence-in-creating-a-healthy-information-security-culture/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-16-role-of-emotional-intelligence-in-creating-a-healthy-information-security-culture/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/nadja-elfertasi/" rel="noopener noreferrer" target="_blank">Nadia El Fertasi, Human Readiness and Resilience Expert and former NATO senior executive,</a> highlights the importance of leveraging emotional intelligence to create and sustain a healthy information security culture. During a very thought-provoking discussion, Nadja made some poignant statements and recommendations such as a) build a culture of empowerment and not fear, b) use empathy to counter social engineering attacks, c) make cyber hygiene practices non-technical and reduce human firewalls, and d) practice reason over fear.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-16-role-of-emotional-intelligence-in-creating-a-healthy-information-security-culture/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-16-role-of-emotional-intelligence-in-creating-a-healthy-information-security-culture/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/role-of-emotional-intelligence-in-creating-a-healthy-information-security-culture]]></link><guid isPermaLink="false">206b7d5a-bd9d-4d46-b68f-275c71da9230</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 05 Jan 2022 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0dbe67c8-8977-4a30-a58e-2da85cf4a2cb/nadjaelfertazi-interview-v3-mixdown.mp3" length="85172386" type="audio/mpeg"/><itunes:duration>59:08</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/0086e3cd-e397-45da-8fd4-039030bc784e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0086e3cd-e397-45da-8fd4-039030bc784e/index.html" type="text/html"/></item><item><title>Significance of the Human Element in Cybersecurity</title><itunes:title>Significance of the Human Element in Cybersecurity</itunes:title><description><![CDATA[<p>Renowned authority in human-technology interactions and Presidential appointee <a href="https://www.linkedin.com/in/missy-cummings-7681588b/" rel="noopener noreferrer" target="_blank">Prof. Missy Cummings</a> of Duke University, spoke to the importance of understanding human motivation and behavior to proactively predict and detect deception. In a very candid and engaging conversation, Prof. Cummings expressed her concern about cybersecurity as a field not receiving the necessary scientific recognition and support. "Cybersecurity is not like changing the oil of your car, it is its own science," she said while discussing the various aspects of cybersecurity knowledge creation and dissemination. She also talks about her class on the Human Element in Cybersecurity and how she draws from various scientific knowledge bases (such as cognitive science, systems theory, game theory, and queuing theory) to provide a rich learning experience.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-15-significance-of-the-human-element-in-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-15-significance-of-the-human-element-in-cybersecurity/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>Renowned authority in human-technology interactions and Presidential appointee <a href="https://www.linkedin.com/in/missy-cummings-7681588b/" rel="noopener noreferrer" target="_blank">Prof. Missy Cummings</a> of Duke University, spoke to the importance of understanding human motivation and behavior to proactively predict and detect deception. In a very candid and engaging conversation, Prof. Cummings expressed her concern about cybersecurity as a field not receiving the necessary scientific recognition and support. "Cybersecurity is not like changing the oil of your car, it is its own science," she said while discussing the various aspects of cybersecurity knowledge creation and dissemination. She also talks about her class on the Human Element in Cybersecurity and how she draws from various scientific knowledge bases (such as cognitive science, systems theory, game theory, and queuing theory) to provide a rich learning experience.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-15-significance-of-the-human-element-in-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-15-significance-of-the-human-element-in-cybersecurity/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/significance-of-the-human-element-in-cybersecurity]]></link><guid isPermaLink="false">8dfa0f87-dee8-44c1-a8a4-0a8da5a7aff9</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 22 Dec 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/3e601c31-7f3a-4b60-8c93-1b69069df400/missy-cummings-interview-v3-20211018t201639-697072-mixdown.mp3" length="68295689" type="audio/mpeg"/><itunes:duration>47:25</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/1b406aed-fed7-40f0-ac78-c625a8c376de/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1b406aed-fed7-40f0-ac78-c625a8c376de/index.html" type="text/html"/></item><item><title>Enhancing Organizational Readiness by Simulating Cyber Attacks</title><itunes:title>Enhancing Organizational Readiness by Simulating Cyber Attacks</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/robertdaustin/" rel="noopener noreferrer" target="_blank">Robert Austin, Professor, Ivey Business School</a>, discusses the value of cyber-attack simulation by drawing upon the learning tool (IT Management Simulation: Cyber Attack!, Harvard Business School Publishing) that he has developed. Using powerful metaphors such as "it's better to have a smaller portion of an expanding pie than to have an expanding portion of a shrinking pie," Rob highlights the need for an unselfish and collaborative approach (among competitors) to dealing with cyber threats. He also emphasizes the importance of top management engagement, judicious technology spending to reduce operational dependencies and threats, and leveraging the power of the human resource.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-14-enhancing-organizational-readiness-by-simulating-cyber-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-14-enhancing-organizational-readiness-by-simulating-cyber-attacks/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/robertdaustin/" rel="noopener noreferrer" target="_blank">Robert Austin, Professor, Ivey Business School</a>, discusses the value of cyber-attack simulation by drawing upon the learning tool (IT Management Simulation: Cyber Attack!, Harvard Business School Publishing) that he has developed. Using powerful metaphors such as "it's better to have a smaller portion of an expanding pie than to have an expanding portion of a shrinking pie," Rob highlights the need for an unselfish and collaborative approach (among competitors) to dealing with cyber threats. He also emphasizes the importance of top management engagement, judicious technology spending to reduce operational dependencies and threats, and leveraging the power of the human resource.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-14-enhancing-organizational-readiness-by-simulating-cyber-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-14-enhancing-organizational-readiness-by-simulating-cyber-attacks/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/enhancing-organizational-readiness-by-simulating-cyber-attacks]]></link><guid isPermaLink="false">a3d1f546-2272-497b-a3ba-1fe98d7d63ad</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 08 Dec 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c83c0d1b-7fa5-4056-8cca-cfeefa1895c6/rob-austin-interview-v4-20211018t201639-697072-mixdown.mp3" length="77205200" type="audio/mpeg"/><itunes:duration>53:36</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/952c3dd0-a4f6-4f96-a244-fa430f4c4fc5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/952c3dd0-a4f6-4f96-a244-fa430f4c4fc5/index.html" type="text/html"/></item><item><title>Cybersecurity is Patient Safety</title><itunes:title>Cybersecurity is Patient Safety</itunes:title><description><![CDATA[<p>"Cybersecurity is patient safety and patient safety is cybersecurity," is how <a href="https://www.linkedin.com/in/smanikin/" rel="noopener noreferrer" target="_blank">Stoddard Manikin, Chief Information Security Officer, Children's Healthcare of Atlanta</a>, described the significance of cybersecurity readiness in the healthcare sector. Speaking with exceptional clarity and eloquence, Stoddard traced the evolution of the cybersecurity threat landscape and governance approaches, before discussing in detail what it takes to succeed as a modern CISO.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-13-cybersecurity-is-patient-safety/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-13-cybersecurity-is-patient-safety/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>"Cybersecurity is patient safety and patient safety is cybersecurity," is how <a href="https://www.linkedin.com/in/smanikin/" rel="noopener noreferrer" target="_blank">Stoddard Manikin, Chief Information Security Officer, Children's Healthcare of Atlanta</a>, described the significance of cybersecurity readiness in the healthcare sector. Speaking with exceptional clarity and eloquence, Stoddard traced the evolution of the cybersecurity threat landscape and governance approaches, before discussing in detail what it takes to succeed as a modern CISO.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-13-cybersecurity-is-patient-safety/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-13-cybersecurity-is-patient-safety/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/cybersecurity-is-patient-safety]]></link><guid isPermaLink="false">aa60cd92-df55-4929-82e5-4795eec9fa49</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 24 Nov 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7fc3da31-ea76-4576-8f33-d1bd8a699277/stoddard-manikin-interviewv2-20211018t201639-697072-mixdown.mp3" length="60867902" type="audio/mpeg"/><itunes:duration>42:16</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/8c362485-3577-4971-9a32-1b412d86bf33/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8c362485-3577-4971-9a32-1b412d86bf33/index.html" type="text/html"/></item><item><title>Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat Management</title><itunes:title>Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat Management</itunes:title><description><![CDATA[<p>The incredibly articulate <a href="https://my.captivate.fm/Anne%20Leslie,%20Senior%20Management%20Consultant,%20IBM%20Security" rel="noopener noreferrer" target="_blank">Anne Leslie, Threat Management Consultant, IBM Security</a>, shares some powerful messages and recommendations on threat management. One such message is to nurture a Whole-of-Enterprise approach where "leaders believe that the people who work for them are not just as important as the systems and the data, they're more important." Anne also emphasizes the importance of "looking within and knowing what it is that we have, why people might want that, and how they might go about getting it."</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-12-ignorance-is-not-bliss-a-whole-of-enterprise-approach-to-threat-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-12-ignorance-is-not-bliss-a-whole-of-enterprise-approach-to-threat-management/</a></p><p class="ql-align-center"><br></p><p>----------------------------------------------</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></description><content:encoded><![CDATA[<p>The incredibly articulate <a href="https://my.captivate.fm/Anne%20Leslie,%20Senior%20Management%20Consultant,%20IBM%20Security" rel="noopener noreferrer" target="_blank">Anne Leslie, Threat Management Consultant, IBM Security</a>, shares some powerful messages and recommendations on threat management. One such message is to nurture a Whole-of-Enterprise approach where "leaders believe that the people who work for them are not just as important as the systems and the data, they're more important." Anne also emphasizes the importance of "looking within and knowing what it is that we have, why people might want that, and how they might go about getting it."</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-12-ignorance-is-not-bliss-a-whole-of-enterprise-approach-to-threat-management/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-12-ignorance-is-not-bliss-a-whole-of-enterprise-approach-to-threat-management/</a></p><p class="ql-align-center"><br></p><p>----------------------------------------------</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/dchatte/ </a></p><p>Website: <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">https://dchatte.com/</a></p><p>Cybersecurity Readiness Book: <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/ignorance-is-not-bliss-a-whole-of-enterprise-approach-to-threat-management]]></link><guid isPermaLink="false">2d735967-82e1-44d9-b556-549a79a9f566</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 10 Nov 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/01416a7e-d745-412c-bf38-dac822e57d3c/anne-leslie-interview-v1.mp3" length="70728925" type="audio/mpeg"/><itunes:duration>49:07</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/c4d65813-9b97-46ba-aee0-c1c33b4e20b2/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c4d65813-9b97-46ba-aee0-c1c33b4e20b2/index.html" type="text/html"/></item><item><title>Fly the Plane: A CIO&apos;s Approach to Cybersecurity Readiness</title><itunes:title>Fly the Plane: A CIO&apos;s Approach to Cybersecurity Readiness</itunes:title><description><![CDATA[<p><strong>Fly the Plane</strong> is how <a href="https://www.linkedin.com/in/timothychester/" rel="noopener noreferrer" target="_blank">Dr. Timothy Chester, Vice President of Information Technology, The University of Georgia</a>, characterizes his philosophy and approach to cybersecurity readiness. Dr. Chester spoke at length about a proactive approach to information security management anchored on strategic planning, senior leadership commitment, strong teamwork, sophisticated intelligence monitoring, and robust training and testing practices. His candor and reflection made for a most interesting conversation.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-11-fly-the-plane-a-cios-approach-to-cybersecurity-readiness/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-11-fly-the-plane-a-cios-approach-to-cybersecurity-readiness/</a></p><p class="ql-align-center">-------------------------------------------------------------------------------------</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><strong><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></strong></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p>﻿<strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p><strong>Fly the Plane</strong> is how <a href="https://www.linkedin.com/in/timothychester/" rel="noopener noreferrer" target="_blank">Dr. Timothy Chester, Vice President of Information Technology, The University of Georgia</a>, characterizes his philosophy and approach to cybersecurity readiness. Dr. Chester spoke at length about a proactive approach to information security management anchored on strategic planning, senior leadership commitment, strong teamwork, sophisticated intelligence monitoring, and robust training and testing practices. His candor and reflection made for a most interesting conversation.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-11-fly-the-plane-a-cios-approach-to-cybersecurity-readiness/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-11-fly-the-plane-a-cios-approach-to-cybersecurity-readiness/</a></p><p class="ql-align-center">-------------------------------------------------------------------------------------</p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><strong><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></strong></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p>﻿<strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/fly-the-plane-a-cios-approach-to-cybersecurity-readiness]]></link><guid isPermaLink="false">ebce479c-9c71-4fd7-8081-21df540a0bc5</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 27 Oct 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0eba9bdb-3299-474f-bfa0-706d176c6664/tim-chester-revised-recording.mp3" length="71335163" type="audio/mpeg"/><itunes:duration>49:32</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/cd2acfd2-b9de-4afb-8b55-0257125556fd/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/cd2acfd2-b9de-4afb-8b55-0257125556fd/index.html" type="text/html"/></item><item><title>Passwordless Authentication: Myths and Realities</title><itunes:title>Passwordless Authentication: Myths and Realities</itunes:title><description><![CDATA[<p>Driven by a mission and passion to fight online crime, <a href="https://www.trusona.com/about/ori-eisen" rel="noopener noreferrer" target="_blank">Ori Eisen, Founder and CEO of Trusona</a>, explains the fundamentals of passwordless authentication and why it is a superior and simpler way of securing access. He also dispels several myths and addresses potential adoption hurdles, ranging from incompatibility with legacy applications to transition costs, regulatory compliance, privacy concerns, and more. Ori offers some valuable tips and recommendations to protect individuals from becoming victims of hacking. Finally, he shares some hilarious jokes at the end.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-10-passwordless-authentication-myths-and-realities/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-10-passwordless-authentication-myths-and-realities/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">----------------------------------------------------</p><p class="ql-align-center"><strong class="ql-size-large">Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><strong><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></strong></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/ " rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>Driven by a mission and passion to fight online crime, <a href="https://www.trusona.com/about/ori-eisen" rel="noopener noreferrer" target="_blank">Ori Eisen, Founder and CEO of Trusona</a>, explains the fundamentals of passwordless authentication and why it is a superior and simpler way of securing access. He also dispels several myths and addresses potential adoption hurdles, ranging from incompatibility with legacy applications to transition costs, regulatory compliance, privacy concerns, and more. Ori offers some valuable tips and recommendations to protect individuals from becoming victims of hacking. Finally, he shares some hilarious jokes at the end.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-10-passwordless-authentication-myths-and-realities/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-10-passwordless-authentication-myths-and-realities/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center">----------------------------------------------------</p><p class="ql-align-center"><strong class="ql-size-large">Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><strong><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></strong></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/ " rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/passwordless-authentication-myths-and-realities]]></link><guid isPermaLink="false">062547fa-42b2-4eea-914b-54542c9f96a7</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 13 Oct 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/b76b2e59-8939-424f-b62f-7f8808ba2181/ori-eisen-interview-v1.mp3" length="60362692" type="audio/mpeg"/><itunes:duration>41:55</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/8005ac9d-ac72-4e10-94be-12870ad9abda/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8005ac9d-ac72-4e10-94be-12870ad9abda/index.html" type="text/html"/></item><item><title>Cybersecurity Risk Reduction Tips for Small and Medium-Sized Enterprises (SMEs)</title><itunes:title>Cybersecurity Risk Reduction Tips for Small and Medium-Sized Enterprises (SMEs)</itunes:title><description><![CDATA[<p>While small and medium-sized enterprises (SMEs) face the same cybersecurity issues as large enterprises, SMEs don’t have the resources to effectively manage those risks. Research reports reveal alarming statistics on the state of cyber readiness of SMEs -- 60% of small businesses that are victims of a cyber attack go out of business within 6 months; 47% of small businesses have no understanding of how to protect themselves against cyber-attacks. <a href="https://www.linkedin.com/in/mikebenzminnesota/" rel="noopener noreferrer" target="_blank">Mike Benz, Partner | Fractional CIO at Fortium Partners,</a> provides some useful tips on how SMEs can reduce their cybersecurity risk exposure without spending a fortune. Mike is the primary author of a scholarly publication <a href="https://www.sciencedirect.com/science/article/abs/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Calculated Risk? A Cybersecurity Evaluation Tool for SMEs&nbsp;</a>.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-9-cybersecurity-risk-reduction-tips-for-small-and-medium-sized-enterprises-smes/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-9-cybersecurity-risk-reduction-tips-for-small-and-medium-sized-enterprises-smes/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>While small and medium-sized enterprises (SMEs) face the same cybersecurity issues as large enterprises, SMEs don’t have the resources to effectively manage those risks. Research reports reveal alarming statistics on the state of cyber readiness of SMEs -- 60% of small businesses that are victims of a cyber attack go out of business within 6 months; 47% of small businesses have no understanding of how to protect themselves against cyber-attacks. <a href="https://www.linkedin.com/in/mikebenzminnesota/" rel="noopener noreferrer" target="_blank">Mike Benz, Partner | Fractional CIO at Fortium Partners,</a> provides some useful tips on how SMEs can reduce their cybersecurity risk exposure without spending a fortune. Mike is the primary author of a scholarly publication <a href="https://www.sciencedirect.com/science/article/abs/pii/S0007681320300392" rel="noopener noreferrer" target="_blank">Calculated Risk? A Cybersecurity Evaluation Tool for SMEs&nbsp;</a>.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-9-cybersecurity-risk-reduction-tips-for-small-and-medium-sized-enterprises-smes/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-9-cybersecurity-risk-reduction-tips-for-small-and-medium-sized-enterprises-smes/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/cybersecurity-risk-reduction-tips-for-small-and-medium-enterprises]]></link><guid isPermaLink="false">90be1335-bcd7-40dd-b20d-458bf105a375</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 29 Sep 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/7af35cf2-d676-4240-b0bf-6967d2deea21/mike-benz-interview-rough-cut.mp3" length="59604360" type="audio/mpeg"/><itunes:duration>41:23</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode></item><item><title>What Does Good Cyber Governance Look Like? A Legal Perspective</title><itunes:title>What Does Good Cyber Governance Look Like? A Legal Perspective</itunes:title><description><![CDATA[<p>From the standpoint of cybersecurity governance, how does an organization stay on the right side of the law? <a href="https://www.linkedin.com/in/dr-rois-ni-thuama-redsift/" rel="noopener noreferrer" target="_blank">Rois Ni Thuama, Ph.D. (Doctor of Law), Head of Cyber Governance, Red Sift</a>, spoke with great clarity and eloquence in explaining what it means to practice good and sensible cyber governance. She emphasized the importance of looking to expert sources and established security frameworks for guidance, addressing foreseeable and avoidable threats, and making cybersecurity investments that would be deemed (by the courts) proportionate and affordable. Highlighting the importance of strong governance, Rois said, "it is never the widget that’s the problem, it is always weak leadership, weak governance, lack of accountability, lack of responsibility, these are the big issues that need to be addressed.” She also encouraged a regular legal review of cybersecurity practices, based on the assumption that “you have to defend your decision-making in a court of law.”</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-8-what-does-good-cyber-governance-look-like-a-legal-perspective/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-8-what-does-good-cyber-governance-look-like-a-legal-perspective/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>From the standpoint of cybersecurity governance, how does an organization stay on the right side of the law? <a href="https://www.linkedin.com/in/dr-rois-ni-thuama-redsift/" rel="noopener noreferrer" target="_blank">Rois Ni Thuama, Ph.D. (Doctor of Law), Head of Cyber Governance, Red Sift</a>, spoke with great clarity and eloquence in explaining what it means to practice good and sensible cyber governance. She emphasized the importance of looking to expert sources and established security frameworks for guidance, addressing foreseeable and avoidable threats, and making cybersecurity investments that would be deemed (by the courts) proportionate and affordable. Highlighting the importance of strong governance, Rois said, "it is never the widget that’s the problem, it is always weak leadership, weak governance, lack of accountability, lack of responsibility, these are the big issues that need to be addressed.” She also encouraged a regular legal review of cybersecurity practices, based on the assumption that “you have to defend your decision-making in a court of law.”</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-8-what-does-good-cyber-governance-look-like-a-legal-perspective/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-8-what-does-good-cyber-governance-look-like-a-legal-perspective/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/what-does-good-cyber-governance-look-like-a-legal-perspective]]></link><guid isPermaLink="false">4c45677a-0092-44ac-acc8-ce9f7d900242</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 15 Sep 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4bb47de1-b7e0-4c52-9ccf-fa6ee7f062d7/csrp-episode-8-rough-cut-rois-mixdown.mp3" length="66663460" type="audio/mpeg"/><itunes:duration>46:17</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode></item><item><title>Multidisciplinary and Integrative Approach to Cybersecurity Education</title><itunes:title>Multidisciplinary and Integrative Approach to Cybersecurity Education</itunes:title><description><![CDATA[<p>In a very engaging and thoughtful discussion, <a href="https://www.linkedin.com/in/jimmie-lenz-5a80485/" rel="noopener noreferrer" target="_blank">Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and Master of Engineering in Cybersecurity at Duke University's Pratt School of Engineering</a>, spoke to the importance of a multidisciplinary and integrative approach to cybersecurity education. He emphasized the need for a very pragmatic approach to cyber education where students are taught by active industry professionals and also get to apply the learned skills in real organizational settings. Dr. Lenz strongly believes in empowering future cybersecurity professionals with a broad breadth of hard and soft skills so they develop the necessary technical expertise and business savvy.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-7-multidisciplinary-and-integrative-approach-to-cybersecurity-education/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-7-multidisciplinary-and-integrative-approach-to-cybersecurity-education/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>In a very engaging and thoughtful discussion, <a href="https://www.linkedin.com/in/jimmie-lenz-5a80485/" rel="noopener noreferrer" target="_blank">Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and Master of Engineering in Cybersecurity at Duke University's Pratt School of Engineering</a>, spoke to the importance of a multidisciplinary and integrative approach to cybersecurity education. He emphasized the need for a very pragmatic approach to cyber education where students are taught by active industry professionals and also get to apply the learned skills in real organizational settings. Dr. Lenz strongly believes in empowering future cybersecurity professionals with a broad breadth of hard and soft skills so they develop the necessary technical expertise and business savvy.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-7-multidisciplinary-and-integrative-approach-to-cybersecurity-education/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-7-multidisciplinary-and-integrative-approach-to-cybersecurity-education/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/multidisciplinary-and-integrative-approach-to-cybersecurity-education]]></link><guid isPermaLink="false">33dd6d9e-0f0e-43d1-b87f-7af8128c97dc</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 01 Sep 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bb200994-8c67-46b6-8a8d-4822cffa4a48/jimmi-lenz-interview-rough-cut.mp3" length="34020311" type="audio/mpeg"/><itunes:duration>32:11</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode></item><item><title>Holistic Approach to Cybersecurity Readiness</title><itunes:title>Holistic Approach to Cybersecurity Readiness</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/ramrkumar/" rel="noopener noreferrer" target="_blank">Ram R. Kumar, Executive Director,  AT&amp;T Business, </a>discusses at length significant cybersecurity governance issues, from achieving inter-and intra-organizational buy-in to employee empowerment, education and training, integration of security and development teams, vendor selection and monitoring, and more. Mr. Kumar also speaks to the operational realities and dilemma of speed vs safety and ethics vs loyalty.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-6-holistic-approach-to-cybersecurity-readiness/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-6-holistic-approach-to-cybersecurity-readiness/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/ramrkumar/" rel="noopener noreferrer" target="_blank">Ram R. Kumar, Executive Director,  AT&amp;T Business, </a>discusses at length significant cybersecurity governance issues, from achieving inter-and intra-organizational buy-in to employee empowerment, education and training, integration of security and development teams, vendor selection and monitoring, and more. Mr. Kumar also speaks to the operational realities and dilemma of speed vs safety and ethics vs loyalty.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-6-holistic-approach-to-cybersecurity-readiness/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-6-holistic-approach-to-cybersecurity-readiness/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/holistic-approach-to-cybersecurity-readiness]]></link><guid isPermaLink="false">84563bb5-2e94-49b3-9036-e6312d884904</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 18 Aug 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/21f7dc5b-d2aa-49a8-be3a-85a3c0380fae/ram-interview-rough-cut.mp3" length="71644980" type="audio/mpeg"/><itunes:duration>49:45</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode></item><item><title>Being An Effective Chief Information Security Officer (CISO)</title><itunes:title>Being An Effective Chief Information Security Officer (CISO)</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/richardbiever/" rel="noopener noreferrer" target="_blank">Richard Biever, Chief Information Security Officer, Duke University</a>, shares valuable insights on how to create an effective CISO function. In a wide-ranging and substantive discussion that touched upon key aspects of cybersecurity governance, Richard shared his philosophy and approach to a) building strong relationships, b) creating a strong sense of agency and ownership, c) communicating effectively, d) protecting against ransomware attacks, e) creating and sustaining a high-performance information security culture, and more.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-5-being-an-effective-chief-information-security-officer-ciso/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-5-being-an-effective-chief-information-security-officer-ciso/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/richardbiever/" rel="noopener noreferrer" target="_blank">Richard Biever, Chief Information Security Officer, Duke University</a>, shares valuable insights on how to create an effective CISO function. In a wide-ranging and substantive discussion that touched upon key aspects of cybersecurity governance, Richard shared his philosophy and approach to a) building strong relationships, b) creating a strong sense of agency and ownership, c) communicating effectively, d) protecting against ransomware attacks, e) creating and sustaining a high-performance information security culture, and more.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-5-being-an-effective-chief-information-security-officer-ciso/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-5-being-an-effective-chief-information-security-officer-ciso/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/being-an-effective-chief-information-security-officer-ciso]]></link><guid isPermaLink="false">74e34bae-8890-409b-aee9-226e226c2b4b</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 04 Aug 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/0702249e-d8ed-4227-b340-ca1978ba7a49/richard-biever-interview-rough-cut.mp3" length="66919265" type="audio/mpeg"/><itunes:duration>46:28</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Human Vulnerability Factor</title><itunes:title>The Human Vulnerability Factor</itunes:title><description><![CDATA[<p>A widely reported 2019 survey found that 99% of the attacks are focused on exploiting human vulnerabilities by targeting people instead of computer systems and infrastructure. Some of the most significant data breaches were carried out after stealing login credentials from human actors. <a href="https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/" rel="noopener noreferrer" target="_blank">Jenny Radcliffe</a>, also known as “The People Hacker,” a world-renowned Social Engineer, provides some fascinating insights and stories regarding the human factor in cybersecurity. She discusses the various challenges of dealing with human vulnerabilities, provides specific recommendations on how to reduce such risks, gain top management buy-in, and more.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-4-the-human-vulnerability-factor/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-4-the-human-vulnerability-factor/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><em>Connect with Dr. Chatterjee on these platforms: </em></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>A widely reported 2019 survey found that 99% of the attacks are focused on exploiting human vulnerabilities by targeting people instead of computer systems and infrastructure. Some of the most significant data breaches were carried out after stealing login credentials from human actors. <a href="https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/" rel="noopener noreferrer" target="_blank">Jenny Radcliffe</a>, also known as “The People Hacker,” a world-renowned Social Engineer, provides some fascinating insights and stories regarding the human factor in cybersecurity. She discusses the various challenges of dealing with human vulnerabilities, provides specific recommendations on how to reduce such risks, gain top management buy-in, and more.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-4-the-human-vulnerability-factor/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-4-the-human-vulnerability-factor/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><em>Connect with Dr. Chatterjee on these platforms: </em></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/the-human-vulnerability-factor]]></link><guid isPermaLink="false">354a2d50-c64f-4ade-b49d-ecbc453af7fd</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 21 Jul 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/88e0ab15-6e90-4c87-b44e-f5f96c054726/csrp-jenny-radcliffe-v1-cutmixdown.mp3" length="46801236" type="audio/mpeg"/><itunes:duration>32:30</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season></item><item><title>Going Above and Beyond the Mandated Checklist</title><itunes:title>Going Above and Beyond the Mandated Checklist</itunes:title><description><![CDATA[<p>When top management proactively takes every possible precaution to protect sensitive data because it is the right thing to do and not because there is a legislative requirement, that’s when the organization would have taken a huge step forward in earning customer confidence and trust. <a href="https://www.linkedin.com/in/tushar-sachdev-17965a1/" rel="noopener noreferrer" target="_blank"><strong>Tushar Sachdev, Executive Vice President, and Chief Technology Officer, KORE Wireless</strong></a>, is emphatic about top management’s role in creating and sustaining a proactive information security culture. In a very reflective and pragmatic discussion with <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">Dr. Chatterjee</a>, Mr. Sachdev, also offers guidance on how to a) get started on a path to cybersecurity readiness; b) reach a high state of cybersecurity readiness; c) get senior executive commitment to cybersecurity training, and d) select and monitor suppliers. He also talks about the importance of including cybersecurity performance metrics in performance appraisals and buying cyber insurance.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-3-going-above-and-beyond-the-mandated-checklist/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-3-going-above-and-beyond-the-mandated-checklist/</a></p><p class="ql-align-center"><br></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: https://www.linkedin.com/in/dchatte/ </strong></p><p><strong>Website: https://dchatte.com/</strong></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>When top management proactively takes every possible precaution to protect sensitive data because it is the right thing to do and not because there is a legislative requirement, that’s when the organization would have taken a huge step forward in earning customer confidence and trust. <a href="https://www.linkedin.com/in/tushar-sachdev-17965a1/" rel="noopener noreferrer" target="_blank"><strong>Tushar Sachdev, Executive Vice President, and Chief Technology Officer, KORE Wireless</strong></a>, is emphatic about top management’s role in creating and sustaining a proactive information security culture. In a very reflective and pragmatic discussion with <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank">Dr. Chatterjee</a>, Mr. Sachdev, also offers guidance on how to a) get started on a path to cybersecurity readiness; b) reach a high state of cybersecurity readiness; c) get senior executive commitment to cybersecurity training, and d) select and monitor suppliers. He also talks about the importance of including cybersecurity performance metrics in performance appraisals and buying cyber insurance.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-3-going-above-and-beyond-the-mandated-checklist/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-3-going-above-and-beyond-the-mandated-checklist/</a></p><p class="ql-align-center"><br></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: https://www.linkedin.com/in/dchatte/ </strong></p><p><strong>Website: https://dchatte.com/</strong></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/going-above-and-beyond-the-mandated-checklist]]></link><guid isPermaLink="false">323b6b01-dd62-43c2-8587-ff9c76637a08</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 07 Jul 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/2a21f9b0-07af-41ec-adff-201fb1287ccb/tushar-s-episode-v2-mixdown.mp3" length="63579833" type="audio/mpeg"/><itunes:duration>44:09</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season></item><item><title>Protecting Academic Institutions from Ransomware and Other Forms of Cyber Attacks</title><itunes:title>Protecting Academic Institutions from Ransomware and Other Forms of Cyber Attacks</itunes:title><description><![CDATA[<p>Educational institutions have been the target and victim of ransomware attacks. <a href="https://www.linkedin.com/in/garry-scobie/" rel="noopener noreferrer" target="_blank"><strong>Garry Scobie, Deputy Chief Information Security Officer, The University of Edinburg</strong></a>, spoke at length with <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>Dr. Dave Chatterjee</strong></a> on protecting academic institutions from ransomware and other forms of cyber-attacks. The very engaging and informative discussion covered a lot of ground ranging from identifying the most significant threats to reviewing the challenges of dealing with such threats and making recommendations on how best to secure the academic institution and its stakeholders. Garry shared several good practices, one of which was creating the Champions Network to enhance cybersecurity awareness.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-2-protecting-academic-institutions-from-ransomware-and-other-forms-of-cyber-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-2-protecting-academic-institutions-from-ransomware-and-other-forms-of-cyber-attacks/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>Educational institutions have been the target and victim of ransomware attacks. <a href="https://www.linkedin.com/in/garry-scobie/" rel="noopener noreferrer" target="_blank"><strong>Garry Scobie, Deputy Chief Information Security Officer, The University of Edinburg</strong></a>, spoke at length with <a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>Dr. Dave Chatterjee</strong></a> on protecting academic institutions from ransomware and other forms of cyber-attacks. The very engaging and informative discussion covered a lot of ground ranging from identifying the most significant threats to reviewing the challenges of dealing with such threats and making recommendations on how best to secure the academic institution and its stakeholders. Garry shared several good practices, one of which was creating the Champions Network to enhance cybersecurity awareness.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-2-protecting-academic-institutions-from-ransomware-and-other-forms-of-cyber-attacks/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-2-protecting-academic-institutions-from-ransomware-and-other-forms-of-cyber-attacks/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p>Connect with Dr. Chatterjee on these platforms: </p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/protecting-academic-institutions-from-ransomware-and-other-forms-of-cyber-attacks]]></link><guid isPermaLink="false">f5a7d2a3-c8ff-4fda-8970-ff1186454ac8</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Wed, 23 Jun 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bb781732-7e4d-495a-afec-4b5d401ea7a2/gary-scobie-interview-v2-mixdown.mp3" length="76631546" type="audio/mpeg"/><itunes:duration>53:13</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode></item><item><title>Role of Top Management in Cybersecurity Governance</title><itunes:title>Role of Top Management in Cybersecurity Governance</itunes:title><description><![CDATA[<p>The recent ransomware attacks on Colonial Pipeline and JBS are grave reminders that organizations at all levels must constantly be in a high state of cybersecurity readiness and alert. This is no easy task as the points of vulnerabilities are numerous, especially the probability of humans falling prey to innovative hacking maneuvers. The senior leadership has an incredibly important and critical role to play in securing operations, sensitive data, and other digital assets. They must actively engage in the planning and execution of cybersecurity governance activities and spearhead the creation and sustenance of a high-performance information security culture. Such a high-performance information security culture is anchored on three key pillars – commitment, preparedness, and discipline. <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach-ebook/dp/B08W98D7BD/ref=sr_1_1?dchild=1&amp;keywords=cybersecurity+readiness+dave+chatterjee&amp;qid=1623087485&amp;sr=8-1" rel="noopener noreferrer" target="_blank"><strong>Dr. Dave Chatterjee’s book on Cybersecurity Readiness: A Holistic and High-Performance Approach</strong></a> speaks to these security culture traits and associated success factors. Probably the most important success factor is a highly committed and engaged top management. In an extensive and insightful discussion with Dr. Chatterjee, <a href="https://ir.crawco.com/esg/leadership-team/" rel="noopener noreferrer" target="_blank"><strong>Rohit Verma, CEO of Crawford and Company</strong></a>, speaks candidly on topics ranging from top management involvement to the empowerment of the Chief Information Security Officer (CISO), cyber training and assessment, intelligence monitoring, performance tracking and measurement, security drills, and best practices. The following are some memorable Rohit Verma quotes as he advocates a genuinely committed approach to cybersecurity readiness.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-1-role-of-top-management-in-cybersecurity-governance/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-1-role-of-top-management-in-cybersecurity-governance/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></description><content:encoded><![CDATA[<p>The recent ransomware attacks on Colonial Pipeline and JBS are grave reminders that organizations at all levels must constantly be in a high state of cybersecurity readiness and alert. This is no easy task as the points of vulnerabilities are numerous, especially the probability of humans falling prey to innovative hacking maneuvers. The senior leadership has an incredibly important and critical role to play in securing operations, sensitive data, and other digital assets. They must actively engage in the planning and execution of cybersecurity governance activities and spearhead the creation and sustenance of a high-performance information security culture. Such a high-performance information security culture is anchored on three key pillars – commitment, preparedness, and discipline. <a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach-ebook/dp/B08W98D7BD/ref=sr_1_1?dchild=1&amp;keywords=cybersecurity+readiness+dave+chatterjee&amp;qid=1623087485&amp;sr=8-1" rel="noopener noreferrer" target="_blank"><strong>Dr. Dave Chatterjee’s book on Cybersecurity Readiness: A Holistic and High-Performance Approach</strong></a> speaks to these security culture traits and associated success factors. Probably the most important success factor is a highly committed and engaged top management. In an extensive and insightful discussion with Dr. Chatterjee, <a href="https://ir.crawco.com/esg/leadership-team/" rel="noopener noreferrer" target="_blank"><strong>Rohit Verma, CEO of Crawford and Company</strong></a>, speaks candidly on topics ranging from top management involvement to the empowerment of the Chief Information Security Officer (CISO), cyber training and assessment, intelligence monitoring, performance tracking and measurement, security drills, and best practices. The following are some memorable Rohit Verma quotes as he advocates a genuinely committed approach to cybersecurity readiness.</p><p>To access and download the entire podcast summary with discussion highlights --</p><p><a href="https://www.dchatte.com/episode-1-role-of-top-management-in-cybersecurity-governance/" rel="noopener noreferrer" target="_blank">https://www.dchatte.com/episode-1-role-of-top-management-in-cybersecurity-governance/</a></p><p class="ql-align-center"><br></p><p class="ql-align-center"><strong>Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast</strong></p><p><em>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </em></p><p><strong>Connect with Dr. Chatterjee on these platforms: </strong></p><p><strong>LinkedIn: </strong><a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank"><strong>https://www.linkedin.com/in/dchatte/ </strong></a></p><p><strong>Website: </strong><a href="https://dchatte.com/" rel="noopener noreferrer" target="_blank"><strong>https://dchatte.com/</strong></a></p><p><strong>Cybersecurity Readiness Book: </strong><a href="https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338" rel="noopener noreferrer" target="_blank"><strong>https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338</strong></a></p>]]></content:encoded><link><![CDATA[https://dchatte.com/role-of-top-management-in-cybersecurity-governance]]></link><guid isPermaLink="false">ef3573c4-1f1d-495a-b8b8-37a9405353a2</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Tue, 08 Jun 2021 12:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/07723d45-0736-44cc-99c3-67252f4263b3/csrp-rough-cut-v2-1.mp3" length="42897931" type="audio/mpeg"/><itunes:duration>29:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Cybersecurity Readiness Podcast Trailer</title><itunes:title>The Cybersecurity Readiness Podcast Trailer</itunes:title><description><![CDATA[<p>Welcome to the Cybersecurity Readiness Podcast! The Podcast serves to have a reflective, thought-provoking and jargon free discussion on how to enhance the state of cybersecurity at an individual, organizational and national level.&nbsp;Host Dr. Dave Chatterjee converses with subject matter experts, business and technology leaders, trainers and educators and members of user communities. He has been studying cybersecurity for over a decade. He has delivered talks, conducted webinars, consulted with companies and served on a cybersecurity SWAT team with CISO's. He is an Associate Professor of Management Information Systems at the University of Georgia and Visiting Professor at Duke University.</p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: https://www.linkedin.com/in/dchatte/ </p><p>Website: https://dchatte.com/</p>]]></description><content:encoded><![CDATA[<p>Welcome to the Cybersecurity Readiness Podcast! The Podcast serves to have a reflective, thought-provoking and jargon free discussion on how to enhance the state of cybersecurity at an individual, organizational and national level.&nbsp;Host Dr. Dave Chatterjee converses with subject matter experts, business and technology leaders, trainers and educators and members of user communities. He has been studying cybersecurity for over a decade. He has delivered talks, conducted webinars, consulted with companies and served on a cybersecurity SWAT team with CISO's. He is an Associate Professor of Management Information Systems at the University of Georgia and Visiting Professor at Duke University.</p><p>Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. </p><p>Connect with Dr. Chatterjee on these platforms: </p><p>LinkedIn: https://www.linkedin.com/in/dchatte/ </p><p>Website: https://dchatte.com/</p>]]></content:encoded><link><![CDATA[https://dchatte.com/the-cybersecurity-readiness-podcast-trailer]]></link><guid isPermaLink="false">be6df29f-f936-46b9-8682-2f4db46e6afa</guid><itunes:image href="https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"/><pubDate>Thu, 20 May 2021 00:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c28de7e6-9e0a-413f-82c3-80d8f09514aa/CSRP-20TRAILER-20V2-mixdown.mp3" length="2415331" type="audio/mpeg"/><itunes:duration>01:40</itunes:duration><itunes:explicit>true</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><podcast:season>1</podcast:season></item></channel></rss>