{ "subscribes": 9, "updated_at": "2021-02-05 17:00:00", "id": "1780", "likes": 0, "description": "Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders", "episodes": [ { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kevin-fu-directLink-2-i-4869.mp3", "title": "FDA's Kevin Fu on Threat Modeling for Medical Devices", "pubdate": "20210410" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crisis-communications-how-to-handle-breach-response-directLink-3-i-4868.mp3", "title": "Crisis Communications: How to Handle Breach Response", "pubdate": "20210409" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-fat-faces-awkward-breach-notification-directLink-2-i-4863.mp3", "title": "Analysis: Fat Face's Awkward Breach Notification", "pubdate": "20210402" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/looming-threat-broken-cryptography-directLink-4-i-4861.mp3", "title": "The Looming Threat of Broken Cryptography", "pubdate": "20210330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-takeaways-from-ransomware-gang-interviews-directLink-8-i-4858.mp3", "title": "Analysis: Takeaways From Ransomware Gang Interviews", "pubdate": "20210326" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-microsoft-exchange-server-hacks-directLink-2-i-4854.mp3", "title": "Analysis: Microsoft Exchange Server Hacks", "pubdate": "20210319" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mattison-directLink-1-i-4853.mp3", "title": "Free Tool Helps Hospitals Block Ransomware", "pubdate": "20210318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-lessons-learned-from-emotet-takedown-directLink-3-i-4852.mp3", "title": "Analysis: Lessons Learned From Emotet Takedown", "pubdate": "20210312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mazzola-by-anna-directLink-3-i-4851.mp3", "title": "SOC Management: Automation Best Practices", "pubdate": "20210311" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/could-hipaa-privacy-rule-changes-weaken-patient-privacy-directLink-10-i-4850.mp3", "title": "Could HIPAA Changes Weaken Patient Privacy?", "pubdate": "20210310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/accellion-breaches-key-takeaways-directLink-8-i-4849.mp3", "title": "Accellion Appliance Zero-Day Attack Breaches: Key Takeaways", "pubdate": "20210305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-feds-crack-down-on-cryptocurrency-scams-directLink-5-i-4846.mp3", "title": "Analysis: Feds Crack Down on Cryptocurrency Scams", "pubdate": "20210226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-patient-access-to-health-records-challenges-directLink-3-i-4844.mp3", "title": "Secure Patient Access to Health Records: The Challenges", "pubdate": "20210226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-documentation-authenticity-integrity-directLink-6-i-4836.mp3", "title": "Digital Documentation: Authenticity and Integrity", "pubdate": "20210224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-sandworms-hacking-campaign-directLink-7-i-4842.mp3", "title": "Analysis: Russia's Sandworm Hacking Campaign", "pubdate": "20210219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/becoming-ciso-many-paths-to-success-directLink-9-i-4840.mp3", "title": "Becoming a CISO: Many Paths to Success", "pubdate": "20210217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/synthetic-identity-fraud-persists-directLink-3-i-4839.mp3", "title": "Why Synthetic Identity Fraud Persists", "pubdate": "20210216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-implications-water-treatment-plant-hack-directLink-2-i-4838.mp3", "title": "Analysis: Implications of Water Treatment Plant Hack", "pubdate": "20210212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-sharing-need-for-transparency-directLink-6-i-4837.mp3", "title": "Data Sharing: The Need for Transparency", "pubdate": "20210209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-latest-ransomware-trends-directLink-5-i-4834.mp3", "title": "Analysis: The Persistent Ransomware Threat", "pubdate": "20210205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-emotet-netwalker-takedowns-directLink-9-i-4832.mp3", "title": "Analysis: Emotet and Netwalker Takedowns", "pubdate": "20210129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-on-securing-endpoints-ensuring-compliance-directLink-7-i-4826.mp3", "title": "Tips on Securing Endpoints, Ensuring Compliance", "pubdate": "20210127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-how-will-biden-address-cybersecurity-challenges-directLink-8-i-4829.mp3", "title": "Analysis: How Will Biden Address Cybersecurity Challenges?", "pubdate": "20210122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/a-us-national-privacy-law-on-horizon-directLink-1-i-4824.mp3", "title": "Is a US National Privacy Law on the Horizon?", "pubdate": "20210119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solarwinds-supply-chain-hack-investigation-update-directLink-3-i-4823.mp3", "title": "SolarWinds Supply Chain Hack: Investigation Update", "pubdate": "20210115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-new-branch-office-directLink-2-i-4819.mp3", "title": "Securing the New 'Branch Office'", "pubdate": "20210111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-latest-solarwinds-hack-developments-directLink-4-i-4822.mp3", "title": "Analysis: The Latest SolarWinds Hack Developments", "pubdate": "20210108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facebooks-diem-payments-network-may-struggle-directLink-7-i-4818.mp3", "title": "Why Facebook's Diem is 'a Shadow of Libra'", "pubdate": "20210101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rita-bowen-directLink-10-i-4810.mp3", "title": "Providing Patients With Records Access: Overcoming Challenges", "pubdate": "20201231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-cybersecurity-leadership-directLink-5-i-4816.mp3", "title": "Cybersecurity Leaders Talk Tactics, Techniques, Challenges", "pubdate": "20201231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shaping-future-payments-identity-directLink-1-i-4817.mp3", "title": "Shaping the Future of Payments and Identity", "pubdate": "20201231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mari-savickis-cassie-leonard-directLink-1-i-4811.mp3", "title": "COVID-19: Evolving Regulatory Issues", "pubdate": "20201228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-supply-chain-management-after-solarwinds-hack-directLink-6-i-4814.mp3", "title": "Analysis: Supply Chain Management After SolarWinds Hack", "pubdate": "20201225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-key-steps-to-building-resilient-digital-infrastructure-directLink-1-i-4813.mp3", "title": "5 Key Steps to Building a Resilient Digital Infrastructure", "pubdate": "20201222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-solarwinds-hack-directLink-1-i-4812.mp3", "title": "Analysis: The Impact of SolarWinds Hack", "pubdate": "20201218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critical-factors-to-consider-before-paying-ransom-directLink-9-i-4807.mp3", "title": "Critical Factors to Consider Before Paying a Ransom", "pubdate": "20201212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-fireeye-breach-nothing-safe-directLink-2-i-4806.mp3", "title": "Analysis of FireEye Breach: Is Nothing Safe?", "pubdate": "20201211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-apple-ios-zero-click-exploit-directLink-9-i-4805.mp3", "title": "Analysis: Apple iOS 'Zero-Click Exploit'", "pubdate": "20201204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hot-cybercrime-trend-enterprise-scale-ransomware-hits-directLink-6-i-4804.mp3", "title": "Hot Cybercrime Trend: Enterprise-Scale Ransomware Hits", "pubdate": "20201127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisas-christopher-krebs-describes-accomplishments-directLink-4-i-4799.mp3", "title": "Christopher Krebs Describes Accomplishments", "pubdate": "20201120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-intrinsic-security-approach-to-secure-workloads-cloud-directLink-4-i-4797.mp3", "title": "Using an 'Intrinsic Security' Approach", "pubdate": "20201119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gadgilgaudet-directLink-4-i-4798.mp3", "title": "Healthcare Supply Chain Security: Updated Guidance", "pubdate": "20201117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-on-cloud-security-directLink-10-i-4795.mp3", "title": "Banking on Cloud Security", "pubdate": "20201114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-new-presidents-impact-on-cybersecurity-directLink-8-i-4796.mp3", "title": "Analysis: Cybersecurity Challenges Facing New President", "pubdate": "20201113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-threat-landscape-report-directLink-1-i-4794.mp3", "title": "Analysis: Threat Landscape Report", "pubdate": "20201112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-are-marriott-bas-gdpr-fines-big-enough-directLink-7-i-4791.mp3", "title": "Analysis: Are Marriott and BA's GDPR Fines Big Enough?", "pubdate": "20201106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-medical-device-vulnerability-scoring-directLink-7-i-4789.mp3", "title": "Improving Medical Device Vulnerability Scoring", "pubdate": "20201103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-election-cyber-disruptions-what-to-expect-directLink-5-i-4786.mp3", "title": "Post-Election Cyber Disruptions: What to Expect", "pubdate": "20201030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-significance-russian-hackers-indictment-directLink-1-i-4784.mp3", "title": "Analysis: The Significance of Russian Hackers' Indictment", "pubdate": "20201023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irs-takes-on-cryptocurrency-funded-terrorists-directLink-8-i-4783.mp3", "title": "The IRS Takes on Cryptocurrency-Funded Terrorists", "pubdate": "20201022" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-top-cybercrime-threats-directLink-10-i-4781.mp3", "title": "Analysis: Ransomware Dominates the Cybercrime Landscape", "pubdate": "20201016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-regulators-got-tough-hm-directLink-9-i-4779.mp3", "title": "Analysis: Why Regulators Got Tough With H&M", "pubdate": "20201009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roger-severino-lead-hipaa-enforcer-on-fighting-hackers-directLink-2-i-4777.mp3", "title": "Roger Severino, Lead HIPAA Enforcer, on Fighting Hackers", "pubdate": "20201006" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-mcafees-planned-ipo-directLink-8-i-4775.mp3", "title": "Analysis: McAfee's Planned IPO", "pubdate": "20201002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compliance-2-new-health-data-regs-avoiding-pitfalls-directLink-5-i-4772.mp3", "title": "Compliance With 2 New Health Data Regs: Avoiding Pitfalls", "pubdate": "20200930" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-are-darknet-markets-here-to-stay-directLink-3-i-4769.mp3", "title": "Analysis: Are Darknet Markets Here to Stay?", "pubdate": "20200925" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-chinese-database-exposure-cause-for-concern-directLink-2-i-4768.mp3", "title": "Analysis: Is Chinese Database Exposure a Cause for Concern?", "pubdate": "20200918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-gangs-find-fresh-ways-to-make-victims-pay-directLink-1-i-4766.mp3", "title": "Ransomware Gangs Find Fresh Ways to Make Victims Pay", "pubdate": "20200911" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fed-studies-development-digital-dollar-directLink-10-i-4764.mp3", "title": "Fed Studies Development of Digital Dollar", "pubdate": "20200911" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-organizations-leverage-sase-directLink-2-i-4757.mp3", "title": "How Organizations Can Leverage SASE", "pubdate": "20200909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-framework-proposed-to-address-hipaa-gaps-directLink-3-i-4761.mp3", "title": "Privacy Framework Proposed to Address HIPAA Gaps", "pubdate": "20200908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-considerations-for-privileged-access-management-directLink-7-i-4759.mp3", "title": "Key Considerations for Privileged Access Management", "pubdate": "20200908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risks-posed-by-mobile-health-apps-directLink-5-i-4760.mp3", "title": "The Risks Posed by Mobile Health Apps", "pubdate": "20200904" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equifax-breach-ciso-describes-lessons-learned-directLink-9-i-4758.mp3", "title": "Equifax Breach: CISO Describes Lessons Learned", "pubdate": "20200904" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-privacy-centered-contract-tracing-apps-directLink-7-i-4756.mp3", "title": "Building Privacy-Centered Contact-Tracing Apps", "pubdate": "20200902" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/third-party-risk-management-how-to-grow-mature-program-directLink-6-i-4636.mp3", "title": "Third-Party Risk Management: How to Grow a Mature Program", "pubdate": "20200902" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-detection-medicare-fraud-directLink-5-i-4755.mp3", "title": "Improving the Detection of Medicare Fraud", "pubdate": "20200828" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-unusual-case-against-former-uber-cso-directLink-3-i-4754.mp3", "title": "Analysis: The Unusual Case Against Former Uber CSO", "pubdate": "20200828" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-ransomware-gangs-getting-bigger-payoffs-directLink-1-i-4752.mp3", "title": "Analysis: Why Ransomware Gangs Getting Bigger Payoffs", "pubdate": "20200821" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-fraudsters-are-circumventing-ai-base-prevention-efforts-directLink-2-i-4751.mp3", "title": "How Fraudsters Are Circumventing AI-Based Prevention Efforts", "pubdate": "20200820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/biometric-technology-assessing-risks-directLink-9-i-4750.mp3", "title": "Biometric Technology: Assessing the Risks", "pubdate": "20200820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-remote-access-risk-based-authentication-directLink-2-i-4748.mp3", "title": "Securing Remote Access With Risk-Based Authentication", "pubdate": "20200819" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-rep-directLink-3-i-4743.mp3", "title": "Analysis: Did Barclays Go Too Far in Monitoring Employees?", "pubdate": "20200814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/derek-manky-fortiguard-labs-on-shift-to-proactive-defense-directLink-7-i-4742.mp3", "title": "Derek Manky of FortiGuard Labs on the Shift to Proactive Defense", "pubdate": "20200812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/foster-directLink-8-i-4741.mp3", "title": "Congressman Makes Case for National Patient ID", "pubdate": "20200812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-hijacking-twitter-hackers-virtual-hearing-directLink-3-i-4740.mp3", "title": "Analysis: Hijacking of Twitter Hacker's Virtual Hearing", "pubdate": "20200807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-biometrics-avoiding-mistakes-directLink-8-i-4738.mp3", "title": "Behavioral Biometrics: Avoiding Mistakes", "pubdate": "20200805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secret-service-agent-offers-cybercrime-fighting-insights-directLink-9-i-4737.mp3", "title": "Secret Service Agent Offers Cybercrime-Fighting Insights", "pubdate": "20200804" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-sec-rep-directLink-6-i-4736.mp3", "title": "Analysis: The Hacking of Mobile Banking App Dave", "pubdate": "20200731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-brand-impersonation-fraud-directLink-4-i-4735.mp3", "title": "Mitigating Brand Impersonation Fraud", "pubdate": "20200728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/detecting-payroll-fraud-data-analytics-directLink-6-i-4734.mp3", "title": "Detecting Payroll Fraud With Data Analytics", "pubdate": "20200727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/celebrity-twitter-hack-what-happened-directLink-5-i-4732.mp3", "title": "The Celebrity Twitter Hack: What Happened?", "pubdate": "20200724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-contact-tracing-app-privacy-concerns-directLink-7-i-4731.mp3", "title": "COVID-19 Contact-Tracing Apps: The Privacy Issues", "pubdate": "20200718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-analysis-us-outmaneuvers-uk-on-huawei-question-directLink-10-i-4730.mp3", "title": "Security Analysis: US Outmaneuvers UK on 'Huawei Question'", "pubdate": "20200717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coordinating-disclosures-medical-device-vulnerabilities-directLink-4-i-4728.mp3", "title": "Coordinating Disclosures of Medical Device Vulnerabilities", "pubdate": "20200711" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-monitoring-risks-posed-by-remote-workers-directLink-7-i-4727.mp3", "title": "Analysis: Monitoring the Risks Posed by Remote Workers", "pubdate": "20200710" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-ids-progress-report-directLink-2-i-4722.mp3", "title": "Digital IDs: A Progress Report", "pubdate": "20200703" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/guarding-against-covid-19-fraud-schemes-directLink-2-i-4720.mp3", "title": "Guarding Against COVID-19 Fraud Schemes", "pubdate": "20200702" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-keeping-iot-devices-secure-directLink-1-i-4716.mp3", "title": "Analysis: Keeping IoT Devices Secure", "pubdate": "20200626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-mitigating-risks-in-multicloud-environments-directLink-10-i-4714.mp3", "title": "Analysis: Mitigating Risks in Multicloud Environments", "pubdate": "20200619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransom-demands-what-happens-if-victims-pay-or-dont-pay-directLink-8-i-4712.mp3", "title": "Ransom Demands: What Happens If Victims Pay or Don't Pay?", "pubdate": "20200618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-privacy-security-concerns-as-businesses-reopen-directLink-5-i-4710.mp3", "title": "COVID-19: Privacy, Security Concerns as Businesses Reopen", "pubdate": "20200613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/europols-latest-anti-financial-crime-center-directLink-6-i-4709.mp3", "title": "Inside Europol's Latest Anti-Financial Crime Center", "pubdate": "20200612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-risk-prevention-reconsidered-directLink-9-i-4692.mp3", "title": "Cybersecurity Risk Prevention Reconsidered", "pubdate": "20200612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-payments-fraud-in-pandemic-directLink-7-i-4708.mp3", "title": "The State of Payments Fraud in a Pandemic", "pubdate": "20200611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-voting-be-secure-directLink-7-i-4707.mp3", "title": "Can Mobile Voting Be Secure?", "pubdate": "20200610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-collective-defense-directLink-5-i-4705.mp3", "title": "Building a Collective Defense", "pubdate": "20200610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-role-digital-identity-management-directLink-7-i-4704.mp3", "title": "Analyzing the Role of Digital Identity Management", "pubdate": "20200610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-identity-management-still-challenge-directLink-1-i-4700.mp3", "title": "Analysis: Why Identity Management Is Still a Challenge", "pubdate": "20200605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confidential-computing-use-cases-directLink-4-i-4682.mp3", "title": "Confidential Computing: The Use Cases", "pubdate": "20200604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confidential-computing-beyond-hype-directLink-4-i-4681.mp3", "title": "Confidential Computing: Beyond the Hype", "pubdate": "20200604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fresh-look-at-api-security-directLink-8-i-4691.mp3", "title": "A Fresh Look at API Security", "pubdate": "20200602" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/podcast-verizon-2020-dbir-analysis-ashish-thapar-directLink-8-i-4697.mp3", "title": "Analysis: Verizon's Latest Data Breach Investigation Report", "pubdate": "20200601" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/neuman-directLink-6-i-4696.mp3", "title": "Identity Verification in Healthcare: Revamping a Framework", "pubdate": "20200529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-surge-in-attacks-against-banks-directLink-2-i-4694.mp3", "title": "Analysis: Surge in Attacks Against Banks", "pubdate": "20200529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/koste-directLink-1-i-4693.mp3", "title": "Safeguarding COVID-19 Research, Other Intellectual Property", "pubdate": "20200529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ama-outlines-privacy-principles-for-health-data-directLink-2-i-4690.mp3", "title": "AMA Outlines Privacy Principles for Health Data", "pubdate": "20200527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-avoid-unnecessary-breach-reporting-directLink-1-i-4688.mp3", "title": "How to Avoid Unnecessary Breach Reporting", "pubdate": "20200526" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-long-term-implications-remote-workforce-directLink-6-i-4686.mp3", "title": "Analysis: The Long-Term Implications of 'Work From Home'", "pubdate": "20200522" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/e-workforce-security-long-game-directLink-7-i-4684.mp3", "title": "Remote Workforce Security - the Long Game", "pubdate": "20200521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/remote-workforce-security-role-zero-trust-directLink-1-i-4670.mp3", "title": "Remote Workforce Security: The Role of 'Zero Trust'", "pubdate": "20200521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberthreats-tied-to-covid-19-could-hit-diverse-targets-directLink-9-i-4683.mp3", "title": "Why Cyberthreats Tied to COVID-19 Could Hit Diverse Targets", "pubdate": "20200519" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ast-as-key-to-devsecops-maturity-directLink-7-i-4676.mp3", "title": "AST as the Key to DevSecOps Maturity", "pubdate": "20200516" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-securing-rdp-to-prevent-ransomware-attacks-directLink-2-i-4680.mp3", "title": "Analysis: Securing RDP to Prevent Ransomware Attacks", "pubdate": "20200515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/death-office-directLink-8-i-4671.mp3", "title": "The 'Death' of the Office", "pubdate": "20200509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/testing-medical-device-security-during-covid-19-crisis-directLink-8-i-4675.mp3", "title": "Testing Medical Device Security During COVID-19 Crisis", "pubdate": "20200508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-contact-tracing-conundrum-directLink-4-i-4674.mp3", "title": "Analysis: The Contact-Tracing Conundrum", "pubdate": "20200508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-ransomwares-costly-impact-directLink-2-i-4668.mp3", "title": "Analysis: Ransomware's Costly Impact", "pubdate": "20200501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zero-trust-remote-worker-directLink-2-i-4667.mp3", "title": "'Zero Trust' and the Remote Worker", "pubdate": "20200428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-security-transformation-enabling-your-digital-business-directLink-7-i-4664.mp3", "title": "Network and Security Transformation - Enabling your Digital Business", "pubdate": "20200427" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-covid-19-contact-tracing-privacy-issues-directLink-7-i-4661.mp3", "title": "Analysis: COVID-19 Contact-Tracing Privacy Issues", "pubdate": "20200424" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enabling-secure-access-in-complex-environments-directLink-9-i-4663.mp3", "title": "Enabling Secure Access in Complex Environments", "pubdate": "20200424" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-insider-threats-posed-by-remote-workforce-directLink-3-i-4657.mp3", "title": "Analysis: Insider Threats Posed by Remote Workforce", "pubdate": "20200417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/third-party-security-risk-considerations-during-covid-19-directLink-9-i-4656.mp3", "title": "Third-Party Risk Considerations During COVID-19 Crisis", "pubdate": "20200417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-recovery-in-new-normal-directLink-7-i-4658.mp3", "title": "Ransomware Recovery in the 'New Normal'", "pubdate": "20200416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-cybercrime-during-covid-19-crisis-directLink-2-i-4655.mp3", "title": "Battling Cybercrime During the COVID-19 Crisis", "pubdate": "20200415" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-phi-during-covid-19-crisis-emerging-challenges-directLink-1-i-4653.mp3", "title": "Safeguarding PHI During COVID-19 Crisis: Emerging Challenges", "pubdate": "20200411" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-remote-workplace-security-challenges-directLink-8-i-4652.mp3", "title": "Analysis: Remote Workplace Security Challenges", "pubdate": "20200410" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-cisos-take-on-more-security-privacy-challenges-directLink-1-i-4648.mp3", "title": "COVID-19: CISOs Take on More Security, Privacy Challenges", "pubdate": "20200408" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-risks-posed-by-ai-meeting-assistants-directLink-4-i-4647.mp3", "title": "Mitigating the Risks Posed by AI Meeting Assistants", "pubdate": "20200407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-passwordless-authentication-directLink-1-i-4635.mp3", "title": "The Future of Passwordless Authentication", "pubdate": "20200407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-specialist-offers-telework-security-insights-directLink-7-i-4646.mp3", "title": "NIST Specialist Offers Telework Security Insights", "pubdate": "20200407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-deception-in-new-normal-directLink-10-i-4641.mp3", "title": "Role of Deception in the 'New Normal'", "pubdate": "20200406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-went-wrong-at-equifax-unusually-we-have-answers-directLink-9-i-4642.mp3", "title": "What Went Wrong at Equifax? We Have Good Answers", "pubdate": "20200404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-path-back-to-business-as-usual-after-covid-19-directLink-4-i-4643.mp3", "title": "Analysis: The Path Back to Business as Usual After COVID-19", "pubdate": "20200403" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-campaign-security-revisited-directLink-7-i-4640.mp3", "title": "Election Campaign Security Revisited", "pubdate": "20200401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/api-security-making-sense-market-directLink-5-i-4629.mp3", "title": "API Security: Making Sense of the Market", "pubdate": "20200331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-russias-covid-19-disinformation-campaign-directLink-10-i-4633.mp3", "title": "Analysis: Russia's COVID-19 Disinformation Campaign", "pubdate": "20200327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ecommerce-surge-guarding-against-fraud-directLink-6-i-4632.mp3", "title": "The Ecommerce Surge: Guarding Against Fraud", "pubdate": "20200327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-hhs-hipaa-moves-for-covid-19-crisis-directLink-2-i-4631.mp3", "title": "Analysis: Impact of HHS' HIPAA Moves for COVID-19 Crisis", "pubdate": "20200327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-integrity-in-covid-19-era-directLink-7-i-4628.mp3", "title": "Election Integrity in COVID-19 Era", "pubdate": "20200324" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-security-risks-as-manufacturers-shift-gears-directLink-8-i-4626.mp3", "title": "COVID-19: Security Risks As Manufacturers Shift Gears", "pubdate": "20200324" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-financial-market-we-are-living-in-unprecedented-times-directLink-8-i-4624.mp3", "title": "COVID-19 and Financial Markets: 'Unprecedented Times'", "pubdate": "20200320" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-covid-19-as-cybercrime-opportunity-directLink-1-i-4623.mp3", "title": "Analysis: COVID-19 as a Cybercrime Opportunity", "pubdate": "20200320" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/teleworking-by-healthcare-employees-security-challenges-directLink-5-i-4622.mp3", "title": "Teleworking by Healthcare Employees: Security Challenges", "pubdate": "20200320" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/living-working-amidst-covid-19-directLink-10-i-4621.mp3", "title": "Living and Working Amid COVID-19 Crisis", "pubdate": "20200319" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-response-5-tips-for-securing-remote-workplace-directLink-2-i-4619.mp3", "title": "COVID-19 Response: 5 Tips for Securing Remote Workplace", "pubdate": "20200318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-how-to-adjust-business-continuity-plans-directLink-4-i-4618.mp3", "title": "COVID-19: How to Adjust Business Continuity Plans", "pubdate": "20200318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/not-mfa-directLink-4-i-4617.mp3", "title": "Why Not MFA?", "pubdate": "20200317" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ndr-in-cloud-directLink-5-i-4610.mp3", "title": "NDR in the Cloud", "pubdate": "20200314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-secrep-directLink-8-i-4616.mp3", "title": "Analysis: Coronavirus Cybersecurity and Privacy Issues", "pubdate": "20200313" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sharing-cloud-security-responsibilities-directLink-6-i-4615.mp3", "title": "Sharing Cloud Security Responsibilities", "pubdate": "20200313" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-public-health-cybersecurity-issues-directLink-7-i-4613.mp3", "title": "Coronavirus: The Public Health Cybersecurity Issues", "pubdate": "20200311" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobility-government-challenge-directLink-5-i-4601.mp3", "title": "Mobility and the Government Challenge", "pubdate": "20200310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-insider-risk-when-creativity-goes-bad-directLink-3-i-4611.mp3", "title": "The New Insider Risk: When Creativity Goes Bad", "pubdate": "20200306" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-spread-preparing-for-the-long-haul-directLink-5-i-4609.mp3", "title": "Coronavirus Spread: Preparing for 'The Long Haul'", "pubdate": "20200304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-eu-vs-us-approaches-directLink-5-i-4608.mp3", "title": "Medical Device Cybersecurity: EU vs. U.S. Approaches", "pubdate": "20200229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2020-roundup-key-themes-directLink-8-i-4607.mp3", "title": "RSA 2020: Roundup of Key Themes", "pubdate": "20200228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/modified-draft-ccpa-regulations-how-they-impact-businesses-directLink-3-i-4604.mp3", "title": "Modified Draft CCPA Regulations: How They Impact Businesses", "pubdate": "20200226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-by-design-implementation-tips-directLink-1-i-4603.mp3", "title": "\"Privacy by Design\" Implementation Tips", "pubdate": "20200224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-to-look-for-at-rsa-2020-conference-directLink-1-i-4602.mp3", "title": "What to Look for at RSA 2020 Conference", "pubdate": "20200221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-update-tips-for-travel-directLink-10-i-4600.mp3", "title": "Coronavirus Update: Tips for Travel", "pubdate": "20200219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-2020-preview-directLink-6-i-4598.mp3", "title": "RSA Conference 2020 Preview", "pubdate": "20200219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-indictments-in-equifax-hack-directLink-2-i-4595.mp3", "title": "Analysis: Indictments in Equifax Hack", "pubdate": "20200214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-privacy-framework-implementation-challenges-directLink-4-i-4594.mp3", "title": "NIST Privacy Framework: The Implementation Challenges", "pubdate": "20200211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-iowa-election-app-missteps-directLink-1-i-4592.mp3", "title": "Analysis: Iowa Election App Missteps", "pubdate": "20200207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-how-to-plan-protect-directLink-6-i-4590.mp3", "title": "Coronavirus: How to Plan and Protect", "pubdate": "20200207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-advocate-tackles-issue-patient-consent-rights-directLink-2-i-4589.mp3", "title": "Privacy Advocate Tackles Issue of Patient Consent Rights", "pubdate": "20200201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-government-policies-on-huaweis-5g-role-directLink-1-i-4588.mp3", "title": "Analysis: Government Policies on Huawei\"s 5G Role", "pubdate": "20200131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dave-dewalt-on-securing-business-critical-applications-directLink-5-i-4584.mp3", "title": "Dave DeWalt on Securing Business-Critical Applications", "pubdate": "20200127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-new-details-on-hacking-jeff-bezos-iphone-directLink-4-i-4585.mp3", "title": "Analysis: New Details on the Hacking of Jeff Bezos\" iPhone", "pubdate": "20200124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-satellites-in-quantum-key-distribution-directLink-3-i-4580.mp3", "title": "The Role of Satellites in Quantum Key Distribution", "pubdate": "20200121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sizing-up-todays-deception-technology-directLink-5-i-4581.mp3", "title": "Sizing Up Today\"s Deception Technology", "pubdate": "20200121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-huawei-5g-dilemma-directLink-9-i-4577.mp3", "title": "Analysis: Huawei 5G Dilemma", "pubdate": "20200117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-overcoming-roadblocks-directLink-5-i-4574.mp3", "title": "Cloud Security: Overcoming Roadblocks", "pubdate": "20200117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wartime-mentality-revisited-directLink-10-i-4575.mp3", "title": "\"Wartime\" Security Mentality Revisited", "pubdate": "20200115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/class-action-breach-lawsuits-impact-data-for-sale-directLink-5-i-4572.mp3", "title": "Class Action Breach Lawsuits: The Impact of Data for Sale", "pubdate": "20200114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reality-check-how-vulnerable-power-grid-directLink-3-i-4569.mp3", "title": "Reality Check: How Vulnerable Is the Power Grid?", "pubdate": "20200111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-sec-rep-directLink-8-i-4570.mp3", "title": "Analysis: \"Orwellian\" Surveillance in 2020", "pubdate": "20200110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/quantum-proof-cryptography-how-would-work-directLink-2-i-4571.mp3", "title": "Quantum-Proof Cryptography: How It Would Work", "pubdate": "20200110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ccpa-who-in-healthcare-must-comply-directLink-5-i-4537.mp3", "title": "CCPA: Who in Healthcare Must Comply?", "pubdate": "20200110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-from-vulnerability-management-to-response-directLink-6-i-4560.mp3", "title": "Moving from Vulnerability Management to Response", "pubdate": "20200108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/caleb-barlow-directLink-4-i-4566.mp3", "title": "Preparing for Potential Iranian \"Wiper\" Attacks", "pubdate": "20200108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iam-zero-trust-maturity-directLink-7-i-4549.mp3", "title": "Assessing The Maturity of Zero Trust Across Organizations", "pubdate": "20200107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-cyber-alliance-president-on-iranian-cyber-threat-directLink-3-i-4564.mp3", "title": "Global Cyber Alliance President on Iranian Cyber Threat", "pubdate": "20200107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irans-cyber-response-theyre-going-to-unleash-hounds-directLink-10-i-4563.mp3", "title": "Iran\"s Cyber Response: \"They\"re Going to Unleash the Hounds\"", "pubdate": "20200107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/countering-cyber-axis-evil-in-2020-directLink-9-i-4561.mp3", "title": "Analysis: Countering Nation-State Attacks in 2020", "pubdate": "20200103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-credential-stuffing-be-thwarted-directLink-3-i-4551.mp3", "title": "How Can Credential Stuffing Be Thwarted?", "pubdate": "20191231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-christian-directLink-3-i-4553.mp3", "title": "Health Data Security: Federal, State Trends for 2020", "pubdate": "20191231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2020-year-zero-trust-directLink-7-i-4557.mp3", "title": "2020: The Year of Zero Trust?", "pubdate": "20191231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenge-soc-triage-directLink-1-i-4547.mp3", "title": "The Challenge of SOC Triage", "pubdate": "20191231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eric-johnson-podcast-directLink-1-i-4552.mp3", "title": "Do Breach Remediation Efforts Affect Patient Outcomes?", "pubdate": "20191230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbis-elvis-chan-on-securing-2020-election-directLink-5-i-4545.mp3", "title": "FBI\"s Elvis Chan on Securing the 2020 Election", "pubdate": "20191230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-2020-cybersecurity-issues-directLink-4-i-4556.mp3", "title": "Analysis: 2020 Cybersecurity Issues", "pubdate": "20191227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-on-misinformation-in-age-cyber-warfare-directLink-10-i-4544.mp3", "title": "Art Coviello on Misinformation in the Age of Cyber Warfare", "pubdate": "20191226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-offers-insights-on-managing-vendor-security-risks-directLink-3-i-4536.mp3", "title": "A CISO Offers Insights on Managing Vendor Security Risks", "pubdate": "20191226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tom-kellermann-on-axis-evil-escalation-destructive-attacks-directLink-8-i-4554.mp3", "title": "The \"Axis of Evil\" and Escalation of Destructive Attacks", "pubdate": "20191224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-20-cybercrime-gangs-apply-apt-style-tactics-directLink-10-i-4543.mp3", "title": "Ransomware 2.0: Cybercrime Gangs Apply APT-Style Tactics", "pubdate": "20191224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-avivah-litan-on-rise-fake-everything-directLink-6-i-4542.mp3", "title": "Gartner\"s Avivah Litan on the Rise of \"Fake Everything\"", "pubdate": "20191223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-top-health-data-regulatory-issues-to-watch-in-2020-directLink-9-i-4550.mp3", "title": "5 Top Health Data Regulatory Issues to Watch in 2020", "pubdate": "20191220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-cities-targeted-by-ransomware-directLink-8-i-4548.mp3", "title": "Analysis: The Latest Ransomware Targets", "pubdate": "20191220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-medical-devices-so-challenging-directLink-9-i-4541.mp3", "title": "Why Securing Medical Devices Is So Challenging", "pubdate": "20191218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-better-approach-to-cyber-defense-directLink-7-i-4539.mp3", "title": "Analysis: A Better Approach to Cyber Defense", "pubdate": "20191213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reflections-on-cloud-strategies-security-directLink-2-i-4519.mp3", "title": "Reflections on Cloud Strategies & Security", "pubdate": "20191212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-confidence-matters-directLink-8-i-4518.mp3", "title": "Cyber Confidence: Why it Matters", "pubdate": "20191212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/quantum-proof-cryptography-what-role-will-play-directLink-2-i-4534.mp3", "title": "Quantum-Proof Cryptography: What Role Will It Play?", "pubdate": "20191211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ai-machine-learning-robotics-privacy-security-issues-directLink-8-i-4533.mp3", "title": "AI, Machine Learning and Robotics: Privacy, Security Issues", "pubdate": "20191207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-adversarial-mindset-making-cybersecurity-better-directLink-1-i-4532.mp3", "title": "How the Adversarial Mindset Is Making Cybersecurity Better", "pubdate": "20191207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-smart-tv-risks-directLink-5-i-4531.mp3", "title": "Analysis: Smart TV Risks", "pubdate": "20191206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/john-halamka-on-privacy-security-mayo-clinic-platform-directLink-9-i-4530.mp3", "title": "John Halamka on Privacy, Security of Mayo Clinic Platform", "pubdate": "20191206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/psd2-compliance-enforcement-update-directLink-9-i-4526.mp3", "title": "PSD2: The Compliance and Enforcement Update", "pubdate": "20191205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-transformation-privileged-access-imperative-directLink-9-i-4527.mp3", "title": "Digital Transformation: The Privileged Access Imperative", "pubdate": "20191204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-on-mobile-security-directLink-8-i-4522.mp3", "title": "Banking on Mobile Security", "pubdate": "20191204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-vendor-contract-changes-under-ccpa-directLink-5-i-4529.mp3", "title": "Analysis: Vendor Contract Changes Under CCPA", "pubdate": "20191203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-ransomware-doxing-directLink-5-i-4528.mp3", "title": "The Threat of Ransomware and Doxing", "pubdate": "20191129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-team-approach-directLink-1-i-4525.mp3", "title": "Medical Device Cybersecurity: A Team Approach", "pubdate": "20191127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-hacking-what-you-need-to-know-directLink-6-i-4524.mp3", "title": "Election Hacking: What You Need to Know", "pubdate": "20191125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-latest-ransomware-trends-directLink-4-i-4521.mp3", "title": "Analysis: The Latest Ransomware Trends", "pubdate": "20191122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/close-look-at-hhs-cyber-donation-safe-harbor-proposals-directLink-9-i-4520.mp3", "title": "A Close Look at HHS\" Cyber Donation \"Safe Harbor\" Proposals", "pubdate": "20191122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-advantage-emv-3ds-directLink-4-i-4514.mp3", "title": "Taking Advantage of EMV 3DS", "pubdate": "20191120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iot-security-20-years-behind-enterprise-computing-directLink-8-i-4516.mp3", "title": "IoT Security: 20 Years Behind Enterprise Computing", "pubdate": "20191119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-impact-digital-transformation-directLink-7-i-4512.mp3", "title": "The Security Impact of Digital Transformation", "pubdate": "20191119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multifactor-authentication-2020-faster-more-effective-directLink-3-i-4515.mp3", "title": "Multifactor Authentication 2020: Faster and More Effective", "pubdate": "20191118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-sec-rep-directLink-3-i-4513.mp3", "title": "Analysis: Instagram\"s Major Problem With Minors\" Data", "pubdate": "20191115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-so-challenging-directLink-3-i-4511.mp3", "title": "Why Medical Device Security Is So Challenging", "pubdate": "20191115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dark-webs-automobile-hacking-forms-directLink-7-i-4510.mp3", "title": "The Dark Web\"s Automobile Hacking Forums", "pubdate": "20191114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/googles-push-into-health-sector-emerging-privacy-issues-directLink-6-i-4509.mp3", "title": "Google\"s Push Into Health Sector: Emerging Privacy Issues", "pubdate": "20191114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-capital-ones-breach-teach-about-best-practices-directLink-5-i-4507.mp3", "title": "What Mega Breaches Can Teach about Best Practices", "pubdate": "20191113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ccpa-compliance-identify-verification-challenges-directLink-1-i-4505.mp3", "title": "CCPA Compliance: Identity Verification Challenges", "pubdate": "20191112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-fraud-account-origination-directLink-10-i-4504.mp3", "title": "Identity Fraud: Account Origination", "pubdate": "20191111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-data-in-sprawling-computing-environments-directLink-4-i-4502.mp3", "title": "Protecting Data in Sprawling Computing Environments", "pubdate": "20191108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-using-twitter-for-espionage-directLink-8-i-4501.mp3", "title": "Analysis: Using Twitter for Espionage", "pubdate": "20191108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/is-third-party-security-risk-manage-directLink-10-i-4500.mp3", "title": "Why Is Third-Party Risk Management So Complex?", "pubdate": "20191108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-ready-for-nist-privacy-framework-directLink-1-i-4497.mp3", "title": "Getting Ready for the NIST Privacy Framework", "pubdate": "20191107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-sophos-2020-threat-report-directLink-6-i-4499.mp3", "title": "Inside the Sophos 2020 Threat Report", "pubdate": "20191106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-preventing-data-exposure-in-cloud-directLink-9-i-4494.mp3", "title": "Analysis: Preventing Data Exposure in the Cloud", "pubdate": "20191101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-devices-protecting-critical-data-directLink-9-i-4493.mp3", "title": "Mobile Devices: Protecting Critical Data", "pubdate": "20191031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-think-like-attacker-directLink-1-i-4492.mp3", "title": "How to Think Like an Attacker", "pubdate": "20191029" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-manage-supply-chain-risks-directLink-8-i-4490.mp3", "title": "How to Manage Supply Chain Risks", "pubdate": "20191028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-hunting-elasticsearch-for-big-data-analytics-directLink-2-i-4488.mp3", "title": "Cloud Security: \"Big Data\" Leak Prevention Essentials", "pubdate": "20191028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-standards-to-bolster-medical-device-cybersecurity-directLink-3-i-4489.mp3", "title": "Using Standards to Bolster Medical Device Cybersecurity", "pubdate": "20191026" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-russian-hackers-hijack-iranian-hacking-tools-directLink-2-i-4487.mp3", "title": "Analysis: Russian Hackers Hijack Iranian Hacking Tools", "pubdate": "20191025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/helping-consumers-respond-to-data-breaches-directLink-10-i-4486.mp3", "title": "Helping Consumers Respond to Data Breaches", "pubdate": "20191023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-draft-cppa-regulations-fail-to-clarify-ambiguities-directLink-1-i-4485.mp3", "title": "Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities", "pubdate": "20191023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-tool-sprawl-directLink-5-i-4482.mp3", "title": "Managing Tool Sprawl", "pubdate": "20191021" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/darknet-markets-as-police-crack-down-cybercriminals-adapt-directLink-9-i-4481.mp3", "title": "Darknet Markets: As Police Crack Down, Cybercriminals Adapt", "pubdate": "20191018" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zero-trust-securing-access-to-applications-directLink-10-i-4479.mp3", "title": "How \"Zero Trust\" Better Secures Applications and Access", "pubdate": "20191018" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/robotic-process-automation-security-issues-directLink-3-i-4480.mp3", "title": "Robotic Process Automation: Security Essentials", "pubdate": "20191017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-continuous-compromise-assessment-directLink-5-i-4475.mp3", "title": "The Ultimate Missing Link in Cyber: Continuous Compromise Assessment", "pubdate": "20191017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iot-in-vehicles-tyranny-too-much-code-directLink-1-i-4472.mp3", "title": "IoT in Vehicles: The Trouble With Too Much Code", "pubdate": "20191016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-source-vulnerabilities-cut-across-sectors-directLink-3-i-4474.mp3", "title": "Open Source Vulnerabilities Cut Across Sectors", "pubdate": "20191016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-has-ftc-data-security-enforcement-changed-directLink-2-i-4478.mp3", "title": "How Has FTC Data Security Enforcement Changed?", "pubdate": "20191016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-new-iso-privacy-standard-directLink-8-i-4476.mp3", "title": "Analysis: New ISO Privacy Standard", "pubdate": "20191015" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stung-by-takedowns-criminals-tap-distributed-dark-markets-directLink-10-i-4477.mp3", "title": "Stung by Takedowns, Criminals Tap Distributed Dark Markets", "pubdate": "20191015" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-national-unique-patient-ids-directLink-9-i-4473.mp3", "title": "Making the Case for National Unique Patient ID", "pubdate": "20191012" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-twitters-phone-number-repurposing-mistake-directLink-6-i-4471.mp3", "title": "Analysis: Twitter\"s Phone Number Repurposing \"Mistake\"", "pubdate": "20191011" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-how-technology-outpacing-regulation-directLink-10-i-4469.mp3", "title": "Privacy: How Technology Is Outpacing Regulation", "pubdate": "20191010" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/complying-new-yorks-shield-act-directLink-5-i-4470.mp3", "title": "Complying With New York\"s SHIELD Act", "pubdate": "20191010" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasonable-response-to-cyber-incidents-directLink-1-i-4465.mp3", "title": "A \\\"Reasonable\\\" Response to Cyber Incidents", "pubdate": "20191010" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unspoken-insider-threat-directLink-8-i-4468.mp3", "title": "The Unspoken Insider Threat", "pubdate": "20191009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-open-source-components-matter-directLink-6-i-4463.mp3", "title": "Application Security: Why Open Source Components Matter", "pubdate": "20191009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-offense-vs-defense-directLink-8-i-4460.mp3", "title": "Application Security: Offense Vs. Defense", "pubdate": "20191009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-ransomware-attacks-critical-steps-directLink-10-i-4467.mp3", "title": "Responding to Ransomware Attacks: Critical Steps", "pubdate": "20191008" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/urgent11-vulnerabilities-taking-action-directLink-7-i-4466.mp3", "title": "URGENT/11 Vulnerabilities: Taking Action", "pubdate": "20191005" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-huaweis-us-trust-problem-directLink-8-i-4462.mp3", "title": "Analysis: Huawei\"s US Trust Problem", "pubdate": "20191004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-ranking-re-evaluated-directLink-4-i-4451.mp3", "title": "Risk Ranking Re-Evaluated", "pubdate": "20191004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/remote-desktop-protocol-securing-remote-access-directLink-1-i-4461.mp3", "title": "Remote Desktop Protocol: Securing Access", "pubdate": "20191003" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-8-i-4456.mp3", "title": "Sophos Launches Managed Threat Response", "pubdate": "20191001" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-study-how-iu-health-manages-vendor-security-risk-directLink-5-i-4457.mp3", "title": "Case Study: How IU Health Manages Vendor Security Risk", "pubdate": "20191001" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-president-trump-the-server-directLink-2-i-4454.mp3", "title": "Analysis: President Trump and \"The Server\"", "pubdate": "20190927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-cybersecurity-info-sharing-resource-unveiled-directLink-8-i-4453.mp3", "title": "Healthcare Cybersecurity Info Sharing Resource Unveiled", "pubdate": "20190926" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-by-design-building-better-apps-services-directLink-6-i-4452.mp3", "title": "\"Privacy by Design\": Building Better Apps", "pubdate": "20190925" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-update-email-account-takeover-risks-directLink-1-i-4450.mp3", "title": "Spear Phishing Update: Email Account Takeover Risks", "pubdate": "20190920" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-fallout-from-snowden-memoir-directLink-6-i-4449.mp3", "title": "Analysis: Fallout From the Snowden Memoir", "pubdate": "20190920" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deception-technology-making-case-directLink-2-i-4448.mp3", "title": "Deception Technology: Making the Case", "pubdate": "20190919" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-artificial-intelligence-to-combat-card-fraud-directLink-8-i-4447.mp3", "title": "Using Artificial Intelligence to Combat Card Fraud", "pubdate": "20190917" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mainframe-security-challenges-encroaching-perimeter-directLink-7-i-4444.mp3", "title": "Mainframe Security Challenges: An Encroaching Perimeter", "pubdate": "20190917" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-gangs-practice-customer-relationship-management-directLink-9-i-4441.mp3", "title": "Ransomware Gangs Practice Customer Relationship Management", "pubdate": "20190914" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/for-sale-admin-access-credentials-to-healthcare-systems-directLink-2-i-4442.mp3", "title": "For Sale: Admin Access Credentials to Healthcare Systems", "pubdate": "20190913" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-business-email-compromise-attacks-directLink-2-i-4439.mp3", "title": "Analysis: The Impact of Business Email Compromise Attacks", "pubdate": "20190913" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/countering-insider-threat-risks-directLink-5-i-4440.mp3", "title": "Tips on Countering Insider Threat Risks", "pubdate": "20190913" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/remote-desktop-protocol-security-risks-directLink-6-i-4436.mp3", "title": "Remote Desktop Protocol: The Security Risks", "pubdate": "20190911" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-report-on-china-attacking-mobile-devices-directLink-3-i-4434.mp3", "title": "Analysis: Report on China Attacking Mobile Devices", "pubdate": "20190906" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dallas-discusses-indicators-behavior-directLink-9-i-4433.mp3", "title": "Dallas Discusses Indicators of Behavior", "pubdate": "20190906" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-iot-risks-reinventing-security-directLink-3-i-4432.mp3", "title": "Managing IoT Risks: Reinventing Security", "pubdate": "20190903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securitys-role-in-digital-transformation-directLink-3-i-4424.mp3", "title": "Security\"s Role in Digital Transformation", "pubdate": "20190903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-how-police-disrupted-cryptomining-malware-gang-directLink-8-i-4430.mp3", "title": "Analysis: How Police Disrupted a Cryptomining Malware Gang", "pubdate": "20190830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/judicious-use-ai-ml-directLink-6-i-4431.mp3", "title": "The \"Judicious\" Use of AI and ML", "pubdate": "20190830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-texas-ransomware-mess-directLink-2-i-4428.mp3", "title": "Analysis: The Texas Ransomware Mess", "pubdate": "20190823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-stages-defense-directLink-10-i-4427.mp3", "title": "Account Takeover: The Stages of Defense", "pubdate": "20190822" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-study-improving-id-access-management-directLink-8-i-4421.mp3", "title": "Case Study: Improving ID and Access Management", "pubdate": "20190820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-cyberdome-poised-to-protect-2020-elections-directLink-2-i-4420.mp3", "title": "US CyberDome Poised to Protect 2020 Elections", "pubdate": "20190816" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/renaissance-deception-technology-directLink-5-i-4418.mp3", "title": "The Renaissance of Deception Technology", "pubdate": "20190816" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-credential-for-healthcare-security-leaders-directLink-5-i-4415.mp3", "title": "A New Credential for Healthcare Security Leaders", "pubdate": "20190813" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-leadership-next-generation-directLink-8-i-4411.mp3", "title": "Cybersecurity Leadership: The Next Generation", "pubdate": "20190809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-7-i-4412.mp3", "title": "New Playbooks for Cyber Defense", "pubdate": "20190809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ex-secret-service-agent-tackles-banking-cybercrime-directLink-4-i-4410.mp3", "title": "Ex-Secret Service Agent Tackles Banking Cybercrime", "pubdate": "20190808" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reaching-out-to-create-diverse-cybersecurity-workforce-directLink-7-i-4409.mp3", "title": "Reaching Out to Create a Diverse Cybersecurity Workforce", "pubdate": "20190807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/standard-would-enable-instant-messaging-among-ehr-platforms-directLink-5-i-4408.mp3", "title": "Standard Would Enable Instant Messaging Among EHR Platforms", "pubdate": "20190803" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-capital-one-breach-directLink-1-i-4406.mp3", "title": "Analysis: The Capital One Breach", "pubdate": "20190802" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spotlight-on-zero-trust-network-access-directLink-7-i-4395.mp3", "title": "Spotlight on Zero Trust Network Access", "pubdate": "20190731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ceo-to-ceo-breach-response-advice-for-capital-one-directLink-6-i-4405.mp3", "title": "CEO to CEO: Breach Response Advice for Capital One", "pubdate": "20190731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prolonged-cost-data-breach-directLink-3-i-4403.mp3", "title": "The Prolonged Cost of a Data Breach", "pubdate": "20190729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blind-spots-in-threat-landscape-directLink-2-i-4404.mp3", "title": "Blind Spots in the Threat Landscape", "pubdate": "20190729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/akamai-sponsored-podcast-directLink-8-i-4398.mp3", "title": "Evolving to a Zero-Trust Architecture", "pubdate": "20190726" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/encryption-backdoor-debate-continues-directLink-2-i-4401.mp3", "title": "The Encryption \"Backdoor\" Debate Continues", "pubdate": "20190726" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-as-catalyst-for-digital-transformation-directLink-2-i-4388.mp3", "title": "Security as a Catalyst for Digital Transformation", "pubdate": "20190725" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-security-skills-crisis-directLink-4-i-4370.mp3", "title": "Mitigating the Security Skills Crisis", "pubdate": "20190725" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-thinking-supply-chain-security-directLink-9-i-4383.mp3", "title": "Rethinking Supply Chain Security", "pubdate": "20190724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-iam-integration-issues-directLink-7-i-4393.mp3", "title": "Cloud IAM: Integration Issues", "pubdate": "20190723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/23-billion-files-exposed-online-root-causes-directLink-3-i-4391.mp3", "title": "2.3 Billion Files Exposed Online: The Root Causes", "pubdate": "20190723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-does-api-management-complement-iam-directLink-10-i-4325.mp3", "title": "How does API Management Complement IAM?", "pubdate": "20190721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vision-for-omnichannel-authentication-directLink-1-i-4313.mp3", "title": "The Vision for Omnichannel Authentication", "pubdate": "20190721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tesla-vulnerability-bounty-hunters-tale-directLink-2-i-4389.mp3", "title": "Tesla Vulnerability: A Bounty Hunter\"s Tale", "pubdate": "20190719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proactive-mobile-threat-defense-directLink-4-i-4385.mp3", "title": "Proactive Mobile Threat Defense", "pubdate": "20190717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-deception-technology-evolving-directLink-5-i-4387.mp3", "title": "How Deception Technology Is Evolving", "pubdate": "20190717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-cyberattacks-lead-to-prolonged-conflicts-directLink-1-i-4386.mp3", "title": "Will Cyberattacks Lead to Prolonged Conflicts?", "pubdate": "20190717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/john-halamka-mitigating-medical-device-security-risks-directLink-4-i-4384.mp3", "title": "John Halamka: Mitigating Medical Device Security Risks", "pubdate": "20190716" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-thinking-supply-chain-security-directLink-9-i-4383.mp3", "title": "Re-Thinking Supply Chain Security", "pubdate": "20190714" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-significance-gdpr-fines-directLink-8-i-4379.mp3", "title": "Analysis: The Significance of GDPR Fines", "pubdate": "20190712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-soc-harmonizing-detection-response-directLink-5-i-4380.mp3", "title": "The Future SOC: Harmonizing Detection and Response", "pubdate": "20190712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-implications-amca-data-breach-directLink-8-i-4378.mp3", "title": "Legal Implications of the AMCA Data Breach", "pubdate": "20190712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/put-those-cloud-security-objections-to-rest-directLink-5-i-4374.mp3", "title": "Put Those Cloud Security Objections to Rest", "pubdate": "20190711" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-sharing-hard-directLink-9-i-4376.mp3", "title": "Threat Intelligence: Why Sharing Is Difficult", "pubdate": "20190709" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-your-best-cyber-defense-directLink-8-i-4363.mp3", "title": "Why Application Security Is Your Best Cyber Defense", "pubdate": "20190709" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/life-beyond-passwords-rise-advanced-biometrics-directLink-4-i-4373.mp3", "title": "Life Beyond Passwords: The Rise of Advanced Biometrics", "pubdate": "20190705" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-strong-vs-weak-encryption-directLink-8-i-4375.mp3", "title": "Analysis: Strong vs. Weak Encryption", "pubdate": "20190705" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-threat-intelligence-directLink-10-i-4372.mp3", "title": "The New Threat Intelligence", "pubdate": "20190702" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/put-those-cloud-security-objections-to-rest-directLink-5-i-4374.mp3", "title": "Put Those Cloud Security Objections to Rest", "pubdate": "20190701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mastercard-on-evolution-authentication-directLink-2-i-4364.mp3", "title": "Mastercard on the Evolution of Authentication", "pubdate": "20190629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dan-boweden-directLink-1-i-4369.mp3", "title": "Case Study: Moving to DevSecOps", "pubdate": "20190629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/third-party-risk-management-asking-right-questions-directLink-4-i-4368.mp3", "title": "Third-Party Risk Management: Asking the Right Questions", "pubdate": "20190628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloudflare-calls-internet-outage-small-heart-attack-directLink-6-i-4367.mp3", "title": "Cloudflare Calls Internet Outage \"Small Heart Attack\"", "pubdate": "20190628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zscalers-global-ciso-stan-lowe-on-security-as-catalyst-for-digital-transformation-directLink-6-i-4366.mp3", "title": "Zscaler\"s Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation", "pubdate": "20190628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-blended-threats-directLink-2-i-4365.mp3", "title": "The Evolution of Automated, Active Attacks", "pubdate": "20190627" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-as-game-changing-breach-defense-directLink-9-i-4352.mp3", "title": "Identity as a Game-Changing Breach Defense", "pubdate": "20190626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-iam-in-cloud-directLink-6-i-4362.mp3", "title": "The Evolution of IAM in the Cloud", "pubdate": "20190625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-resilience-finding-right-balance-directLink-1-i-4361.mp3", "title": "Risk and Resilience: Finding the Right Balance", "pubdate": "20190625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/developing-robust-third-party-risk-management-program-directLink-6-i-4360.mp3", "title": "Developing a Robust Third-Party Risk Management Program", "pubdate": "20190624" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-top-challenges-directLink-5-i-4359.mp3", "title": "Medical Device Cybersecurity: The Top Challenges", "pubdate": "20190624" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/migrating-to-cloud-top-security-lessons-directLink-9-i-4358.mp3", "title": "Migrating to the Cloud: Top Security Lessons", "pubdate": "20190622" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facebooks-cryptocurrency-plan-scrutinized-directLink-7-i-4357.mp3", "title": "Facebook\"s Cryptocurrency Plan Scrutinized", "pubdate": "20190621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/extreme-but-plausible-cyberthreats-directLink-9-i-4355.mp3", "title": "\"Extreme But Plausible\" Cyberthreats", "pubdate": "20190619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reinventing-security-awareness-training-directLink-9-i-4353.mp3", "title": "Reinventing Security Awareness Training", "pubdate": "20190619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-insights-on-breach-detection-directLink-10-i-4356.mp3", "title": "A CISO\"s Insights on Breach Detection", "pubdate": "20190618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/charlotte-leaders-focus-on-third-party-risk-directLink-7-i-4354.mp3", "title": "Charlotte Leaders Focus on Third-Party Risk", "pubdate": "20190617" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-cybersecurity-risks-major-corporations-face-directLink-6-i-4350.mp3", "title": "Analysis: The Cybersecurity Risks Major Corporations Face", "pubdate": "20190614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberattack-risk-scans-find-big-businesses-exposed-directLink-4-i-4349.mp3", "title": "Cyberattack Risk: Scans Find Big Businesses Exposed", "pubdate": "20190613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-stands-out-in-proposed-premera-lawsuit-settlement-directLink-2-i-4348.mp3", "title": "What Stands Out in Proposed Premera Lawsuit Settlement?", "pubdate": "20190612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-apples-new-single-sign-on-feature-directLink-1-i-4345.mp3", "title": "Analysis: Apple\"s New Single Sign-On Feature", "pubdate": "20190607" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zero-trust-secure-access-in-complex-environments-directLink-5-i-4341.mp3", "title": "Zero Trust: Secure Access in Complex Environments", "pubdate": "20190605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/closing-cybersecurity-skills-gap-directLink-5-i-4324.mp3", "title": "Closing the Cybersecurity Skills Gap", "pubdate": "20190605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fingerpointing-over-baltimores-ransomware-attack-directLink-10-i-4344.mp3", "title": "Fingerpointing Over Baltimore\"s Ransomware Attack", "pubdate": "20190531" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-source-security-how-to-defend-at-speed-attack-directLink-9-i-4343.mp3", "title": "Open Source Security - How to Defend at the Speed of Attack", "pubdate": "20190530" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vision-for-omnichannel-authentication-directLink-1-i-4313.mp3", "title": "The Vision for Omnichannel Authentication", "pubdate": "20190530" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-roundtable-recap-securing-digital-enterprise-directLink-5-i-4339.mp3", "title": "Executive Roundtable Recap: Securing the Digital Enterprise", "pubdate": "20190524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcares-unique-digital-transformation-directLink-8-i-4340.mp3", "title": "Healthcare\"s Unique Digital Transformation", "pubdate": "20190524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wannacry-still-causing-tears-two-years-on-directLink-6-i-4335.mp3", "title": "WannaCry Still Causing Tears 2 Years On", "pubdate": "20190524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-roundtable-recap-confessions-healthcare-ciso-directLink-7-i-4333.mp3", "title": "Executive Roundtable Recap: Confessions of a Healthcare CISO", "pubdate": "20190524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-dbir-c-level-executives-in-crosshairs-directLink-2-i-4334.mp3", "title": "Verizon DBIR: C-Level Executives in the Crosshairs", "pubdate": "20190523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lack-secure-coding-called-national-security-threat-directLink-9-i-4332.mp3", "title": "Lack of Secure Coding Called a National Security Threat", "pubdate": "20190521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whatsapps-spyware-problem-directLink-6-i-4329.mp3", "title": "WhatsApp\"s Spyware Problem", "pubdate": "20190517" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whatsapp-exploit-reveals-legalized-hacking-at-work-directLink-9-i-4326.mp3", "title": "WhatsApp Exploit Reveals \"Legalized Hacking\" at Work", "pubdate": "20190515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emergence-unified-endpoint-management-directLink-6-i-4317.mp3", "title": "Capturing ROI on Your Unified Endpoint Management Investment", "pubdate": "20190515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-does-api-management-complement-iam-directLink-10-i-4325.mp3", "title": "How does API Management Complement IAM?", "pubdate": "20190513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-digital-onboarding-directLink-6-i-4323.mp3", "title": "The Future of Digital Onboarding", "pubdate": "20190510" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-security-driven-networking-directLink-8-i-4320.mp3", "title": "The Rise of Security-Driven Networking", "pubdate": "20190510" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deepdotweb-goes-dark-directLink-8-i-4319.mp3", "title": "DeepDotWeb Goes Dark", "pubdate": "20190510" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-blended-cyberattacks-directLink-4-i-4318.mp3", "title": "Responding to Blended Cyberattacks", "pubdate": "20190509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-roundtable-recap-confessions-healthcare-ciso-directLink-7-i-4333.mp3", "title": "Executive Roundtable Recap: \\\"Confessions of a Healthcare CISO\\\"", "pubdate": "20190508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-healthcare-apps-critical-steps-directLink-10-i-4316.mp3", "title": "Safeguarding PHI in Healthcare Apps: Critical Steps", "pubdate": "20190508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cultural-challenges-digital-transformation-directLink-1-i-4321.mp3", "title": "Cultural Challenges and Digital Transformation", "pubdate": "20190506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vision-for-omnichannel-authentication-directLink-1-i-4313.mp3", "title": "The Vision for Omnichannel Authentication", "pubdate": "20190504" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/five-eyes-intelligence-agencies-discuss-strategies-directLink-3-i-4314.mp3", "title": "\"Five Eyes\" Intelligence Agencies Discuss Strategies", "pubdate": "20190503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-cyber-threat-landscape-directLink-1-i-4285.mp3", "title": "Assessing the Cyber Threat Landscape", "pubdate": "20190503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-in-hhs-latest-plan-for-nationwide-health-data-exchange-directLink-4-i-4312.mp3", "title": "What\"s in HHS\" New Plan for Nationwide Health Data Exchange?", "pubdate": "20190502" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malware-evolution-exploits-defenses-directLink-2-i-4310.mp3", "title": "Malware: The Evolution of Exploits and Defenses", "pubdate": "20190430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-management-finding-common-ground-directLink-5-i-4309.mp3", "title": "Identity Management: Finding Common Ground", "pubdate": "20190429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vendor-risk-management-better-approach-directLink-8-i-4307.mp3", "title": "Vendor Risk Management: A Better Approach", "pubdate": "20190427" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-peril-facebooks-marketplace-flaw-directLink-6-i-4306.mp3", "title": "Privacy Peril: Facebook\"s Marketplace Flaw", "pubdate": "20190426" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hsbc-whistleblower-fraud-crackdown-still-has-long-way-to-go-directLink-9-i-4305.mp3", "title": "HSBC Whistleblower: Fraud Fight Still Has Long Way to Go", "pubdate": "20190424" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dangers-unsecured-medical-devices-directLink-5-i-4298.mp3", "title": "The Dangers of Unsecured Medical Devices", "pubdate": "20190420" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/so-smart-child-tech-has-hackable-flaws-directLink-3-i-4296.mp3", "title": "Not So \"Smart\" - Child Tech Has Hackable Flaws", "pubdate": "20190419" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-authorised-push-payment-fraud-directLink-10-i-4270.mp3", "title": "Defending Against Authorized Push Payment Fraud", "pubdate": "20190417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/alexa-are-you-hipaa-compliant-directLink-10-i-4293.mp3", "title": "\"Alexa, Are You HIPAA Compliant?\"", "pubdate": "20190417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/raising-bar-on-browser-security-directLink-10-i-4294.mp3", "title": "Raising the Bar on Browser Security", "pubdate": "20190416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-security-finding-balance-directLink-8-i-4292.mp3", "title": "Privacy and Security: Finding the Balance", "pubdate": "20190415" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/another-scathing-equifax-post-breach-report-directLink-8-i-4291.mp3", "title": "Another Scathing Equifax Post-Breach Report", "pubdate": "20190412" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/women-in-cybersecurity-progress-report-directLink-1-i-4288.mp3", "title": "Women in Cybersecurity: A Progress Report", "pubdate": "20190410" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-evolving-ransomware-threat-directLink-8-i-4286.mp3", "title": "Analysis: The Evolving Ransomware Threat", "pubdate": "20190405" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-75-million-ucla-health-data-breach-settlement-directLink-1-i-4282.mp3", "title": "Analyzing the $7.5 Million UCLA Health Data Breach Settlement", "pubdate": "20190330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-policy-protect-2020-elections-directLink-9-i-4280.mp3", "title": "Can Cyber Policy Protect the 2020 Elections?", "pubdate": "20190329" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-security-strategies-for-2019-directLink-5-i-4243.mp3", "title": "Network Security Strategies for 2019", "pubdate": "20190322" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-5-i-4277.mp3", "title": "Norsk Hydro\"s Ransomware Headache", "pubdate": "20190322" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zscalers-stan-lowe-on-digital-transformation-directLink-10-i-4267.mp3", "title": "Zscaler\"s Stan Lowe on Digital Transformation", "pubdate": "20190316" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roundtable-review-digital-transformation-in-seattle-directLink-5-i-4263.mp3", "title": "Roundtable Review: Digital Transformation in Seattle", "pubdate": "20190316" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-prosilience-in-iot-security-directLink-9-i-4273.mp3", "title": "The Role of \"Prosilience\" in IoT Security", "pubdate": "20190315" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-machine-learning-for-fraud-prevention-directLink-1-i-4269.mp3", "title": "Using Machine Learning for Fraud Prevention", "pubdate": "20190314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/highlights-rsa-conference-2019-directLink-3-i-4266.mp3", "title": "Highlights of RSA Conference", "pubdate": "20190308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenges-implementing-next-generation-iam-directLink-8-i-4262.mp3", "title": "The Challenges of Implementing Next-Generation IAM", "pubdate": "20190304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bridging-cybersecurity-skills-gap-directLink-4-i-4265.mp3", "title": "Bridging the Cybersecurity Skills Gap", "pubdate": "20190301" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/greg-touhill-pre-rsa-directLink-3-i-4261.mp3", "title": "Filling Vacant Cybersecurity Jobs: The Role of \"Reskilling\"", "pubdate": "20190227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-blocking-rules-what-they-would-mean-for-cisos-directLink-10-i-4260.mp3", "title": "Information Blocking Rules: What They Would Mean for CISOs", "pubdate": "20190223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/password-manager-weaknesses-revealed-directLink-7-i-4259.mp3", "title": "Password Manager Weaknesses Revealed", "pubdate": "20190222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-security-considerations-for-ai-robotics-directLink-2-i-4258.mp3", "title": "Key Security Considerations for AI and Robotics", "pubdate": "20190219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-cryptocurrency-in-era-deep-fakes-directLink-7-i-4256.mp3", "title": "Protecting Cryptocurrency in the Era of \"Deep Fakes\"", "pubdate": "20190215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/parker-on-blockchain-directLink-6-i-4255.mp3", "title": "Blockchain in Healthcare: The Potential Benefits, Risks", "pubdate": "20190215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/onc-directLink-5-i-4254.mp3", "title": "Deciphering HHS\" Proposed Information Blocking Rules", "pubdate": "20190214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-gravity-will-weigh-down-cloud-security-directLink-9-i-4253.mp3", "title": "Data Gravity: Will It Weigh Down Cloud Security?", "pubdate": "20190214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/orchestrating-ssl-visibility-directLink-9-i-4237.mp3", "title": "Orchestrating SSL Visibility", "pubdate": "20190214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heesters-at-himss-directLink-8-i-4250.mp3", "title": "HIPAA Enforcement Update: Areas of Focus", "pubdate": "20190213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keeping-incident-response-plans-current-directLink-4-i-4249.mp3", "title": "Keeping Incident Response Plans Current", "pubdate": "20190213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cyber-risk-enterprise-problem-directLink-7-i-4245.mp3", "title": "Medical Device Cyber Risk: An Enterprise Problem", "pubdate": "20190213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-preview-directLink-9-i-4251.mp3", "title": "RSA Conference 2019: A Preview", "pubdate": "20190212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zscalers-bil-harmer-on-digital-transformation-directLink-4-i-4238.mp3", "title": "Zscaler\"s Bil Harmer on Digital Transformation", "pubdate": "20190212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mehring-wirth-at-himss-directLink-2-i-4247.mp3", "title": "Health Data Security: The Most Promising Technologies", "pubdate": "20190212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-iot-risks-in-healthcare-environments-directLink-2-i-4246.mp3", "title": "Assessing IoT Risks in Healthcare Environments", "pubdate": "20190211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-us-vulnerability-to-nation-state-cyberattack-directLink-4-i-4244.mp3", "title": "Assessing US Vulnerability to a Nation-State Cyberattack", "pubdate": "20190208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bolstering-cybersecurity-medical-devices-directLink-1-i-4241.mp3", "title": "Bolstering the Cybersecurity of Medical Devices", "pubdate": "20190207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-digital-enterprise-directLink-6-i-4240.mp3", "title": "Fortinet\"s Sonia Arista on Securing the Digital Enterprise", "pubdate": "20190206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-faces-fraud-survey-analysis-directLink-7-i-4193.mp3", "title": "New Faces of Fraud: Survey Analysis", "pubdate": "20190206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/persistent-threat-nation-state-cyberattacks-directLink-3-i-4236.mp3", "title": "The Persistent Threat of Nation-State Cyberattacks", "pubdate": "20190201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-integration-orchestration-help-in-battling-cyberthreats-directLink-4-i-4231.mp3", "title": "How Integration, Orchestration Help in Battling Cyberthreats", "pubdate": "20190131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-on-value-endpoint-detection-response-directLink-10-i-4234.mp3", "title": "A CISO on the Value of Endpoint Detection and Response", "pubdate": "20190131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptocurrency-money-laundering-alarming-new-trends-directLink-1-i-4235.mp3", "title": "Cryptocurrency Money Laundering: Alarming New Trends", "pubdate": "20190131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-matrix-emotet-how-they-work-how-to-defend-directLink-7-i-4232.mp3", "title": "Inside Matrix and Emotet: How They Work, and How to Defend", "pubdate": "20190130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/government-spending-on-cybersecurity-analysis-directLink-7-i-4233.mp3", "title": "Government Spending on Cybersecurity: An Analysis", "pubdate": "20190130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-case-study-identity-access-management-directLink-6-i-4230.mp3", "title": "Healthcare Case Study: Identity and Access Management", "pubdate": "20190126" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasons-behind-googles-gdpr-fine-directLink-1-i-4229.mp3", "title": "The Reasons Behind Google\"s GDPR Fine", "pubdate": "20190125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-studies-global-impact-gdpr-directLink-6-i-4228.mp3", "title": "Cisco Studies Global Impact of GDPR", "pubdate": "20190124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mergers-acquisitions-privacy-security-considerations-directLink-1-i-4227.mp3", "title": "Mergers & Acquisitions: Privacy and Security Considerations", "pubdate": "20190123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/life-under-gdpr-waiting-for-data-breach-precedents-directLink-10-i-4226.mp3", "title": "Life Under GDPR: Data Breach Cost Unknown", "pubdate": "20190123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-smarter-about-threat-intelligence-directLink-5-i-4220.mp3", "title": "Getting Smarter About Threat Intelligence", "pubdate": "20190122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legacy-medical-devices-tackling-cybersecurity-challenges-directLink-1-i-4225.mp3", "title": "Legacy Medical Devices: Tackling Cybersecurity Challenges", "pubdate": "20190119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chris-ahern-interview-to-come-directLink-8-i-4223.mp3", "title": "Venture Capital Pours Into Cybersecurity", "pubdate": "20190118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-pervasive-evolving-threat-directLink-10-i-4224.mp3", "title": "Ransomware: A Pervasive, Evolving Threat", "pubdate": "20190118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avoiding-critical-security-risk-analysis-mistakes-directLink-8-i-4221.mp3", "title": "Avoiding Critical Security Risk Analysis Mistakes", "pubdate": "20190116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/quantum-computing-sizing-up-risks-to-security-directLink-7-i-4222.mp3", "title": "Quantum Computing: Sizing Up the Risks to Security", "pubdate": "20190116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/card-not-present-fraud-costs-mount-directLink-2-i-4218.mp3", "title": "Card-Not-Present Fraud Costs Mount", "pubdate": "20190111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/card-not-present-fraud-growth-no-end-in-sight-directLink-6-i-4217.mp3", "title": "Card-Not-Present Fraud Growth: No End in Sight?", "pubdate": "20190108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-to-next-generation-soc-critical-factors-directLink-5-i-4216.mp3", "title": "Moving to a Next-Generation SOC: Critical Factors", "pubdate": "20190107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchains-biggest-potential-in-healthcare-directLink-9-i-4215.mp3", "title": "Blockchain\"s Biggest Potential in Healthcare", "pubdate": "20190105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-zero-trust-security-directLink-7-i-4214.mp3", "title": "Making the Case for Zero-Trust Security", "pubdate": "20190104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ongoing-battle-to-secure-card-payments-directLink-8-i-4211.mp3", "title": "The Ongoing Battle to Secure Card Payments", "pubdate": "20190103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/microsofts-top-3-cybersecurity-targets-for-2019-directLink-5-i-4212.mp3", "title": "Microsoft\"s Top 3 Cybersecurity Concerns for 2019", "pubdate": "20190103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-detection-omnichannel-approach-directLink-7-i-4213.mp3", "title": "Fraud Detection: An Omnichannel Approach", "pubdate": "20190103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-2019-be-turning-point-for-self-sovereign-identity-directLink-8-i-4199.mp3", "title": "Will 2019 Be a Turning Point for \"Self-Sovereign Identity\"?", "pubdate": "20190102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nahra-directLink-3-i-4200.mp3", "title": "What\"s Next for HIPAA?", "pubdate": "20181231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mastercard-podcast-directLink-3-i-4207.mp3", "title": "Why Mastercard Launched a \"Fusion Center\" for Security", "pubdate": "20181231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/plans-predictions-for-cybersecurity-in-2019-directLink-2-i-4209.mp3", "title": "Plans and Predictions for Cybersecurity in 2019", "pubdate": "20181228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/john-houston-directLink-5-i-4189.mp3", "title": "Why Cybersecurity Remains a Top C-Suite Concern", "pubdate": "20181226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/promising-security-technologies-in-year-ahead-directLink-1-i-4194.mp3", "title": "Promising Security Technologies in the Year Ahead", "pubdate": "20181224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-robotic-process-automation-directLink-1-i-4205.mp3", "title": "Fighting Fraud With Robotic Process Automation", "pubdate": "20181222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fine-tuning-security-operations-center-directLink-9-i-4203.mp3", "title": "Fine-Tuning the Security Operations Center", "pubdate": "20181222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-responding-to-new-wave-directLink-2-i-4202.mp3", "title": "Account Takeover: Responding to the New Wave", "pubdate": "20181222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-behavioral-analytics-to-protect-against-threats-directLink-2-i-4204.mp3", "title": "Using Behavioral Analytics to Protect Against Threats", "pubdate": "20181221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-care-act-viable-gdpr-equivalent-directLink-8-i-4201.mp3", "title": "The Data Care Act: A Viable GDPR Equivalent?", "pubdate": "20181221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2019-iot-security-outlook-directLink-1-i-4198.mp3", "title": "2019 IoT Security Outlook", "pubdate": "20181218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/did-china-hack-marriott-or-this-fake-news-directLink-6-i-4196.mp3", "title": "Did China Hack Marriott, Or Is This Fake News?", "pubdate": "20181214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/akamai-sponsored-podcast-part-ii-directLink-4-i-4190.mp3", "title": "Fighting Credential Stuffing Attacks", "pubdate": "20181210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gop-hacking-incident-what-happened-directLink-1-i-4188.mp3", "title": "GOP Hacking Incident: What Happened?", "pubdate": "20181207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/applying-secure-multiparty-computation-technology-directLink-9-i-4187.mp3", "title": "Applying Secure Multiparty Computation Technology", "pubdate": "20181206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/federal-prosecutors-discuss-samsam-indictments-directLink-10-i-4185.mp3", "title": "Federal Prosecutors Discuss SamSam Indictments", "pubdate": "20181130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malware-analysis-for-blue-teams-directLink-9-i-4157.mp3", "title": "Malware Analysis for Blue Teams", "pubdate": "20181129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-cloud-insecurity-directLink-3-i-4172.mp3", "title": "The State of Cloud (In)Security", "pubdate": "20181128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-risks-posed-by-automotive-smartphone-apps-directLink-7-i-4184.mp3", "title": "Managing the Risks Posed by Automotive Smartphone Apps", "pubdate": "20181128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacking-your-ride-risks-posed-by-automotive-smartphone-apps-directLink-5-i-4181.mp3", "title": "Hacking Your Ride: Risks Posed by Automotive Smartphone Apps", "pubdate": "20181123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hhs-deputy-secretary-eric-hargan-describes-cyber-initiative-directLink-4-i-4178.mp3", "title": "HHS Deputy Secretary Eric Hargan Describes Cyber Initiative", "pubdate": "20181120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/china-hack-attacks-economic-espionage-campaign-directLink-2-i-4175.mp3", "title": "China\"s Hack Attacks: An Economic Espionage Campaign", "pubdate": "20181116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-jonathan-care-gartner-directLink-5-i-4171.mp3", "title": "Using Unsupervised Machine Learning: The Challenges", "pubdate": "20181114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-fdas-reworked-premarket-medical-device-guidance-directLink-1-i-4168.mp3", "title": "Analysis: FDA\"s Reworked Premarket Medical Device Guidance", "pubdate": "20181113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-getting-most-from-mssp-directLink-8-i-4167.mp3", "title": "Tips for Getting the Most From an MSSP", "pubdate": "20181112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cracking-down-on-criminals-use-encrypted-communications-directLink-3-i-4170.mp3", "title": "Cracking Down on Criminals\" Use of Encrypted Communications", "pubdate": "20181109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-authentication-landscape-directLink-8-i-4165.mp3", "title": "State of the Authentication Landscape", "pubdate": "20181107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-third-party-risk-in-age-ransomware-directLink-1-i-4166.mp3", "title": "Managing Third-Party Risk in the Age of Ransomware", "pubdate": "20181107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inteview-felix-gaetghens-gartner-directLink-1-i-4163.mp3", "title": "How IAM is Evolving in the Blockchain Era", "pubdate": "20181105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-aseem-ahmed-akamai-customised-podcast-part-i-directLink-8-i-4162.mp3", "title": "Bots and Botnets: Addressing the Evolving Security Challenges", "pubdate": "20181103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/escalating-problem-protecting-connected-devices-directLink-5-i-4164.mp3", "title": "The Escalating Problem of Protecting Connected Devices", "pubdate": "20181102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nick-legal-summit-podcast-directLink-2-i-4161.mp3", "title": "Managing Cyber Risks: A New Tool for Banks", "pubdate": "20181101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mayo-clinic-expert-on-medical-device-security-best-practices-directLink-3-i-4159.mp3", "title": "Medical Device Security Best Practices From Mayo Clinic", "pubdate": "20181031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vendor-risk-management-conquering-challenges-directLink-5-i-4152.mp3", "title": "Healthcare Security Summit Speaker on Vendor Risk Management", "pubdate": "20181030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/connolly-directLink-1-i-4156.mp3", "title": "How to Use FDA\"s Medical Device Cybersecurity \"Playbook\"", "pubdate": "20181027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-facebook-fine-just-beginning-directLink-7-i-4155.mp3", "title": "UK Facebook Fine: Just the Beginning?", "pubdate": "20181026" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-vmware-coo-raghu-raghuram-directLink-4-i-4151.mp3", "title": "Securing \"East-West\" Traffic in the Cloud", "pubdate": "20181022" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-real-time-risk-management-directLink-6-i-4153.mp3", "title": "The Need for Real-Time Risk Management", "pubdate": "20181022" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-cyberattack-investigations-analysis-directLink-7-i-4150.mp3", "title": "UK Cyberattack Investigations: An Analysis", "pubdate": "20181019" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-gartner-sid-deshpande-directLink-4-i-4146.mp3", "title": "Completely Outsourced Security: A Bad Idea", "pubdate": "20181018" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/finserv-in-2019-cloudy-chance-uncertainty-directLink-4-i-4149.mp3", "title": "FinServ Cybersecurity: Risk in an Era of Enterprise IoT and OT", "pubdate": "20181017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/update-nist-preparing-privacy-framework-directLink-1-i-4148.mp3", "title": "Update: NIST Preparing Privacy Framework", "pubdate": "20181016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-president-on-case-for-risk-based-security-model-directLink-7-i-4147.mp3", "title": "RSA President on the Case for a Risk-Based Security Model", "pubdate": "20181015" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-lawrence-orans-gartner-directLink-4-i-4141.mp3", "title": "Network vs. Endpoint Security: Striking the Right Balance", "pubdate": "20181013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-critical-infrastructure-from-cyberattacks-directLink-1-i-4145.mp3", "title": "Safeguarding Critical Infrastructure From Cyberattacks", "pubdate": "20181013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessment-googles-data-leak-directLink-5-i-4143.mp3", "title": "An Assessment of Google\"s Data Leak", "pubdate": "20181012" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-business-email-compromise-attacks-directLink-3-i-4142.mp3", "title": "Defending Against Business Email Compromise Attacks", "pubdate": "20181010" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-biometrics-key-challenges-directLink-6-i-4140.mp3", "title": "Behavioral Biometrics: Key Challenges", "pubdate": "20181009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preventing-doomsday-healthcare-cyber-event-directLink-7-i-4139.mp3", "title": "Preventing a \"Doomsday\" Healthcare Cyber Event", "pubdate": "20181009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-opioid-legislation-stripped-privacy-provision-directLink-1-i-4138.mp3", "title": "Analysis: Opioid Legislation Stripped of Privacy Provision", "pubdate": "20181008" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-facebook-breachs-impact-directLink-7-i-4137.mp3", "title": "Analysis: Facebook Breach\"s Impact", "pubdate": "20181005" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-security-building-public-confidence-directLink-7-i-4136.mp3", "title": "Election Security: Building Public Confidence", "pubdate": "20181004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-insider-threat-what-works-directLink-7-i-4133.mp3", "title": "Battling the Insider Threat: What Works?", "pubdate": "20181003" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-works-on-security-for-new-payment-options-directLink-2-i-4132.mp3", "title": "PCI SSC Works on Security for New Payment Options", "pubdate": "20181002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-threats-myths-realities-directLink-7-i-4115.mp3", "title": "Mobile Threats: Myths and Realities", "pubdate": "20181002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-kelly-kavanaugh-gartner-directLink-7-i-4131.mp3", "title": "SOC Analytics: Building the Right Toolset", "pubdate": "20181001" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-jim-barkdoll-ceo-titus-directLink-7-i-4129.mp3", "title": "How Machine Learning Enhances Data Classification", "pubdate": "20181001" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lucci-directLink-3-i-4130.mp3", "title": "Preventing Business Associate Health Data Breaches", "pubdate": "20180929" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reaction-to-new-white-house-cybersecurity-strategy-directLink-9-i-4128.mp3", "title": "The Reaction to New White House Cybersecurity Strategy", "pubdate": "20180928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reputational-risk-third-party-validation-directLink-2-i-4126.mp3", "title": "Reputational Risk and Third-Party Validation", "pubdate": "20180927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breach-class-action-lawsuits-come-to-europe-directLink-8-i-4125.mp3", "title": "GDPR: Data Breach Class Action Lawsuits Come to Europe", "pubdate": "20180926" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/midterm-election-security-patching-critical-issue-directLink-6-i-4127.mp3", "title": "Midterm Election Security: Why Patching Is a Critical Issue", "pubdate": "20180926" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-ddos-detection-defense-directLink-2-i-4124.mp3", "title": "Advanced DDoS Detection and Defense", "pubdate": "20180925" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-will-gdpr-show-its-teeth-directLink-3-i-4122.mp3", "title": "When Will GDPR Show Its Teeth?", "pubdate": "20180921" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-on-secure-automation-jeffery-kok-cyberark-directLink-1-i-4123.mp3", "title": "Securing Software Automation, Orchestration", "pubdate": "20180921" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fresh-look-at-outsourcing-directLink-6-i-4121.mp3", "title": "A Fresh Look at Outsourcing", "pubdate": "20180920" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-compliance-common-misconceptions-directLink-7-i-4120.mp3", "title": "GDPR Compliance: Common Misconceptions", "pubdate": "20180920" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-for-pipeda-directLink-6-i-4106.mp3", "title": "Preparing for PIPEDA", "pubdate": "20180918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-information-exchange-missing-links-directLink-3-i-4117.mp3", "title": "Health Information Exchange: The Missing Links", "pubdate": "20180918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equifax-breach-key-lessons-learned-directLink-6-i-4114.mp3", "title": "Equifax Breach: Key Lessons Learned", "pubdate": "20180914" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-rapid7-ceo-corey-thomas-directLink-7-i-4113.mp3", "title": "Operationalizing Security: A Targeted Approach to \"SecOps\"", "pubdate": "20180912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-vendor-security-risk-management-directLink-1-i-4112.mp3", "title": "Simplifying Vendor Security Risk Management", "pubdate": "20180912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-matthew-moynahan-ceo-forcepoint-directLink-7-i-4109.mp3", "title": "Going Beyond a \"Walled-Garden\" Approach", "pubdate": "20180910" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-payments-security-lessons-from-canada-directLink-8-i-4108.mp3", "title": "Digital Payments Security: Lessons From Canada", "pubdate": "20180908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managed-threat-hunting-directLink-2-i-4103.mp3", "title": "Why Managed Threat Hunting?", "pubdate": "20180908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/computer-voting-national-disgrace-directLink-7-i-4107.mp3", "title": "Computer Voting: A \"National Disgrace\"", "pubdate": "20180907" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-dale-gardner-gartner-appsec-directLink-4-i-4104.mp3", "title": "Demystifying DevSecOps and Its Role in App Security", "pubdate": "20180907" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-midterm-elections-are-hackable-directLink-3-i-4105.mp3", "title": "Why the Midterm Elections Are Hackable", "pubdate": "20180906" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fresh-look-at-security-analytics-directLink-7-i-4098.mp3", "title": "A Fresh Look at Security Analytics", "pubdate": "20180905" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fintech-apps-consumer-privacy-concerns-remain-high-directLink-2-i-4101.mp3", "title": "Fintech Apps: Consumer Privacy Concerns Remain High", "pubdate": "20180905" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-russian-misinformation-campaign-directLink-1-i-4099.mp3", "title": "Analysis: Russian Misinformation Campaign", "pubdate": "20180831" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-iot-feasible-directLink-8-i-4097.mp3", "title": "Securing IoT: Is It Feasible?", "pubdate": "20180830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wheres-i-in-your-idaas-directLink-3-i-4085.mp3", "title": "Where\"s the \\\"I\\\" in Your IDaaS?", "pubdate": "20180830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/regulations-create-pressure-to-take-privacy-more-seriously-directLink-5-i-4096.mp3", "title": "Regulations Create Pressure to Take Privacy More Seriously", "pubdate": "20180829" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/paying-ransoms-more-cons-than-pros-directLink-6-i-4089.mp3", "title": "Paying Ransoms: More Cons Than Pros", "pubdate": "20180827" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-james-heinzman-thetaray-directLink-8-i-4080.mp3", "title": "Unsupervised Machine Learning: Fighting Cross-Channel Fraud", "pubdate": "20180825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/has-ship-sailed-on-securing-midterm-elections-directLink-2-i-4086.mp3", "title": "Has the Ship Sailed on Securing Midterm Elections?", "pubdate": "20180824" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/directtrusts-kibbe-on-future-health-info-exchange-directLink-5-i-4084.mp3", "title": "DirectTrust\"s Kibbe on the Future of Health Info Exchange", "pubdate": "20180824" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/modern-identity-access-management-how-to-build-trust-without-sacrificing-security-directLink-10-i-4079.mp3", "title": "Modern Identity and Access Management: How to Build Trust without Sacrificing Security", "pubdate": "20180823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-anthem-data-breach-settlement-directLink-3-i-4083.mp3", "title": "Analysis: Anthem Data Breach Settlement", "pubdate": "20180823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-malware-targets-mexico-will-spread-directLink-5-i-4082.mp3", "title": "Banking Malware Targets Mexico; Will It Spread?", "pubdate": "20180823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/road-to-business-driven-security-directLink-8-i-4111.mp3", "title": "The Road to Business-Driven Security", "pubdate": "20180822" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/widespread-phishing-campaign-targets-financial-institutions-directLink-6-i-4078.mp3", "title": "Widespread Phishing Campaign Targets Financial Institutions", "pubdate": "20180818" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/industrial-internet-things-emerging-risks-directLink-4-i-4075.mp3", "title": "The Industrial Internet of Things: Emerging Risks", "pubdate": "20180817" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-ai-ml-make-security-cheaper-directLink-9-i-4072.mp3", "title": "Will AI and ML Make Security Cheaper?", "pubdate": "20180815" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobileweb-app-security-how-do-you-know-its-working-directLink-10-i-4095.mp3", "title": "Mobile/Web App Security: How Do You Know it\"s Working?", "pubdate": "20180814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-many-legacy-medical-device-security-flaws-going-unfixed-directLink-4-i-4074.mp3", "title": "Are Legacy Medical Device Security Flaws Going Unfixed?", "pubdate": "20180814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tracking-manufacturing-cybersecurity-threats-directLink-7-i-4073.mp3", "title": "Tracking Cybersecurity Threats in Manufacturing", "pubdate": "20180814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managed-detection-response-for-mid-market-directLink-10-i-4069.mp3", "title": "Managed Detection & Response for Financial Services", "pubdate": "20180811" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-security-rule-turns-20-its-time-for-facelift-directLink-3-i-4071.mp3", "title": "HIPAA Security Rule Turns 20: It\"s Time for a Facelift", "pubdate": "20180810" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-privacy-issues-for-amazon-directLink-2-i-4070.mp3", "title": "New Privacy Issues for Amazon", "pubdate": "20180810" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-state-online-digital-trust-directLink-8-i-4068.mp3", "title": "The Global State of Online Digital Trust", "pubdate": "20180810" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/training-to-improve-product-security-directLink-5-i-4063.mp3", "title": "Training to Improve Support of Product Security", "pubdate": "20180808" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/amazons-healthcare-expansion-analyzing-privacy-concerns-directLink-9-i-4067.mp3", "title": "Amazon\"s Healthcare Expansion: Analyzing Privacy Concerns", "pubdate": "20180807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-security-insights-from-former-federal-ciso-directLink-5-i-4066.mp3", "title": "Election Security Insights From Former Federal CISO", "pubdate": "20180806" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/timely-insights-on-keeping-elections-secure-directLink-1-i-4064.mp3", "title": "How to Secure US Elections - Before It\"s Too Late", "pubdate": "20180803" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-election-meddling-three-pronged-approach-directLink-9-i-4061.mp3", "title": "Fighting Election Meddling: A Three-Pronged Approach", "pubdate": "20180802" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trailblazing-ciso-stephen-katz-offers-cybersecurity-insights-directLink-5-i-4060.mp3", "title": "Trailblazing CISO Stephen Katz Offers Cybersecurity Insights", "pubdate": "20180801" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-soc-strategy-in-light-skills-shortage-directLink-7-i-4059.mp3", "title": "A New SOC Strategy in Light of Skills Shortage", "pubdate": "20180731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/routh-directLink-3-i-4057.mp3", "title": "A More Dynamic Approach to Cybersecurity", "pubdate": "20180730" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbi-update-on-fighting-against-russian-election-meddling-directLink-2-i-4056.mp3", "title": "An FBI Update on Fighting Against Russian Election Meddling", "pubdate": "20180727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/litan-directLink-1-i-3995.mp3", "title": "Blockchain for Identity Management: Early Examples", "pubdate": "20180725" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-hunting-how-to-evolve-your-incident-response-directLink-2-i-4110.mp3", "title": "Threat Hunting: How to Evolve Your Incident Response", "pubdate": "20180725" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/samsam-inside-one-worlds-top-forms-ransomware-directLink-3-i-4053.mp3", "title": "SamSam: Inside One of the World\"s Top Forms of Ransomware", "pubdate": "20180723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trumps-views-on-russian-election-meddling-history-directLink-8-i-4050.mp3", "title": "Trump\"s Views on Russian Election Meddling: A History", "pubdate": "20180720" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-effort-to-draft-medical-device-cybersecurity-guidance-directLink-8-i-4051.mp3", "title": "A New Effort to Draft Medical Device Cybersecurity Guidance", "pubdate": "20180720" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-blockchain-to-support-new-approach-to-id-management-directLink-5-i-4049.mp3", "title": "Using Blockchain to Support a New Approach to ID Management", "pubdate": "20180719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/server-security-need-for-deep-learning-anti-exploit-directLink-5-i-4044.mp3", "title": "Server Security: The Need for Deep Learning and Anti-Exploit", "pubdate": "20180717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russian-indictments-time-for-us-cyber-command-to-take-gloves-off-directLink-6-i-4046.mp3", "title": "\"Time for US Cyber Command to Take the Gloves Off\"", "pubdate": "20180714" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-californias-groundbreaking-privacy-law-directLink-5-i-4045.mp3", "title": "Analysis: California\"s Groundbreaking Privacy Law", "pubdate": "20180713" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bringing-vendor-risk-management-to-midmarket-directLink-2-i-4037.mp3", "title": "Bringing Vendor Risk Management to the Midmarket", "pubdate": "20180709" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kirk-nahra-directLink-8-i-4036.mp3", "title": "Why California\"s New Privacy Law Is a \"Whole New Ballgame\"", "pubdate": "20180709" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptocurrencies-skyrocketing-money-laundering-problem-directLink-7-i-4035.mp3", "title": "Cryptocurrency\"s Skyrocketing Money Laundering Problem", "pubdate": "20180706" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptocurrency-launderings-explosive-growth-directLink-10-i-4034.mp3", "title": "Cryptocurrency Laundering\"s Explosive Growth", "pubdate": "20180703" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-understanding-privacy-security-risks-directLink-9-i-4023.mp3", "title": "Big Data: Understanding the Privacy, Security Risks", "pubdate": "20180629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-healthcare-companies-ever-be-data-brokers-directLink-7-i-4030.mp3", "title": "Should Healthcare Companies Ever be Data Brokers?", "pubdate": "20180629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brian-lancaster-directLink-4-i-4020.mp3", "title": "Case Study: Protecting Electronic Medical Records", "pubdate": "20180628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cletis-earle-directLink-3-i-4025.mp3", "title": "A CIO on Carrying the Burden of Medical Device Cybersecurity", "pubdate": "20180627" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-analytics-insider-threat-directLink-2-i-4027.mp3", "title": "Behavioral Analytics and the Insider Threat", "pubdate": "20180627" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-protection-overcoming-hurdles-directLink-7-i-4028.mp3", "title": "Identity Protection: Overcoming Hurdles", "pubdate": "20180626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-hunting-how-to-evolve-your-incident-response-directLink-6-i-4091.mp3", "title": "Threat Hunting: How to Evolve Your Incident Response", "pubdate": "20180625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preview-ismgs-fraud-breach-summit-in-chicago-directLink-8-i-4026.mp3", "title": "Preview: ISMG\"s Fraud and Breach Prevention Summit in Chicago", "pubdate": "20180622" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-you-ready-for-next-gen-pki-directLink-6-i-3990.mp3", "title": "Providing Strongly Authenticated Device Identity", "pubdate": "20180622" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brett-johnson-directLink-3-i-4022.mp3", "title": "Is Regulating Cryptocurrency Necessary and Feasible?", "pubdate": "20180621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-insurance-how-underwriting-changing-directLink-10-i-4019.mp3", "title": "Cybersecurity Insurance: How Underwriting Is Changing", "pubdate": "20180619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-deception-tactics-used-in-banco-de-chile-hack-directLink-4-i-4016.mp3", "title": "Analysis: Distraction Tactics Used in Banco de Chile Hack", "pubdate": "20180615" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/people-factor-fight-back-against-phishing-directLink-4-i-4015.mp3", "title": "The People Factor: Fight back Against Phishing", "pubdate": "20180614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chip-no-signature-whats-behind-move-directLink-9-i-4013.mp3", "title": "Chip and No Signature: What\"s Behind the Move?", "pubdate": "20180611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-swiping-cryptocurrencies-through-back-door-directLink-7-i-4012.mp3", "title": "Analysis: Swiping Cryptocurrencies Through a Back Door", "pubdate": "20180608" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-framework-as-foundation-directLink-6-i-4001.mp3", "title": "NIST Framework as a Foundation", "pubdate": "20180608" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/artificial-intelligence-machine-learning-beyond-hype-directLink-4-i-4011.mp3", "title": "Artificial Intelligence and Machine Learning: Beyond the Hype", "pubdate": "20180607" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-data-breach-litigation-trends-directLink-6-i-4010.mp3", "title": "Analysis: Data Breach Litigation Trends", "pubdate": "20180606" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-compliant-yet-dont-panic-directLink-3-i-4007.mp3", "title": "Not GDPR Compliant Yet? Don\"t Panic", "pubdate": "20180602" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/women-in-security-assessing-progress-directLink-4-i-4006.mp3", "title": "Women in Security: Assessing the Progress", "pubdate": "20180530" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-enforcement-deadline-you-blew-it-so-what-next-directLink-4-i-4005.mp3", "title": "GDPR Enforcement Deadline: If You Blew It, What\"s Next?", "pubdate": "20180529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-banks-lack-appetite-to-become-identity-custodians-directLink-10-i-4002.mp3", "title": "Do US Banks Lack the Appetite to Become Identity Custodians?", "pubdate": "20180526" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-look-at-email-security-directLink-4-i-3997.mp3", "title": "A New Look at Email Security", "pubdate": "20180525" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransford-directLink-6-i-3998.mp3", "title": "Medical Device Cybersecurity: A Progress Report", "pubdate": "20180525" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leveraging-saas-to-fill-skills-gap-directLink-7-i-4003.mp3", "title": "Leveraging SaaS to Fill the Skills Gap", "pubdate": "20180525" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-enforcement-begins-impact-on-healthcare-banking-directLink-6-i-3999.mp3", "title": "GDPR Enforcement Begins: Impact on Healthcare, Banking", "pubdate": "20180525" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-digital-identity-directLink-8-i-3993.mp3", "title": "The Future of Digital Identity", "pubdate": "20180525" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/floridas-approach-to-training-cybersecurity-specialists-directLink-3-i-3996.mp3", "title": "Florida\"s Approach to Training Cybersecurity Specialists", "pubdate": "20180524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-australia-ready-directLink-2-i-3994.mp3", "title": "GDPR: Is Australia Ready?", "pubdate": "20180522" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-compliance-for-us-healthcare-what-you-need-to-know-directLink-5-i-3991.mp3", "title": "GDPR Compliance for US Healthcare: What You Need to Know", "pubdate": "20180522" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-looming-impact-on-us-banks-directLink-8-i-3988.mp3", "title": "GDPR: The Looming Impact on US Banks", "pubdate": "20180521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-deception-technology-in-ma-directLink-9-i-3989.mp3", "title": "The Role of Deception Technology in M&A", "pubdate": "20180518" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nonstop-breaches-fuel-spike-in-synthetic-identity-fraud-directLink-10-i-3986.mp3", "title": "Nonstop Breaches Fuel Spike in Synthetic Identity Fraud", "pubdate": "20180518" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/as-payments-speed-up-how-fraud-be-minimized-directLink-2-i-3983.mp3", "title": "As Payments Speed Up, How Can Fraud Be Minimized?", "pubdate": "20180517" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hidden-power-threat-intelligence-directLink-4-i-3984.mp3", "title": "The Hidden Power of Threat Intelligence", "pubdate": "20180517" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conroy-directLink-5-i-3982.mp3", "title": "Sizing Up the Impact of Synthetic Identity Fraud", "pubdate": "20180514" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/all-us-research-project-privacy-risks-directLink-8-i-3981.mp3", "title": "\"All of Us\" Research Project: The Privacy Risks", "pubdate": "20180512" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-time-payment-networks-face-off-against-fraudsters-directLink-6-i-3979.mp3", "title": "Real-Time Payment Networks Face Off Against Fraudsters", "pubdate": "20180511" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-way-to-handle-cyber-claims-directLink-3-i-3958.mp3", "title": "A New Way to Handle Cyber Claims", "pubdate": "20180511" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/texas-hospital-ceos-cybersecurity-no-1-worry-directLink-4-i-3971.mp3", "title": "Texas Hospital CEOs: Cybersecurity Is No. 1 Worry", "pubdate": "20180508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-gdpr-means-for-cybersecurity-directLink-2-i-3957.mp3", "title": "What GDPR Means for Cybersecurity", "pubdate": "20180505" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/no-surprise-cambridge-analytica-tries-to-exit-data-scandal-directLink-5-i-3970.mp3", "title": "No Surprise: Cambridge Analytica Tries to Exit Data Scandal", "pubdate": "20180504" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchain-in-healthcare-testing-id-app-directLink-8-i-3969.mp3", "title": "Blockchain in Healthcare: Testing an ID App", "pubdate": "20180504" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-banking-other-risk-challenges-for-banks-directLink-3-i-3967.mp3", "title": "Open Banking and Other Risk Challenges for Banks", "pubdate": "20180503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-wave-bec-ato-directLink-6-i-3963.mp3", "title": "The New Wave of BEC and ATO", "pubdate": "20180501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-data-protections-into-iot-devices-directLink-10-i-3966.mp3", "title": "Building Data Protections Into IoT Devices", "pubdate": "20180501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-understanding-complexities-directLink-3-i-3965.mp3", "title": "GDPR: Understanding the Complexities", "pubdate": "20180430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/countdown-to-gdpr-enforcement-deadline-looms-directLink-10-i-3964.mp3", "title": "Countdown to GDPR Enforcement: Deadline Looms", "pubdate": "20180427" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dimaggio-directLink-7-i-3961.mp3", "title": "Analysis: \"Orangeworm\" Attacks Appear to Involve Espionage", "pubdate": "20180425" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-deception-technology-to-stay-ahead-cyber-threats-directLink-1-i-3956.mp3", "title": "Using Deception Technology to Stay Ahead of Cyber Threats", "pubdate": "20180417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/artificial-intelligence-heres-solid-definition-directLink-9-i-3939.mp3", "title": "What\"s Artificial Intelligence? Here\"s a Solid Definition", "pubdate": "20180416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-banking-fighting-against-fraud-surge-directLink-6-i-3856.mp3", "title": "Open Banking: Fighting Against Fraud Surge", "pubdate": "20180414" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-verizons-breach-report-2018-directLink-2-i-3951.mp3", "title": "Analysis: Verizon\"s Breach Report 2018", "pubdate": "20180413" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-preview-more-video-interviews-in-2018-directLink-1-i-3952.mp3", "title": "RSA Conference Preview: More Video Interviews in 2018", "pubdate": "20180413" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deception-technology-expect-trickle-down-to-msps-directLink-1-i-3950.mp3", "title": "Deception Technology: Expect a Trickle Down to MSSPs", "pubdate": "20180412" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enhanced-fido-authentication-standard-expands-to-browser-directLink-8-i-3949.mp3", "title": "Enhanced FIDO Authentication Standard Expands to the Browser", "pubdate": "20180412" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-identity-in-financial-services-directLink-8-i-3942.mp3", "title": "The Power of Identity in Financial Services", "pubdate": "20180411" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/joan-pepin-directLink-10-i-3947.mp3", "title": "Under Armour Mobile App Breach: Lessons to Learn", "pubdate": "20180410" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adam-greene-directLink-1-i-3945.mp3", "title": "The Impact of All 50 States Having Breach Notification Laws", "pubdate": "20180409" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ibm-highlights-growth-in-cryptocurrency-based-cyberattacks-directLink-5-i-3943.mp3", "title": "IBM Highlights Growth in Cryptocurrency-Based Cyberattacks", "pubdate": "20180406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-for-smb-directLink-8-i-3946.mp3", "title": "Cybersecurity for the SMB", "pubdate": "20180406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ashish-thapar-verizon-directLink-4-i-3936.mp3", "title": "The Road to Actionable Threat Intelligence", "pubdate": "20180404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dos-donts-reporting-to-board-directLink-3-i-3937.mp3", "title": "The Do\"s and Don\"ts of Reporting to the Board", "pubdate": "20180404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verifying-vendors-security-programs-directLink-4-i-3940.mp3", "title": "Verifying Vendors\" Security Programs", "pubdate": "20180404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-steps-for-implementing-effective-cyber-soc-directLink-8-i-3938.mp3", "title": "5 Steps for Implementing an Effective Cyber SOC", "pubdate": "20180404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-banking-directLink-3-i-3931.mp3", "title": "How Will Facebook Incident Affect Open Banking Movement?", "pubdate": "20180402" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crypto-locking-malware-hits-atlanta-baltimore-boeing-directLink-1-i-3932.mp3", "title": "Crypto-Locking Malware Hits Atlanta, Baltimore, Boeing", "pubdate": "20180330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unraveling-cyber-skills-gap-directLink-4-i-3927.mp3", "title": "Unraveling the Cyber Skills Gap", "pubdate": "20180328" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-vpn-fail-reveals-guccifer-20-fancy-bear-directLink-3-i-3930.mp3", "title": "Analysis: VPN Fail Reveals \"Guccifer 2.0\" is \"Fancy Bear\"", "pubdate": "20180327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/congress-tells-facebooks-zuckerberg-you-will-testify-directLink-10-i-3929.mp3", "title": "Lawmakers Tell Facebook\"s Zuckerberg: You Will Testify", "pubdate": "20180323" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-brian-mccann-netscoutarbor-directLink-6-i-3924.mp3", "title": "The Growing Threat from Multi-Vector DDoS Attacks", "pubdate": "20180323" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sizing-up-crypto-wallet-vulnerabilities-directLink-9-i-3925.mp3", "title": "Sizing Up Crypto Wallet Vulnerabilities", "pubdate": "20180321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/path-to-modern-iam-directLink-2-i-3918.mp3", "title": "The Path to Modern IAM", "pubdate": "20180320" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-ny-attorney-generals-anti-breach-actions-directLink-5-i-3920.mp3", "title": "Analysis: NY Attorney General\"s Anti-Breach Actions", "pubdate": "20180317" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-finally-sanctions-russians-for-election-interference-directLink-8-i-3919.mp3", "title": "US Finally Sanctions Russians for Hacking", "pubdate": "20180316" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-tight-budget-impede-ocrs-hipaa-mission-directLink-8-i-3916.mp3", "title": "Will Tight Budget Impede OCR\"s HIPAA Mission?", "pubdate": "20180314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-business-risks-in-cloud-directLink-5-i-3913.mp3", "title": "Managing Business Risks in the Cloud", "pubdate": "20180310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-general-us-election-meddling-response-unified-directLink-8-i-3912.mp3", "title": "Top US General: Response to Russia Not Unified", "pubdate": "20180309" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-sector-cybersecurity-finally-maturing-directLink-4-i-3909.mp3", "title": "Is Healthcare Sector Cybersecurity Finally Maturing?", "pubdate": "20180308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/onc-considering-tweaks-to-trusted-exchange-framework-directLink-1-i-3905.mp3", "title": "ONC Considering Tweaks to Trusted Exchange Framework", "pubdate": "20180308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-borderless-networks-directLink-3-i-3907.mp3", "title": "Securing Borderless Networks", "pubdate": "20180307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-cloud-security-right-directLink-10-i-3903.mp3", "title": "Getting Cloud Security Right", "pubdate": "20180307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mark-dill-directLink-3-i-3901.mp3", "title": "HIMSS Speaker Dill on Underutilized Security Technologies", "pubdate": "20180306" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-omnichannel-anti-fraud-strategy-directLink-2-i-3900.mp3", "title": "Preparing an Omnichannel Anti-Fraud Strategy", "pubdate": "20180305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitch-parker-directLink-8-i-3897.mp3", "title": "Sizing Up the Role of Deception Technology in Healthcare", "pubdate": "20180303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-election-interference-white-house-response-questioned-directLink-9-i-3896.mp3", "title": "US Election Interference: White House Response Questioned", "pubdate": "20180302" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trish-carreiro-directLink-7-i-3894.mp3", "title": "What Comes Next in the CareFirst Data Breach Case?", "pubdate": "20180301" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-advanced-attack-detection-directLink-8-i-3893.mp3", "title": "Simplifying Advanced Attack Detection", "pubdate": "20180228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deception-technology-worth-investment-directLink-9-i-3892.mp3", "title": "Deception Technology: Worth the Investment?", "pubdate": "20180228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/teppler-on-iot-directLink-1-i-3891.mp3", "title": "IoT Devices: Reducing the Risks", "pubdate": "20180228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-in-balance-security-vs-convenience-directLink-2-i-3878.mp3", "title": "Banking in the Balance: Security Vs. Convenience", "pubdate": "20180227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-recent-hipaa-settlements-directLink-8-i-3889.mp3", "title": "Lessons From Recent HIPAA Settlements", "pubdate": "20180224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/feds-versus-trolls-justice-department-indicts-russians-directLink-10-i-3888.mp3", "title": "Out for Justice: Feds Battle Trolls", "pubdate": "20180223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-making-security-technology-purchase-decisions-directLink-8-i-3883.mp3", "title": "Tips for Making Security Technology Purchase Decisions", "pubdate": "20180222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russian-indictments-its-about-time-directLink-10-i-3881.mp3", "title": "Russian Indictments: \"It\"s About Time\"", "pubdate": "20180217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/convergence-healthcare-innovation-compliance-directLink-8-i-3875.mp3", "title": "The Convergence of Healthcare Innovation and Compliance", "pubdate": "20180217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russias-election-meddling-cia-offensive-at-ready-directLink-10-i-3880.mp3", "title": "Russia\"s Election Meddling: CIA Offensive at the Ready", "pubdate": "20180216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pescatore-on-iot-directLink-5-i-3877.mp3", "title": "How IoT Affects the CISO\"s Job", "pubdate": "20180215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/panel-experts-describe-steps-to-secure-aadhaar-data-directLink-3-i-3876.mp3", "title": "Panel of Experts Describes Steps to Secure Aadhaar Data", "pubdate": "20180214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trey-maust-directLink-5-i-3872.mp3", "title": "Sheltered Harbor: A New Approach to Account Backups", "pubdate": "20180214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-extortion-attack-techniques-directLink-10-i-3873.mp3", "title": "DDoS Extortion and Attack Techniques", "pubdate": "20180212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lauri-love-uk-blocks-suspected-hackers-us-extradition-directLink-6-i-3874.mp3", "title": "Lauri Love: UK Blocks Suspected Hacker\"s US Extradition", "pubdate": "20180209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bridging-password-gap-directLink-1-i-3869.mp3", "title": "Bridging the Password Gap", "pubdate": "20180208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/faster-payments-dont-have-to-mean-faster-fraud-directLink-10-i-3865.mp3", "title": "Faster Payments Don\"t Have to Mean Faster Fraud", "pubdate": "20180207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ai-will-play-bigger-role-in-cybersecurity-directLink-4-i-3859.mp3", "title": "Why AI Will Play a Bigger Role in Cybersecurity", "pubdate": "20180207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sorry-state-endpoint-security-directLink-1-i-3855.mp3", "title": "The Sorry State of Endpoint Security", "pubdate": "20180206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rationalizing-security-stack-directLink-5-i-3863.mp3", "title": "Rationalizing the Security Stack", "pubdate": "20180203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/darknet-markets-for-cybercriminals-paranoia-reigns-directLink-2-i-3867.mp3", "title": "Darknet Markets: For Cybercriminals, Paranoia Reigns", "pubdate": "20180202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybercrime-services-plus-knowledge-equals-profit-directLink-2-i-3866.mp3", "title": "Cybercrime as a Service: Tools + Knowledge = Profit", "pubdate": "20180201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gary-warner-directLink-2-i-3852.mp3", "title": "Effectively Marrying Big Data Analytics and SIEMs", "pubdate": "20180201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kellermann-gets-back-on-field-directLink-3-i-3864.mp3", "title": "Venture Captalist Kellermann Gets \"Back on the Field\"", "pubdate": "20180201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/allscripts-lawsuit-what-makes-different-directLink-7-i-3861.mp3", "title": "Allscripts Lawsuit: What Makes It Different?", "pubdate": "20180131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iot-moving-to-security-by-design-directLink-10-i-3860.mp3", "title": "IoT: Moving to Security by Design", "pubdate": "20180131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchains-bid-to-rid-world-data-breaches-directLink-6-i-3858.mp3", "title": "Blockchain\"s Bid to Rid the World of Data Breaches", "pubdate": "20180127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchain-in-healthcare-potential-limitations-directLink-8-i-3853.mp3", "title": "Blockchain in Healthcare: The Potential and Limitations", "pubdate": "20180124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-tatas-avinash-prasad-on-meca-securitiy-directLink-7-i-3851.mp3", "title": "The Evolving Cybersecurity Landscape in the MECA Region", "pubdate": "20180124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-pitfalls-privileged-access-management-directLink-10-i-3807.mp3", "title": "4 Pitfalls of Privileged Access Management", "pubdate": "20180122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-some-victims-backups-still-pay-directLink-10-i-3850.mp3", "title": "Ransomware: Why Some Victims With Backups Still Pay", "pubdate": "20180119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/framework-aims-to-improve-patient-data-matching-directLink-2-i-3847.mp3", "title": "Framework Aims to Improve Patient Data Matching", "pubdate": "20180119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/venture-capitalists-2018-outlook-directLink-4-i-3846.mp3", "title": "A Venture Capitalist\"s 2018 Outlook", "pubdate": "20180118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-makes-oncs-trusted-exchange-framework-so-complex-directLink-5-i-3848.mp3", "title": "What Makes ONC\"s \"Trusted Exchange Framework\" So Complex?", "pubdate": "20180117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/machine-identity-crisis-directLink-1-i-3841.mp3", "title": "The Machine Identity Crisis", "pubdate": "20180116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-ready-to-comply-gdpr-directLink-7-i-3844.mp3", "title": "Is Healthcare Ready to Comply With GDPR?", "pubdate": "20180116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conversation-dave-dewalt-part-2-directLink-1-i-3839.mp3", "title": "A Conversation With Dave DeWalt: Part 2", "pubdate": "20180115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbi-directors-encryption-comments-prove-controversial-directLink-3-i-3843.mp3", "title": "FBI Director\"s Encryption Comments Prove Controversial", "pubdate": "20180112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-what-us-healthcare-entities-need-to-know-directLink-7-i-3840.mp3", "title": "GDPR: What US Healthcare Entities Need to Know", "pubdate": "20180110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-areas-ripe-for-exploitation-in-2018-directLink-6-i-3837.mp3", "title": "New Areas Ripe for Exploitation in 2018", "pubdate": "20180109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conversation-dave-dewalt-part-1-directLink-7-i-3838.mp3", "title": "A Conversation With Dave DeWalt: Part 1", "pubdate": "20180109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-attacks-will-be-more-devastating-widespread-directLink-6-i-3833.mp3", "title": "Ransomware Attacks Will Be More Devastating and Widespread", "pubdate": "20180105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-problem-that-wont-go-away-directLink-4-i-3812.mp3", "title": "Ransomware: The Problem That Won\"t Go Away", "pubdate": "20180104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-cyberattacks-impact-patient-safety-directLink-10-i-3799.mp3", "title": "How Cyberattacks Can Impact Patient Safety", "pubdate": "20180103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ed-amoroso-on-cisos-challenge-in-2018-directLink-8-i-3820.mp3", "title": "Ed Amoroso on CISOs\" Challenges in 2018", "pubdate": "20180103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-getting-security-right-this-time-directLink-2-i-3810.mp3", "title": "Healthcare: Getting Security Right This Time", "pubdate": "20180102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/recalling-9-years-cybersecurity-news-analysis-directLink-3-i-3824.mp3", "title": "Recalling 9 Years of Cybersecurity News and Analysis", "pubdate": "20180102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/integrity-data-medical-device-cybersecurity-concerns-directLink-8-i-3797.mp3", "title": "Integrity of Data: Medical Device Cybersecurity Concerns", "pubdate": "20171229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-trends-cybersecurity-practitioners-must-address-in-2018-directLink-10-i-3822.mp3", "title": "5 Trends Cybersecurity Practitioners Must Address in 2018", "pubdate": "20171229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forecast-2018-nation-states-test-offensive-waters-directLink-4-i-3813.mp3", "title": "Forecast 2018: Nation-States Test Offensive Waters", "pubdate": "20171228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gus-hunt-directLink-10-i-3818.mp3", "title": "Why Healthcare Cybersecurity Spending Is Rising", "pubdate": "20171228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/troy-hunt-discusses-his-data-breach-message-to-congress-directLink-8-i-3801.mp3", "title": "Troy Hunt Discusses His Data Breach Message to Congress", "pubdate": "20171227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-better-information-to-secure-swift-international-transfers-directLink-3-i-3802.mp3", "title": "Using Better Information to Secure SWIFT International Transfers", "pubdate": "20171226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/man-behind-cybersecurity-moonshot-directLink-3-i-3817.mp3", "title": "The Man Behind the Cybersecurity \"Moonshot\"", "pubdate": "20171226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/former-us-ciso-on-awareness-training-priority-1-directLink-3-i-3815.mp3", "title": "Former US CISO on Why Awareness Training Is Priority Number 1", "pubdate": "20171223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/north-korea-true-culprit-behind-wannacry-directLink-3-i-3814.mp3", "title": "Is North Korea the True Culprit Behind WannaCry?", "pubdate": "20171222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exploring-cybers-role-in-new-national-security-strategy-directLink-1-i-3809.mp3", "title": "Exploring Cyber\"s Role in the New National Security Strategy", "pubdate": "20171219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legislation-backing-hacking-back-good-idea-directLink-1-i-3798.mp3", "title": "Is Legislation Backing \"Hacking Back\" a Good Idea?", "pubdate": "20171218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-malware-known-as-triton-threatens-public-safety-directLink-10-i-3808.mp3", "title": "How Malware Known as Triton Threatens Public Safety", "pubdate": "20171215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-distinguishing-fact-from-fiction-directLink-9-i-3803.mp3", "title": "GDPR: Distinguishing Fact From Fiction", "pubdate": "20171215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critical-components-insider-threat-prevention-program-directLink-5-i-3806.mp3", "title": "Critical Components of an Insider Threat Mitigation Program", "pubdate": "20171212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/significant-changes-coming-to-nist-cybersecurity-framework-directLink-3-i-3805.mp3", "title": "Significant Changes Coming to NIST Cybersecurity Framework", "pubdate": "20171212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-devices-treat-them-like-untrusted-end-user-tools-directLink-2-i-3800.mp3", "title": "Medical Devices: Treat Them Like Untrusted End-User Tools", "pubdate": "20171208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/containing-cyber-exposure-directLink-9-i-3778.mp3", "title": "Containing Cyber Exposure", "pubdate": "20171207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-benefits-identity-as-service-directLink-8-i-3794.mp3", "title": "The Business Benefits of Identity as a Service", "pubdate": "20171206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/api-security-trends-for-2018-directLink-1-i-3788.mp3", "title": "API and Security Trends for 2018", "pubdate": "20171206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-sec-cyber-unit-eyes-initial-coin-offering-abuse-directLink-9-i-3796.mp3", "title": "New SEC Cyber Unit Targets Initial Coin Offering Scam", "pubdate": "20171205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-ethical-hacking-directLink-7-i-3793.mp3", "title": "Making the Case for Ethical Hacking", "pubdate": "20171205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-need-to-panic-little-or-lot-directLink-8-i-3783.mp3", "title": "GDPR: \"Need to Panic a Little or a Lot?\"", "pubdate": "20171204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-wares-require-slowing-down-development-process-directLink-2-i-3792.mp3", "title": "Securing IT Requires Slowing Down the Development Process", "pubdate": "20171201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-biometrics-in-multifactor-authentication-directLink-7-i-3786.mp3", "title": "The Role of Biometrics in Multifactor Authentication", "pubdate": "20171201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-targeted-attacks-directLink-8-i-3782.mp3", "title": "Spear Phishing and Targeted Attacks", "pubdate": "20171201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/endpoint-security-for-cloud-generation-directLink-3-i-3791.mp3", "title": "Endpoint Security for the Cloud Generation", "pubdate": "20171130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/on-eve-2018-campaign-candidates-get-security-advice-from-for-profits-directLink-8-i-3787.mp3", "title": "As 2018 Campaign Gears Up, Candidates Get Security Advice", "pubdate": "20171128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cso-offers-new-models-to-battle-phishing-attacks-directLink-9-i-3785.mp3", "title": "CSO Offers New Models to Battle Phishing Attacks", "pubdate": "20171124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-data-breaches-legal-issues-directLink-10-i-3784.mp3", "title": "Health Data Breaches: The Legal Issues", "pubdate": "20171123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stepping-up-fight-against-omnichannel-financial-fraud-directLink-4-i-3781.mp3", "title": "Stepping up Fight Against Omnichannel Financial Fraud", "pubdate": "20171122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/email-infiltration-dmarc-directLink-2-i-3776.mp3", "title": "Email Infiltration and DMARC", "pubdate": "20171122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/email-security-new-dhs-directive-directLink-8-i-3775.mp3", "title": "Email Security and the New DHS Directive", "pubdate": "20171122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-ismg-healthcare-security-summit-directLink-2-i-3779.mp3", "title": "Assessing the ISMG Healthcare Security Summit", "pubdate": "20171121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-unveils-new-rules-on-divulging-cybersecurity-flaws-directLink-4-i-3774.mp3", "title": "White House Unveils New Rules on Divulging IT Security Flaws", "pubdate": "20171117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-sizes-up-healthcare-security-threats-for-2018-directLink-7-i-3769.mp3", "title": "A CISO Sizes Up Healthcare Security Threats for 2018", "pubdate": "20171115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-council-developing-software-standards-directLink-4-i-3771.mp3", "title": "PCI Council Developing Software Framework", "pubdate": "20171114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-leader-tells-how-info-sharing-helped-curtail-wannacry-harm-in-us-directLink-10-i-3772.mp3", "title": "How Information Sharing Helped Curtail WannaCry Harm", "pubdate": "20171114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-hampered-by-misunderstandings-myths-directLink-3-i-3768.mp3", "title": "FDA Official Dispels Medical Device Security Myths", "pubdate": "20171113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-owns-your-pii-you-or-credit-reporting-agencies-directLink-5-i-3767.mp3", "title": "Who Owns Your PII, You or Credit Reporting Agencies?", "pubdate": "20171110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/skills-shortage-assessing-true-impact-directLink-9-i-3765.mp3", "title": "Skills Shortage: Assessing the True Impact", "pubdate": "20171109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-will-usher-in-big-changes-to-healthcare-security-directLink-6-i-3761.mp3", "title": "Will GDPR Usher in Big Changes for Healthcare Security?", "pubdate": "20171108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bargain-basement-prices-compromised-credentials-for-3-pop-directLink-6-i-3760.mp3", "title": "Bargain Prices: Compromised Credentials for $3 a Pop", "pubdate": "20171107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/six-months-to-go-getting-ready-for-gdpr-directLink-2-i-3758.mp3", "title": "Six Months to Go: Getting Ready for GDPR", "pubdate": "20171103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jennings-aske-on-getting-serious-medical-device-security-directLink-6-i-3756.mp3", "title": "Jennings Aske on Getting Serious About Medical Device Security", "pubdate": "20171101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wannacry-fresh-perspective-on-ransomware-attack-directLink-10-i-3753.mp3", "title": "WannaCry: A Fresh Perspective on the Ransomware Attack", "pubdate": "20171031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proactive-defense-against-phishing-directLink-5-i-3740.mp3", "title": "Proactive Defense Against Phishing", "pubdate": "20171031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-medical-device-vulnerability-compromise-privacy-directLink-2-i-3750.mp3", "title": "How a Medical Device Vulnerability Can Compromise Privacy", "pubdate": "20171028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-john-shier-sophos-directLink-4-i-3748.mp3", "title": "Understanding the Malware-as-a-Service Commodity Market", "pubdate": "20171027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equifax-data-breach-uk-perspective-directLink-8-i-3749.mp3", "title": "The Equifax Data Breach: A UK Perspective", "pubdate": "20171027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-what-really-works-directLink-10-i-3747.mp3", "title": "Medical Device Security: What Really Works?", "pubdate": "20171025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-transformation-security-disaster-directLink-7-i-3746.mp3", "title": "Is Digital Transformation a Security \"Disaster\"?", "pubdate": "20171025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warning-increased-attacks-on-energy-sector-directLink-3-i-3745.mp3", "title": "Warning of Increased Attacks on the Energy Sector", "pubdate": "20171024" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dmarc-close-look-at-email-validation-system-directLink-6-i-3744.mp3", "title": "DMARC: A Close Look at the Email Validation System", "pubdate": "20171020" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-insider-threat-long-term-battle-directLink-6-i-3743.mp3", "title": "Fighting the Insider Threat: A Long-Term Battle", "pubdate": "20171019" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/profiling-dhs-secretary-designate-kirstjen-nielsen-directLink-6-i-3742.mp3", "title": "Profiling DHS Secretary-Designate Kirstjen Nielsen", "pubdate": "20171017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-abu-dhabi-preview-directLink-1-i-3739.mp3", "title": "RSA Conference Abu Dhabi: A Preview", "pubdate": "20171017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/as-telehealth-grows-so-do-privacy-security-concerns-directLink-8-i-3738.mp3", "title": "As Telehealth Grows, So Do Privacy, Security Concerns", "pubdate": "20171014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conversation-cyber-gang-dark-overlord-directLink-1-i-3737.mp3", "title": "A Conversation With the Cyber Gang \"The Dark Overlord\"", "pubdate": "20171013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-how-to-secure-your-greatest-asset-directLink-1-i-3714.mp3", "title": "Data: How to Secure Your Greatest Asset", "pubdate": "20171012" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/redefining-role-hhs-ciso-directLink-2-i-3735.mp3", "title": "Redefining the Role of HHS CISO", "pubdate": "20171011" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-comply-new-yorks-cybersecurity-regulation-directLink-2-i-3733.mp3", "title": "How to Comply With New York\"s Cybersecurity Regulation", "pubdate": "20171010" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-security-numbers-days-numbered-as-identifier-directLink-9-i-3730.mp3", "title": "Social Security: Days Numbered as an Identifier?", "pubdate": "20171010" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-regulatory-impact-on-vendor-risk-directLink-1-i-3729.mp3", "title": "GDPR and the Regulatory Impact on Vendor Risk", "pubdate": "20171009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-user-behavior-could-replace-passwords-as-authenticator-directLink-6-i-3728.mp3", "title": "User Behavior Could Replace Passwords as Authenticator", "pubdate": "20171006" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/curing-detection-deficit-disorder-directLink-1-i-3724.mp3", "title": "Curing \"Detection Deficit Disorder\"", "pubdate": "20171004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-getting-ready-for-gdpr-directLink-5-i-3723.mp3", "title": "Special Report: Getting Ready for GDPR", "pubdate": "20171003" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-insights-from-us-army-medicine-ciso-directLink-9-i-3721.mp3", "title": "Incident Response Insights from US Army Medicine CISO", "pubdate": "20171002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-unveils-plan-to-get-c-suite-involvement-in-risk-management-directLink-7-i-3719.mp3", "title": "NIST Unveils Plan to Get C-Suite Involved in Risk Management", "pubdate": "20170929" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-get-most-cybersecurity-value-from-ai-directLink-8-i-3715.mp3", "title": "Get the Most Cybersecurity Value from AI", "pubdate": "20170929" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/find-secure-your-most-sensitive-data-directLink-9-i-3696.mp3", "title": "Find and Secure Your Most Sensitive Data", "pubdate": "20170928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ehr-certification-changes-risks-for-healthcare-providers-directLink-7-i-3717.mp3", "title": "EHR Certification Changes: Risks for Healthcare Providers", "pubdate": "20170928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-in-age-open-banking-directLink-4-i-3716.mp3", "title": "Security in the Age of Open Banking", "pubdate": "20170928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aetnas-new-approach-to-authentication-directLink-9-i-3713.mp3", "title": "Aetna\"s New Approach to Authentication", "pubdate": "20170927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/do-cisos-need-to-dumb-down-cybersecurity-for-boards-directLink-10-i-3711.mp3", "title": "Do CISOs Need to \"Dumb Down\" Cybersecurity for Boards?", "pubdate": "20170926" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preventing-attacks-from-spreading-directLink-1-i-3706.mp3", "title": "Preventing Attacks from Spreading", "pubdate": "20170925" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-changes-to-ehr-certification-practices-directLink-3-i-3709.mp3", "title": "Analyzing Changes to EHR Certification Practices", "pubdate": "20170923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/profiting-from-sec-breach-directLink-3-i-3708.mp3", "title": "Profiting From the SEC Breach", "pubdate": "20170922" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-time-incident-response-directLink-4-i-3710.mp3", "title": "Real-Time Incident Response", "pubdate": "20170922" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-api-caching-directLink-6-i-3707.mp3", "title": "The Case for API Caching", "pubdate": "20170921" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/episode-142-directLink-5-i-3705.mp3", "title": "Do CISOs Need IT or InfoSec Academic Credentials?", "pubdate": "20170919" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gauging-equifaxs-existential-future-in-wake-breach-directLink-4-i-3702.mp3", "title": "Gauging Equifax\"s Future in Wake of Massive Breach", "pubdate": "20170915" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-cybersecurity-simplify-compliance-avoid-breaches-directLink-2-i-3694.mp3", "title": "Healthcare Cybersecurity: Simplify Compliance & Avoid Breaches", "pubdate": "20170914" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/former-anthem-cybersecurity-exec-on-protecting-credentials-directLink-1-i-3698.mp3", "title": "Former Anthem Cybersecurity Exec on Protecting Credentials", "pubdate": "20170914" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-deep-dive-into-equifax-breach-directLink-7-i-3699.mp3", "title": "Taking a Deep Dive Into the Equifax Breach", "pubdate": "20170912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-time-transactions-real-time-security-directLink-3-i-3684.mp3", "title": "Real-Time Transactions, Real-Time Security", "pubdate": "20170912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-equifax-breach-so-significant-directLink-9-i-3697.mp3", "title": "Analysis: Why Equifax Breach Is So Significant", "pubdate": "20170909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-us-global-cybersecurity-leadership-in-jeopardy-directLink-10-i-3695.mp3", "title": "Is US Global Cybersecurity Leadership in Jeopardy?", "pubdate": "20170908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-protection-facts-about-secure-backup-directLink-6-i-3692.mp3", "title": "Ransomware Protection: Facts About Secure Backup", "pubdate": "20170908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-leader-on-filling-jobs-now-directLink-1-i-3693.mp3", "title": "A Cybersecurity Leader on Filling Jobs Now", "pubdate": "20170906" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-thought-leaders-speak-out-on-pressing-cybersecurity-issues-directLink-2-i-3690.mp3", "title": "Thought Leaders Speak Out on Pressing Cybersecurity Issues", "pubdate": "20170905" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-tools-set-to-secure-cashless-economy-directLink-4-i-3689.mp3", "title": "Authentication Tools to Secure a Cashless Economy", "pubdate": "20170901" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-bad-guys-to-fund-us-cyber-commands-growth-directLink-9-i-3687.mp3", "title": "Getting the Bad Guys to Fund US Cyber Command\"s Growth", "pubdate": "20170829" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/maximizing-malware-analysis-directLink-4-i-3683.mp3", "title": "Maximizing Malware Analysis", "pubdate": "20170828" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-7-months-in-office-hows-trump-doing-on-cybersecurity-directLink-10-i-3681.mp3", "title": "After 7 Months in Office, How\"s Trump Doing on Cybersecurity?", "pubdate": "20170825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-merits-medical-device-security-legislation-directLink-10-i-3680.mp3", "title": "Analysis: The Merits of Medical Device Security Legislation", "pubdate": "20170824" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/changes-coming-to-nists-catalogue-security-privacy-controls-directLink-4-i-3679.mp3", "title": "Changes Coming to NIST\"s Catalog of Security Controls", "pubdate": "20170822" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-exploit-kit-closer-look-directLink-9-i-3678.mp3", "title": "New Exploit Kit: A Closer Look", "pubdate": "20170818" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-legal-concerns-directLink-3-i-3668.mp3", "title": "Medical Device Cybersecurity: Legal Concerns", "pubdate": "20170818" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/regulations-threats-adapting-to-landscape-directLink-9-i-3670.mp3", "title": "Regulations and Threats: Adapting to the Landscape", "pubdate": "20170817" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-questions-successful-security-leaders-should-ask-directLink-9-i-3676.mp3", "title": "3 Questions Successful Security Leaders Should Ask", "pubdate": "20170817" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-cybersecurity-iot-medical-devices-directLink-9-i-3665.mp3", "title": "Improving the Cybersecurity of IoT, Medical Devices", "pubdate": "20170815" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-another-medical-device-security-issue-directLink-2-i-3672.mp3", "title": "Analysis: Another Medical Device Security Issue", "pubdate": "20170815" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anthem-breach-lesson-granular-access-control-matters-directLink-7-i-3666.mp3", "title": "Anthem Breach Lesson: Why Granular Access Control Matters", "pubdate": "20170814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-vendor-risk-management-directLink-4-i-3671.mp3", "title": "GDPR and Vendor Risk Management", "pubdate": "20170814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-cyber-battle-plan-to-thwart-those-seeking-to-sway-us-elections-directLink-3-i-3669.mp3", "title": "Creating Cyber Plan to Thwart Those Seeking to Sway Elections", "pubdate": "20170811" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/backstory-on-arrest-wannacry-accidental-hero-directLink-1-i-3664.mp3", "title": "Backstory on Arrest of Marcus Hutchins", "pubdate": "20170808" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurance-overcoming-resistance-directLink-9-i-3663.mp3", "title": "Cyber Insurance: Overcoming Resistance", "pubdate": "20170805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/effort-to-engage-hospitals-in-global-hunt-for-medical-device-security-flaws-directLink-3-i-3661.mp3", "title": "Engaging Hospitals In Global Hunt for Medical Device Security Flaws", "pubdate": "20170804" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-russian-hackers-in-us-courtrooms-directLink-9-i-3660.mp3", "title": "Battling Russian Hackers in US Courtrooms", "pubdate": "20170804" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-attribution-matters-directLink-3-i-3659.mp3", "title": "Gartner\"s Litan on Why Attribution Matters", "pubdate": "20170804" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analytics-aml-paradigm-shift-directLink-3-i-3651.mp3", "title": "Analytics and the AML Paradigm Shift", "pubdate": "20170802" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/human-face-malware-directLink-4-i-3656.mp3", "title": "The Human Face of Malware", "pubdate": "20170801" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-group-targeting-ukraines-power-grid-cool-directLink-4-i-3654.mp3", "title": "Power Grid Malware: Don\"t Freak Out, But Do Prepare", "pubdate": "20170728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exploring-lagging-small-business-cyber-insurance-marketplace-directLink-6-i-3655.mp3", "title": "Understanding Small-Business Cyber-Insurance Marketplace", "pubdate": "20170728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/6-steps-to-secure-remote-access-directLink-2-i-3648.mp3", "title": "6 Steps to Secure Remote Access", "pubdate": "20170726" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/would-talking-to-russians-on-cyber-reward-bad-behavior-directLink-10-i-3653.mp3", "title": "Would Talking to Russians About Cyber Reward Bad Behavior?", "pubdate": "20170726" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-would-us-russian-cyber-talks-be-appropriate-directLink-2-i-3652.mp3", "title": "When Would US-Russian Cyber Talks Be Appropriate?", "pubdate": "20170725" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-ransomware-as-a-service-directLink-1-i-3649.mp3", "title": "The Rise of Ransomware-as-a-Service", "pubdate": "20170724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-impact-alphabay-takedown-directLink-2-i-3650.mp3", "title": "Special Report: Impact of the AlphaBay Takedown", "pubdate": "20170721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shedding-light-on-darknet-marketplace-directLink-2-i-3646.mp3", "title": "Shedding Light on the Darknet Marketplace", "pubdate": "20170718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-onc-on-secure-data-exchange-directLink-2-i-3645.mp3", "title": "Interview: ONC on Next Steps for Secure Data Exchange", "pubdate": "20170718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-education-next-fbi-director-directLink-3-i-3644.mp3", "title": "The Cybersecurity Education of the Next FBI Director", "pubdate": "20170714" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-backed-away-from-joint-us-russia-cybersecurity-collaboration-directLink-4-i-3640.mp3", "title": "Why Trump Backed Away from a US-Russian Cyber Framework", "pubdate": "20170711" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-notpetya-malware-spread-directLink-5-i-3639.mp3", "title": "How the NotPetya Malware Spread", "pubdate": "20170707" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-anthem-breach-class-action-settlement-directLink-9-i-3636.mp3", "title": "Analyzing the Anthem Breach Class Action Settlement", "pubdate": "20170706" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/notpetya-wannacry-implications-justin-peters-sophos-directLink-10-i-3635.mp3", "title": "The Ransomware Threat After WannaCry and NotPetya", "pubdate": "20170705" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/artificial-intelligence-menace-or-protector-directLink-3-i-3634.mp3", "title": "Artificial Intelligence: IT Menace or Protector?", "pubdate": "20170630" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-long-way-to-go-directLink-10-i-3633.mp3", "title": "Medical Device Cybersecurity: A Long Way to Go", "pubdate": "20170630" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-reconsidered-directLink-10-i-3620.mp3", "title": "Incident Response Reconsidered", "pubdate": "20170629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-shift-to-human-centered-security-directLink-7-i-3632.mp3", "title": "Making the Shift to Human-Centered Security", "pubdate": "20170628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spying-on-citizens-malware-aimed-to-battle-criminals-directLink-4-i-3631.mp3", "title": "Spying on Citizens with Malware Aimed to Battle Criminals", "pubdate": "20170627" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-speed-attack-directLink-4-i-3630.mp3", "title": "The True Cost of Phishing Attacks", "pubdate": "20170626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-paypal-head-engineering-guru-bhat-directLink-6-i-3627.mp3", "title": "How PayPal Protects Billions of Transactions", "pubdate": "20170623" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/return-luddite-securing-critical-systems-directLink-7-i-3628.mp3", "title": "The Return of the Luddite: Securing Critical Systems", "pubdate": "20170623" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/drew-hamilton-directLink-4-i-3616.mp3", "title": "Making Forensic Investigations More Fruitful", "pubdate": "20170621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eulogizing-neutrino-exploit-kit-directLink-7-i-3625.mp3", "title": "\"Eulogizing\" Neutrino Exploit Kit", "pubdate": "20170620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kate-borten-directLink-8-i-3615.mp3", "title": "Defending Against Health Data Breaches: What\"s Missing?", "pubdate": "20170619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-strategic-cybersecurity-investments-study-directLink-9-i-3602.mp3", "title": "Analysis: Strategic Cybersecurity Investments Study", "pubdate": "20170619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hardening-workforce-developing-cyber-defenses-directLink-6-i-3623.mp3", "title": "Hardening the Workforce: Developing Cyber Defenses", "pubdate": "20170618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-wannacry-survives-directLink-5-i-3617.mp3", "title": "How WannaCry Survives", "pubdate": "20170616" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-neil-wu-becker-directLink-1-i-3612.mp3", "title": "App Security: Breaking Bad Habits", "pubdate": "20170614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/myth-secure-mainframe-directLink-4-i-3611.mp3", "title": "The Myth of the Secure Mainframe", "pubdate": "20170613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-pick-right-security-technology-directLink-7-i-3608.mp3", "title": "The Confusing Marketplace of IT Security Wares", "pubdate": "20170609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/amy-mchugh-cat-directLink-1-i-3606.mp3", "title": "Analysis: FFIEC\"s Update to Cyber Assessment Tool", "pubdate": "20170607" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/balancing-act-constant-battle-between-functionality-security-directLink-3-i-3604.mp3", "title": "Balancing Act: Constant Battle Between Functionality, Security", "pubdate": "20170606" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-evolving-russian-cyber-threats-directLink-4-i-3603.mp3", "title": "Analysis: Evolving Russian Cyber Threats", "pubdate": "20170602" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-cyber-isr-directLink-7-i-3595.mp3", "title": "The Need for Cyber ISR", "pubdate": "20170601" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/billy-rios-directLink-1-i-3601.mp3", "title": "Medical Devices: Care Benefits vs. Cybersecurity Risks", "pubdate": "20170601" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/21st-century-cures-act-will-revamp-health-data-exchange-directLink-4-i-3599.mp3", "title": "21st Century Cures Act: Will It Revamp Health Data Exchange?", "pubdate": "20170531" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-during-era-donald-trump-report-directLink-8-i-3598.mp3", "title": "Cybersecurity During the Era of Donald Trump", "pubdate": "20170530" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/homeland-security-secretary-john-kelly-on-battling-wannacry-directLink-2-i-3596.mp3", "title": "Homeland Security Secretary John Kelly on Battling WannaCry", "pubdate": "20170526" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-medical-devices-from-ransomware-critical-step-directLink-6-i-3594.mp3", "title": "Protecting Medical Devices from Ransomware: A Critical Step", "pubdate": "20170526" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-prepare-for-next-wannacry-directLink-4-i-3593.mp3", "title": "How to Prepare for the Next WannaCry", "pubdate": "20170524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stress-busting-through-vulnerability-risk-management-directLink-4-i-3584.mp3", "title": "Stress-Busting Through Vulnerability Risk Management", "pubdate": "20170524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-will-cappelli-gartner-on-machine-learning-directLink-9-i-3591.mp3", "title": "Why Big Data, Machine Learning Are Critical to Security", "pubdate": "20170524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hsbc-experiences-voice-biometrics-telephone-banking-fail-directLink-3-i-3592.mp3", "title": "HSBC Experiences Voice Biometrics Telephone Banking Fail", "pubdate": "20170523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-congress-picks-up-pace-on-cybersecurity-legislating-directLink-7-i-3588.mp3", "title": "US Congress Picks Up Pace on Cybersecurity Legislating", "pubdate": "20170519" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-patch-management-ransomware-mitigation-strategies-directLink-7-i-3590.mp3", "title": "Beyond Patch Management: Ransomware Mitigation Strategies", "pubdate": "20170519" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assistant-to-president-makes-bold-cybersecurity-declaration-directLink-3-i-3583.mp3", "title": "Assistant to the President Makes Bold Cybersecurity Declaration", "pubdate": "20170516" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reputational-risk-management-matters-directLink-8-i-3581.mp3", "title": "Why Reputational Risk Management Matters", "pubdate": "20170515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-wannacry-ransomware-outbreak-directLink-8-i-3580.mp3", "title": "Responding to WannaCry Ransomware Outbreak", "pubdate": "20170513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-ramping-up-digital-health-cybersecurity-efforts-directLink-8-i-3579.mp3", "title": "FDA Ramping Up Digital Health Cybersecurity Efforts", "pubdate": "20170513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reevaluating-infosec-awareness-place-in-security-arsenal-directLink-8-i-3578.mp3", "title": "Re-evaluating InfoSec Awareness\" Place in Security Arsenal", "pubdate": "20170512" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/maturation-cybercrime-directLink-8-i-3576.mp3", "title": "The Maturation of Cybercrime", "pubdate": "20170509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2-days-to-2-hours-automating-application-vulnerability-management-directLink-8-i-3559.mp3", "title": "2 Days to 2 Hours: Automating Application Vulnerability Management", "pubdate": "20170509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbis-james-comey-on-insider-threat-other-cyber-challenges-directLink-10-i-3574.mp3", "title": "FBI\"s James Comey on Insider Threat, Other Cyber Challenges", "pubdate": "20170505" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-in-middle-managing-risk-across-enterprise-directLink-4-i-3558.mp3", "title": "CISO in the Middle: Managing Risk Up and Down the Enterprise", "pubdate": "20170503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hackers-target-small-firms-as-big-biz-toughens-cyberdefenses-directLink-10-i-3572.mp3", "title": "Hackers Target Small Firms as Big Biz Toughens Cyber Defenses", "pubdate": "20170502" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/saber-rattling-cybersecurity-connection-directLink-6-i-3565.mp3", "title": "Saber-Rattling and Cybersecurity: The Connection", "pubdate": "20170501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dbir-2017-interview-directLink-6-i-3569.mp3", "title": "Verizon\"s New Data Breach Report: An Analysis", "pubdate": "20170428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rethinking-cybersecurity-lessons-from-russian-hacks-directLink-3-i-3570.mp3", "title": "Rethinking Cybersecurity: Lessons from Russian Hacks", "pubdate": "20170428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-defense-dos-donts-directLink-6-i-3571.mp3", "title": "Ransomware Defense: The Do\"s and Don\"ts", "pubdate": "20170428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pending-trump-cybersecurity-executive-order-outlined-directLink-7-i-3566.mp3", "title": "Pending Trump Cybersecurity Executive Order Outlined", "pubdate": "20170425" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-kit-offered-at-bargain-basement-prices-directLink-8-i-3564.mp3", "title": "Ransomware Kit Offered at Bargain-Basement Prices", "pubdate": "20170421" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-threat-hunting-incident-response-directLink-7-i-3562.mp3", "title": "Improving Threat-Hunting and Incident Response", "pubdate": "20170419" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-gen-biometric-authentication-directLink-6-i-3533.mp3", "title": "Next-Gen Biometric Authentication", "pubdate": "20170419" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-challenge-privileged-access-management-directLink-1-i-3560.mp3", "title": "Battling the Challenge of Privileged Access Management", "pubdate": "20170418" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-depends-too-much-on-internet-directLink-10-i-3555.mp3", "title": "Is the Internet Forever?", "pubdate": "20170414" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gotcha-nabbing-criminal-skimmer-directLink-10-i-3556.mp3", "title": "Gotcha! The Nabbing of a Criminal Skimmer", "pubdate": "20170414" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vendors-collaborate-to-share-latest-cyberthreat-intelligence-directLink-10-i-3553.mp3", "title": "Vendors Collaborate to Share Latest Cyberthreat Intelligence", "pubdate": "20170411" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-drives-eastern-european-cybercriminals-directLink-1-i-3541.mp3", "title": "What Drives Eastern European Cybercriminals?", "pubdate": "20170410" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-ideas-to-attract-retain-cyber-talent-directLink-3-i-3552.mp3", "title": "New Ideas to Attract, Retain Cyber Talent", "pubdate": "20170407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-lesson-from-physical-world-directLink-10-i-3551.mp3", "title": "Insider Threat: Lesson from the Physical World", "pubdate": "20170404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-progress-gaps-directLink-2-i-3550.mp3", "title": "Medical Device Cybersecurity: Progress and Gaps", "pubdate": "20170404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-shifting-security-landscape-directLink-10-i-3549.mp3", "title": "Banking and the Shifting Security Landscape", "pubdate": "20170403" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/highlights-from-senate-hearing-on-russian-election-interference-directLink-7-i-3548.mp3", "title": "Highlights from the Hearing on Russian Election Interference", "pubdate": "20170331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-in-store-for-hipaa-under-new-ocr-leadership-directLink-10-i-3546.mp3", "title": "What\"s in Store for HIPAA Under New OCR Leadership?", "pubdate": "20170331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-secure-technology-alliance-directLink-3-i-3535.mp3", "title": "Rise of the Secure Technology Alliance", "pubdate": "20170330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/britains-home-secretary-enters-encryption-debate-directLink-5-i-3544.mp3", "title": "Britain\"s Home Secretary Enters the Encryption Debate", "pubdate": "20170328" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchain-seen-as-secure-cyberthreat-information-sharing-tool-directLink-6-i-3543.mp3", "title": "Blockchain Seen as a Secure Cyberthreat Info Sharing Tool", "pubdate": "20170324" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-richard-bussiere-tenable-network-security-directLink-9-i-3542.mp3", "title": "Why Continuous Vulnerability Assessment Is Essential", "pubdate": "20170324" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-kartik-shahani-rsa-directLink-2-i-3536.mp3", "title": "Moving From IT-Driven to Business-Driven Security", "pubdate": "20170321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/comey-confirms-probe-possible-trump-campaign-russia-links-directLink-3-i-3539.mp3", "title": "Comey Confirms Probe of Possible Trump-Russia Links", "pubdate": "20170321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-thinking-iam-cybersecurity-directLink-8-i-3540.mp3", "title": "Re-Thinking IAM and Cybersecurity", "pubdate": "20170321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/study-some-mobile-devices-be-hacked-using-sound-waves-directLink-6-i-3538.mp3", "title": "Study: Some Mobile Devices Can Be Hacked Using Sound Waves", "pubdate": "20170321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-budget-15-billion-for-dhs-cybersecurity-directLink-8-i-3537.mp3", "title": "Trump Budget: $1.5 Billion for DHS Cybersecurity", "pubdate": "20170317" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-defenders-advantage-directLink-7-i-3529.mp3", "title": "Ransomware: The Defender\"s Advantage", "pubdate": "20170317" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rating-security-performance-fortune-1000-directLink-1-i-3534.mp3", "title": "Rating the Security Performance of the Fortune 1000", "pubdate": "20170314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-white-house-cybersec-adviser-words-nsas-rob-joyce-directLink-3-i-3532.mp3", "title": "Will NSA\"s Rob Joyce Be Trump\"s Top Cybersecurity Adviser?", "pubdate": "20170314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-we-learn-from-hipaa-settlements-directLink-9-i-3527.mp3", "title": "What Can We Learn from HIPAA Settlements?", "pubdate": "20170314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mirai-tools-up-for-advanced-ddos-attacks-directLink-6-i-3526.mp3", "title": "Mirai Tools Up for Advanced DDoS Attacks", "pubdate": "20170314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deep-dive-into-wikileaks-release-cia-hacking-files-directLink-4-i-3524.mp3", "title": "What\"s Behind WikiLeaks\" Release of CIA Hacking Files", "pubdate": "20170310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/showdown-prepping-enterprise-security-for-ddos-botnets-directLink-10-i-3521.mp3", "title": "Showdown: Prepping Enterprise Security for DDoS Botnets", "pubdate": "20170307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/now-you-see-it-now-you-dont-return-cryptolocker-ransomware-directLink-8-i-3520.mp3", "title": "Now You See It, Now You Don\"t: The Return of Crypt0L0cker", "pubdate": "20170307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solutions-integration-will-set-vendors-apart-directLink-7-i-3519.mp3", "title": "Achieving \"Digital Resilience\"", "pubdate": "20170304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/most-breaches-trace-to-phishing-social-engineering-attacks-directLink-7-i-3516.mp3", "title": "Verizon: Most Breaches Trace to Phishing, Social Engineering", "pubdate": "20170304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/baseline-user-behavior-to-focus-intrusion-detection-directLink-9-i-3517.mp3", "title": "Study User Behavior to Focus Intrusion Detection", "pubdate": "20170304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-europes-gdpr-impact-us-businesses-directLink-5-i-3518.mp3", "title": "How Will Europe\"s GDPR Affect Businesses Worldwide?", "pubdate": "20170303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/howard-schmidt-dies-creating-cybersecurity-framework-metrics-directLink-10-i-3514.mp3", "title": "Howard Schmidt Dies; Creating CyberSec Framework Metrics", "pubdate": "20170303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/use-cloud-to-make-enterprises-less-complex-directLink-1-i-3513.mp3", "title": "Using the Cloud to Make Enterprises Less Complex", "pubdate": "20170303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-dispelling-medical-device-cybersecurity-myths-directLink-3-i-3512.mp3", "title": "FDA: Dispelling Medical Device Cybersecurity Myths", "pubdate": "20170302" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-fraudsters-taste-their-own-medicine-directLink-10-i-3511.mp3", "title": "Giving Fraudsters a Taste of Their Own Medicine", "pubdate": "20170228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-hack-proof-system-directLink-4-i-3504.mp3", "title": "Creating a Hack-Proof Computer", "pubdate": "20170227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leakedsources-demise-troy-hunt-talks-lessons-learned-directLink-4-i-3509.mp3", "title": "LeakedSource\"s Demise: Lessons Learned", "pubdate": "20170225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-mobile-banking-attacks-directLink-9-i-3508.mp3", "title": "Battling Mobile Banking Attacks", "pubdate": "20170225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-away-from-check-box-compliance-directLink-1-i-3507.mp3", "title": "Moving Away from Checkbox Compliance", "pubdate": "20170224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dark-web-5-things-to-know-directLink-2-i-3495.mp3", "title": "Dark Web: 5 Things to Know", "pubdate": "20170224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/comodo-phillip-hallam-baker-directLink-1-i-3493.mp3", "title": "Securing Data Beyond \"The Walled Garden\"", "pubdate": "20170224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/retrospection-backtracks-detection-unknown-intrusions-directLink-10-i-3506.mp3", "title": "\"Retrospection\" Backtracks Detection of Intrusions", "pubdate": "20170224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/posnack-at-himss-directLink-7-i-3505.mp3", "title": "Investigating Blockchain\"s Role in Health Info Exchange", "pubdate": "20170224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-vendor-risk-management-directLink-8-i-3487.mp3", "title": "ROI of Vendor Risk Management", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ari-schwartz-directLink-7-i-3498.mp3", "title": "What\"s Ahead for Trump on Cybersecurity Initiatives?", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/al-pascual-directLink-5-i-3476.mp3", "title": "Javelin: Card-Not-Present Fraud Jumped 40% in 2016", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeting-faster-breach-detection-via-analytics-directLink-4-i-3501.mp3", "title": "Faster Breach Detection via Analytics", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/abosulte-richard-henderson-directLink-1-i-3484.mp3", "title": "The Growth of IoT Litigation, Regulation", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sean-feeney-defense-storm-directLink-7-i-3485.mp3", "title": "Smaller Financial Institutions Struggle with Cyber Resilience", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lastline-directLink-7-i-3478.mp3", "title": "The Case for Solutions Integration", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adam-greene-at-himss-directLink-10-i-3499.mp3", "title": "Will a Pending OCR Rule Impact Breach Class-Action Suits?", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/streaming-malware-detection-shuts-polymorphic-strains-in-tracks-directLink-7-i-3502.mp3", "title": "Stopping Phishing Attacks More Quickly", "pubdate": "20170223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/carol-alexander-ca-technologies-directLink-5-i-3496.mp3", "title": "The Role of Omnichannel Risk Analysis", "pubdate": "20170222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/most-cybersecurity-startups-wont-survive-directLink-8-i-3494.mp3", "title": "Trend Micro: Why Most Cybersecurity Startups Won\"t Survive", "pubdate": "20170222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-business-case-for-user-behavior-monitoring-directLink-6-i-3492.mp3", "title": "The Security Business Case for User Behavior Monitoring", "pubdate": "20170222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-software-defined-secure-networks-directLink-7-i-3491.mp3", "title": "The Rise of Software-Defined Secure Networks", "pubdate": "20170222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lucia-savage-directLink-6-i-3481.mp3", "title": "Former ONC Privacy Chief on Healthcare\"s Cyber Challenges", "pubdate": "20170221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-integrity-in-era-fake-news-directLink-2-i-3489.mp3", "title": "Data Integrity in the Era of Fake News", "pubdate": "20170221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deven-mcgraw-directLink-6-i-3486.mp3", "title": "HIPAA Compliance Audits: The Very Latest Details", "pubdate": "20170221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dell-secureworks-directLink-9-i-3477.mp3", "title": "Trapping Hackers Via BEC Attacks, Email Spoofing", "pubdate": "20170221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nordenberg-at-himss-directLink-9-i-3483.mp3", "title": "A New Way to Report Medical Device Vulnerabilities", "pubdate": "20170221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2017-voices-security-thought-leaders-directLink-4-i-3479.mp3", "title": "RSA 2017: Voices of InfoSec Thought Leaders", "pubdate": "20170217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-rep-michael-mccaul-on-homeland-cybersecurity-directLink-2-i-3474.mp3", "title": "US Rep. Michael McCaul on Homeland Cybersecurity", "pubdate": "20170215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/epidemiology-immunology-genetics-processes-echo-in-security-directLink-6-i-3473.mp3", "title": "Epidemiology, Immunology, Genetics Echo in InfoSecurity", "pubdate": "20170214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-coding-rise-secdevops-directLink-5-i-3470.mp3", "title": "Secure Coding: The Rise of SecDevOps", "pubdate": "20170211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evaluating-impact-lawful-hacking-metadata-directLink-5-i-3472.mp3", "title": "Evaluating Impact of Lawful Hacking, Metadata", "pubdate": "20170210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-security-professionals-learn-from-epidemiologists-directLink-5-i-3471.mp3", "title": "What Security Professionals Can Learn From Epidemiologists", "pubdate": "20170210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/why-cant-we-solve-phishing-directLink-1-i-3468.mp3", "title": "\\\"Why Can\"t We Solve Phishing?\\\"", "pubdate": "20170208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-trump-administration-assure-healthcare-security-directLink-6-i-3467.mp3", "title": "How Will Trump Administration Ensure Healthcare InfoSec?", "pubdate": "20170207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expert-analysis-improving-medical-device-cybersecurity-directLink-10-i-3466.mp3", "title": "Expert Analysis: Improving Medical Device Cybersecurity", "pubdate": "20170207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-chelsea-manning-evolving-defense-against-malicious-insiders-directLink-7-i-3465.mp3", "title": "Post-Manning: Malicious Insider Defenses Evolve", "pubdate": "20170206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-dhs-against-insider-threat-directLink-1-i-3464.mp3", "title": "Defending DHS Against the Insider Threat", "pubdate": "20170203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-achieve-digital-trust-directLink-9-i-3455.mp3", "title": "What It Takes to Achieve Digital Trust", "pubdate": "20170203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shahram-ebadollahi-directLink-5-i-3463.mp3", "title": "Could Blockchain Support Secure Health Data Exchange?", "pubdate": "20170202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-didnt-hold-austrian-hotel-guests-hostage-directLink-8-i-3461.mp3", "title": "Ransomware Didn\"t Hold Austrian Hotel Guests Hostage", "pubdate": "20170131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/court-revived-breach-related-case-against-horizon-bcbs-directLink-4-i-3460.mp3", "title": "Why Court Revived Breach-Related Case Against Horizon BCBS", "pubdate": "20170128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-endpoint-detection-behavioral-analytics-directLink-9-i-3456.mp3", "title": "Gartner\"s Litan on Endpoint Detection, Behavioral Analytics", "pubdate": "20170127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-staffers-used-rnc-private-email-server-directLink-7-i-3457.mp3", "title": "White House Staffers Used an RNC Private Email Server", "pubdate": "20170127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-enforcement-under-trump-forecast-directLink-3-i-3458.mp3", "title": "HIPAA Enforcement Under Trump: A Forecast", "pubdate": "20170127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privileged-access-management-break-kill-chain-directLink-5-i-3454.mp3", "title": "Privileged Access Management: Break the Kill Chain", "pubdate": "20170125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-2017-preview-directLink-4-i-3453.mp3", "title": "RSA Conference 2017: A Preview", "pubdate": "20170125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-militarizing-civilian-cyber-defense-directLink-6-i-3452.mp3", "title": "Is Trump Militarizing Civilian Cyber Defense?", "pubdate": "20170124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hhs-deputy-ciso-spearheads-cybersecurity-effort-directLink-3-i-3451.mp3", "title": "HHS Deputy CISO Spearheads Cybersecurity Effort", "pubdate": "20170124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-president-obamas-cybersecurity-legacy-directLink-7-i-3450.mp3", "title": "Assessing Obama\"s Cybersecurity Legacy", "pubdate": "20170120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cynergistek-gets-new-owner-ceo-explains-deal-directLink-2-i-3448.mp3", "title": "CynergisTek Gets New Owner: CEO Explains Deal", "pubdate": "20170120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ftc-pushes-manufacturer-to-secure-iot-wares-directLink-2-i-3447.mp3", "title": "FTC Pushes Manufacturer to Secure IoT Wares", "pubdate": "20170117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-data-exchange-3-key-security-steps-directLink-4-i-3446.mp3", "title": "Health Data Exchange: 3 Key Security Steps", "pubdate": "20170117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/details-emerge-on-hack-ukraines-power-grid-directLink-5-i-3444.mp3", "title": "Details Emerge on Ukraine Power Grid Hack", "pubdate": "20170113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-chris-novak-ii-evolution-threat-landscape-in-last-decade-directLink-10-i-3441.mp3", "title": "Memory-Resident Malware Creating Forensics Challenges", "pubdate": "20170111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-deep-dive-into-intels-report-on-russian-dnc-hack-directLink-4-i-3442.mp3", "title": "Deep Dive: US Intelligence Report Into Russian Hacking", "pubdate": "20170110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-trump-vs-intelligence-community-directLink-8-i-3440.mp3", "title": "Special Report: Trump vs. US Intelligence Community", "pubdate": "20170106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ganesh-ramamoorthy-gartner-vp-on-iot-security-directLink-9-i-3439.mp3", "title": "IoT: The Need to Expand the Scope of Security", "pubdate": "20170105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-vulnerabilities-in-medical-devices-directLink-4-i-3427.mp3", "title": "Addressing Vulnerabilities in Medical Devices", "pubdate": "20170104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/talktalk-breach-investigation-lessons-learned-directLink-1-i-3426.mp3", "title": "TalkTalk Breach Investigation: Top Cybersecurity Takeaways", "pubdate": "20170103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shift-to-intelligent-hybrid-security-directLink-3-i-3438.mp3", "title": "The Shift to Intelligent Hybrid Security", "pubdate": "20170103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/doubts-raised-on-value-sanctions-against-russia-directLink-8-i-3437.mp3", "title": "Doubts Raised on Value of Sanctions Against Russia", "pubdate": "20170103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/transition-to-trump-administration-cyber-risks-directLink-3-i-3436.mp3", "title": "Transition to Trump Administration: The Cyber Risks", "pubdate": "20170102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-encryption-against-awesome-power-quantum-computing-directLink-9-i-3435.mp3", "title": "Defending Encryption from Quantum Computers", "pubdate": "20161230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-chris-novak-verizon-part-i-current-landscape-case-studies-directLink-10-i-3434.mp3", "title": "Operational Technology: The Next Security Challenge", "pubdate": "20161230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-ddos-attacks-mitigation-whats-in-store-directLink-7-i-3429.mp3", "title": "How to Battle IoT Devices Infected with DDoS Malware", "pubdate": "20161229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breaches-whats-in-store-for-year-ahead-directLink-8-i-3425.mp3", "title": "2017: \"Year of the Breach\" Redux?", "pubdate": "20161228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-threat-awareness-education-priority-for-2017-directLink-1-i-3424.mp3", "title": "Cyber Threat Awareness Education: A Priority for 2017", "pubdate": "20161228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-rob-van-der-ende-mandiant-apac-directLink-4-i-3433.mp3", "title": "The Changing Face of Cyber Espionage", "pubdate": "20161228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-difference-between-good-bad-directLink-9-i-3431.mp3", "title": "Threat Intelligence: The Difference Between Good and Bad", "pubdate": "20161227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-conversations-about-nation-state-cyber-adversaries-directLink-2-i-3432.mp3", "title": "Special Report: Conversations About Nation-State Adversaries", "pubdate": "20161227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2017-cybersecurity-predictions-aftermath-trump-election-directLink-10-i-3422.mp3", "title": "2017 Cybersecurity Predictions: The Impact of Trump Election", "pubdate": "20161226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/house-working-group-encryption-bypasses-bad-idea-directLink-6-i-3430.mp3", "title": "House Working Group: Encryption Bypasses a Bad Idea", "pubdate": "20161223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pierson-directLink-2-i-3428.mp3", "title": "How Would Restructuring of CFPB Affect Banks?", "pubdate": "20161223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-dr-hugh-thompson-directLink-2-i-3423.mp3", "title": "The Urgent Need to Recruit More Cybersecurity Pros", "pubdate": "20161222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/senators-call-for-select-committee-to-probe-hacks-said-to-sway-vote-directLink-10-i-3421.mp3", "title": "Senators Call for Select Panel to Probe Hacks Said to Sway Vote", "pubdate": "20161220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-key-elements-response-directLink-3-i-3419.mp3", "title": "Ransomware: Key Elements of Response", "pubdate": "20161219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/impact-21st-century-cures-act-on-privacy-security-directLink-9-i-3418.mp3", "title": "21st Century Cures Act: Analysis of Impact", "pubdate": "20161217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jeremy-king-directLink-7-i-3407.mp3", "title": "Contactless Payments: Addressing the Security Issues", "pubdate": "20161217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-hacktivists-launch-attacks-to-protest-trumps-presidency-directLink-4-i-3417.mp3", "title": "Will Hacktivists Launch Attacks to Protest Trump\"s Presidency?", "pubdate": "20161216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-attribution-hack-back-dont-waste-time-directLink-8-i-3414.mp3", "title": "Breach Attribution and \"Hack Back\": Don\"t Waste Time", "pubdate": "20161215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-healthcare-attract-cybersecurity-talent-directLink-9-i-3410.mp3", "title": "How Can Healthcare Attract Cybersecurity Talent?", "pubdate": "20161214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-year-new-threats-2017-security-predictions-from-malwarebytes-directLink-3-i-3415.mp3", "title": "New Year, New Threats: 2017 Security Predictions from Malwarebytes", "pubdate": "20161214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-scorecard-which-countrys-consumers-are-most-engaged-directLink-5-i-3412.mp3", "title": "Security Scorecard: Where Are Consumers Most Engaged?", "pubdate": "20161213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-law-modestly-extends-security-privacy-protections-directLink-2-i-3416.mp3", "title": "New Law\"s Impact on IT Security and Privacy Protections", "pubdate": "20161213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-new-technologies-help-hackers-wage-sophisticated-attacks-directLink-10-i-3413.mp3", "title": "How New Technologies Help Hackers Wage Sophisticated Attacks", "pubdate": "20161213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-offers-new-guidance-on-simplifying-network-segmentation-directLink-10-i-3411.mp3", "title": "New PCI Guidance on Simplifying Network Segmentation", "pubdate": "20161209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/searching-for-donald-trumps-cybersecurity-bona-fides-directLink-2-i-3409.mp3", "title": "Sizing Up Donald Trump\"s Cybersecurity Acumen", "pubdate": "20161209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malvertising-ransomware-evolution-cyber-threats-directLink-2-i-3398.mp3", "title": "Malvertising, Ransomware and the Evolution of Cyber Threats", "pubdate": "20161207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crime-as-service-top-cyber-threat-for-2017-directLink-4-i-3406.mp3", "title": "\"Crime as a Service\" a Top Cyber Threat for 2017", "pubdate": "20161207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-behavioral-biometrics-cognitive-fraud-detection-directLink-2-i-3405.mp3", "title": "Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection", "pubdate": "20161206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/commission-on-enhancing-national-cybersecurity-member-explains-reasoning-behind-recommendations-directLink-7-i-3404.mp3", "title": "Cybersecurity Panelist on Recommendations to Trump", "pubdate": "20161206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/would-you-re-hire-your-ips-today-directLink-3-i-3388.mp3", "title": "Would You Re-Hire Your IPS Today?", "pubdate": "20161206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/measure-security-its-impact-on-mission-directLink-3-i-3360.mp3", "title": "Measure Security and Its Impact on the Mission", "pubdate": "20161206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-congressional-barrier-on-cybersecurity-oversight-directLink-5-i-3403.mp3", "title": "Overcoming Congressional Barriers on Cybersecurity Oversight", "pubdate": "20161202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experian-cyberattacks-could-escalate-to-cyberwar-directLink-10-i-3401.mp3", "title": "Experian: Why Cyberattacks Could Escalate to \"Cyberwar\"", "pubdate": "20161202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-organized-cybercrime-new-approach-directLink-2-i-3400.mp3", "title": "Fighting Organized Cybercrime: A New Approach", "pubdate": "20161201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/san-francisco-battles-public-transport-ransomware-outbreak-directLink-1-i-3399.mp3", "title": "San Francisco Battles Public Transport Ransomware Outbreak", "pubdate": "20161130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-internet-things-addressing-gaps-directLink-7-i-3390.mp3", "title": "HIPAA and the Internet of Things: Addressing Gaps", "pubdate": "20161128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/soltra-edge-revived-new-owner-directLink-6-i-3397.mp3", "title": "Soltra Edge Revived with New Owner", "pubdate": "20161124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-nsfocus-protected-g20-summit-directLink-2-i-3396.mp3", "title": "How NSFOCUS Protected the G20 Summit", "pubdate": "20161123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2017-mobile-enterprise-security-challenges-directLink-10-i-3395.mp3", "title": "The 2017 Mobile Enterprise: Security Challenges", "pubdate": "20161123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-security-internet-things-be-regulated-directLink-2-i-3392.mp3", "title": "Security Analysis: Regulating IoT; Protecting Obamacare Data", "pubdate": "20161122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/merchants-object-to-visas-emv-debit-routing-rules-directLink-1-i-3393.mp3", "title": "Why Merchants Object to Visa\"s EMV Debit Routing Rules", "pubdate": "20161122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-way-to-build-secure-trustworthy-systems-directLink-7-i-3391.mp3", "title": "New Way to Build Secure Trustworthy Systems", "pubdate": "20161118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-when-will-trump-tackle-hipaa-reform-directLink-2-i-3389.mp3", "title": "How and When Will Trump Tackle Healthcare IT Reforms?", "pubdate": "20161115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/did-weak-security-sway-election-directLink-9-i-3387.mp3", "title": "Did Weak InfoSec Sway Election?", "pubdate": "20161111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leader-obamas-cybersecurity-review-chimes-in-on-assessment-trump-promises-to-make-directLink-1-i-3386.mp3", "title": "Obama\"s Cyber Review Leader on What\"s Ahead for Trump", "pubdate": "20161110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-tools-aim-to-close-cybersecurity-skills-gap-directLink-7-i-3385.mp3", "title": "New Tools Aim to Close the Cybersecurity Skills Gap", "pubdate": "20161109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kim-kardashian-security-awareness-wake-up-call-directLink-5-i-3383.mp3", "title": "The Kim Kardashian Security Wake-Up Call", "pubdate": "20161108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-fbi-quickly-reviewed-650k-emails-on-computer-clinton-aide-directLink-3-i-3384.mp3", "title": "How FBI Quickly Reviewed 650K Emails on Clinton Aide\"s PC", "pubdate": "20161108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenge-defending-domain-name-system-directLink-3-i-3381.mp3", "title": "The Challenge of Defending the Domain Name System", "pubdate": "20161108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-fbi-conducted-exam-computer-clintons-top-aide-directLink-8-i-3380.mp3", "title": "Clinton Email Investigation: A Forensics Perspective", "pubdate": "20161107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-cyberattacks-pose-threat-to-presidential-election-directLink-8-i-3379.mp3", "title": "Cyberattacks Pose Threat to Presidential Election", "pubdate": "20161104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-cerber-ransomware-as-a-service-operation-directLink-8-i-3376.mp3", "title": "Inside the Cerber Ransomware-as-a-Service Operation", "pubdate": "20161104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-lessons-for-modernization-echo-from-past-directLink-4-i-3375.mp3", "title": "Echo from the Past: Security Lessons for IT Modernization", "pubdate": "20161101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-taking-disaster-recovery-approach-directLink-5-i-3374.mp3", "title": "Breach Response: Taking a \"Disaster Recovery\" Approach", "pubdate": "20161101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-new-auto-cybersecurity-guidance-ibm-apologizes-for-ddos-attack-impact-directLink-8-i-3373.mp3", "title": "Automotive CyberSec Guidance Assessed; IBM\"s DDoS Apology", "pubdate": "20161028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/is-healthcare-sector-so-vulnerable-to-cyberattacks-directLink-8-i-3371.mp3", "title": "Why Is Healthcare Sector So Vulnerable to Cyberattacks?", "pubdate": "20161028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-hhs-cio-on-emerging-threats-top-priorities-directLink-2-i-3369.mp3", "title": "New HHS CIO on Emerging Threats, Top Priorities", "pubdate": "20161027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-sector-among-most-at-risk-from-social-engineering-directLink-7-i-3370.mp3", "title": "Healthcare Sector Among Most at Risk from Social Engineering", "pubdate": "20161027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/at-eye-defensestorm-directLink-9-i-3362.mp3", "title": "At the Eye of the DefenseStorm", "pubdate": "20161027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-user-new-perimeter-directLink-3-i-3368.mp3", "title": "Cybersecurity: Redefining Visibility and Transparency", "pubdate": "20161027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thwarting-massive-ddos-attacks-what-future-holds-directLink-10-i-3367.mp3", "title": "Thwarting Massive DDoS Attacks: What the Future Holds", "pubdate": "20161025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacking-us-presidential-election-evaluating-threats-directLink-10-i-3364.mp3", "title": "Hacking the US Presidential Election: Evaluating the Threats", "pubdate": "20161021" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-how-to-spot-risky-behavior-directLink-5-i-3363.mp3", "title": "Insider Threat: How to Spot Risky Behavior", "pubdate": "20161021" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/route-to-trusted-ids-directLink-6-i-3348.mp3", "title": "The Route to Trusted IDs", "pubdate": "20161020" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critics-assail-cyber-bank-regs-engaging-small-health-providers-in-info-sharing-directLink-4-i-3361.mp3", "title": "Critics Assail NY Bank Regs; NH-ISAC Tackles Info Sharing", "pubdate": "20161018" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-on-iot-security-landscape-directLink-10-i-3356.mp3", "title": "IoT: How Standards Would Help Security", "pubdate": "20161017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-assesses-impact-ai-on-cybersecurity-directLink-9-i-3358.mp3", "title": "Obama Assesses Impact of AI on Cybersecurity", "pubdate": "20161014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/engaging-smaller-healthcare-entities-in-threat-info-sharing-directLink-5-i-3357.mp3", "title": "Engaging Smaller Healthcare Entities in Threat Info Sharing", "pubdate": "20161014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/clinton-trump-go-head-to-head-over-purported-russian-hacks-directLink-7-i-3355.mp3", "title": "Clinton, Trump: Head-to-Head Over Purported Russian Hacks", "pubdate": "20161011" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thwarting-attempts-to-defeat-encryption-in-pos-devices-directLink-9-i-3352.mp3", "title": "Thwarting Attempts to Defeat Encryption in POS Devices", "pubdate": "20161007" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-associate-agreements-just-for-vendors-directLink-9-i-3353.mp3", "title": "Business Associate Agreements: Not Just for Vendors", "pubdate": "20161007" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-gartners-john-girard-on-mobile-security-trends-directLink-5-i-3347.mp3", "title": "Mobile Data Security: Role of Rights Management", "pubdate": "20161005" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-researcher-explains-insulin-pump-vulnerabilities-directLink-8-i-3351.mp3", "title": "Inside Scoop: J&J Confirms Insulin Pump Security Flaws", "pubdate": "20161005" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/donald-trump-unveils-his-cybersecurity-platform-directLink-10-i-3346.mp3", "title": "Donald Trump Unveils His Cybersecurity Platform", "pubdate": "20161004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-regulators-to-collaborate-regulated-businesses-on-cybersecurity-directLink-5-i-3344.mp3", "title": "Getting Regulators and Regulated to Collaborate on Cybersecurity", "pubdate": "20161003" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybercrime-on-rise-update-on-cyberthreat-info-sharing-directLink-3-i-3343.mp3", "title": "Why Cybercrime Is On the Rise; Update on Threat Info Sharing", "pubdate": "20160930" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-fraud-risks-for-same-day-ach-directLink-2-i-3342.mp3", "title": "Mitigating Fraud Risks for Same-Day ACH", "pubdate": "20160929" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/research-reveals-hacked-patient-records-are-so-valuable-directLink-3-i-3341.mp3", "title": "Research Reveals Why Hacked Patient Records Are So Valuable", "pubdate": "20160928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-steve-riley-directLink-6-i-3335.mp3", "title": "Cloud Security Paradigm: Time for Change?", "pubdate": "20160928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/organizations-dont-correctly-implement-hashed-passwords-directLink-7-i-3340.mp3", "title": "Why Hashed Passwords Aren\"t Implemented Correctly", "pubdate": "20160927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-john-dickson-directLink-3-i-3333.mp3", "title": "Why CISOs Must Make Application Security a Priority", "pubdate": "20160927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/achieving-resilient-cybersecurity-directLink-3-i-3330.mp3", "title": "Achieving Resilient Cybersecurity", "pubdate": "20160926" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/yahoo-breach-security-lessons-to-be-learned-directLink-2-i-3338.mp3", "title": "Yahoo\"s Mega Breach: Security Takeaways", "pubdate": "20160924" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/typical-data-breach-cost-7-million-or-200000-directLink-3-i-3337.mp3", "title": "Typical Cost of a Data Breach: $200,000 or $7 Million?", "pubdate": "20160923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-raimund-genes-ransomware-virus-total-issue-directLink-9-i-3328.mp3", "title": "Why Is Ransomware So Successful?", "pubdate": "20160921" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aligning-cyber-framework-organizations-strategy-goals-directLink-8-i-3334.mp3", "title": "Aligning Cyber Framework with Organization\"s Strategy, Goals", "pubdate": "20160920" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/panel-pd-directLink-3-i-3331.mp3", "title": "Helping Police Solve Cybercrimes", "pubdate": "20160919" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-summit-wrap-up-data-complexity-facilitates-cyber-risk-directLink-9-i-3329.mp3", "title": "ISMG Summit Wrap Up: Data Complexity Facilitates Cyber Risk", "pubdate": "20160916" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-sid-deshpande-directLink-4-i-3327.mp3", "title": "Security Investments Shifting to Detection and Response", "pubdate": "20160915" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sen-elizabeth-warren-seeks-probe-bank-over-privacy-violations-directLink-5-i-3326.mp3", "title": "Senator Seeks Probe of Bank Over Privacy Violations", "pubdate": "20160913" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-gartners-tom-scholtz-directLink-10-i-3325.mp3", "title": "A CISO\"s First 100 Days", "pubdate": "20160909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-donald-trump-understand-cybersecurity-directLink-1-i-3324.mp3", "title": "Does Donald Trump Understand Cybersecurity?", "pubdate": "20160909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-needs-to-standardize-threat-info-sharing-directLink-3-i-3323.mp3", "title": "Why Healthcare Needs to Standardize Threat Info Sharing", "pubdate": "20160909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-effective-network-defense-using-threat-intelligence-directLink-9-i-3321.mp3", "title": "Building an Effective Network Defense Using Threat Intelligence", "pubdate": "20160906" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-threat-intelligence-ecosystem-directLink-5-i-3272.mp3", "title": "Understanding the Threat Intelligence Ecosystem", "pubdate": "20160906" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opm-hack-partly-blamed-on-congressional-budgeting-method-directLink-2-i-3320.mp3", "title": "Did Outdated Systems Pave Way to OPM Hack?", "pubdate": "20160906" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-heads-up-to-manufacturers-on-harmful-medical-devices-flaws-directLink-10-i-3319.mp3", "title": "Reporting Medical Device Security Issues the Right Way", "pubdate": "20160902" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-do-medical-device-security-flaws-equal-clinical-risk-directLink-5-i-3318.mp3", "title": "When Do Medical Device Security Flaws Equal Clinical Risk?", "pubdate": "20160902" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-inside-outside-data-centers-directLink-3-i-3317.mp3", "title": "Defending the Inside and Outside of Data Centers", "pubdate": "20160901" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-cio-federal-funding-process-played-key-role-in-opm-hack-directLink-10-i-3316.mp3", "title": "US CIO: Federal Funding Process Played Key Role in OPM Hack", "pubdate": "20160901" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-cope-equation-group-revelations-directLink-4-i-3311.mp3", "title": "How to Cope With Intelligence Agency Exploits", "pubdate": "20160901" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vint-cerfs-optimistic-vision-internet-he-helped-create-directLink-4-i-3314.mp3", "title": "Vint Cerf\"s Outlook for the Internet He Helped Create", "pubdate": "20160831" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-best-way-to-handle-medical-device-security-concerns-directLink-8-i-3313.mp3", "title": "What\"s the Best Way to Handle Medical Device Security Concerns?", "pubdate": "20160831" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/states-warned-possible-attack-against-voter-systems-directLink-3-i-3312.mp3", "title": "States Warned of Possible Attack Against Voter Systems", "pubdate": "20160830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/just-in-case-saving-up-to-pay-off-ransomware-attacker-directLink-6-i-3309.mp3", "title": "Just In Case: Saving Up to Pay Off Ransomware Attacker", "pubdate": "20160826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patch-or-perish-fix-which-flaws-first-directLink-5-i-3308.mp3", "title": "Patch or Perish: Fix Which Flaws First?", "pubdate": "20160826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-maturing-mobile-threat-directLink-7-i-3302.mp3", "title": "Mitigating the Maturing Mobile Threat", "pubdate": "20160826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/time-solution-to-cybersecurity-skills-shortage-directLink-5-i-3306.mp3", "title": "The Maturing of the InfoSec Workforce", "pubdate": "20160825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/demystifying-dark-web-directLink-1-i-3305.mp3", "title": "Demystifying the Dark Web", "pubdate": "20160824" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-usb-great-again-directLink-3-i-3301.mp3", "title": "Making USB Great Again", "pubdate": "20160823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/details-behind-hhss-breach-investigation-ramp-up-directLink-10-i-3304.mp3", "title": "The Details Behind HHS Breach Investigation Ramp-Up", "pubdate": "20160823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/better-balancing-customer-experience-security-directLink-4-i-3300.mp3", "title": "Providing Frictionless ID Management", "pubdate": "20160823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-rising-cost-security-directLink-4-i-3299.mp3", "title": "Tackling the Rising Cost of Security", "pubdate": "20160822" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keeping-sensitive-federal-data-secure-on-non-government-computers-directLink-3-i-3296.mp3", "title": "NIST Updating Guidance on Protecting Federal Information", "pubdate": "20160820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nordenberg-part-2-directLink-2-i-3294.mp3", "title": "Tackling Medical Device Security as a Public Health Issue", "pubdate": "20160820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unraveling-mystery-behind-equation-group-directLink-8-i-3295.mp3", "title": "Unraveling the Mystery Behind the Equation Group", "pubdate": "20160819" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-sam-lodhi-directLink-4-i-3292.mp3", "title": "Using Cybernetics to Tell the Security Story", "pubdate": "20160818" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-ddos-attack-isnt-ddos-attack-directLink-1-i-3291.mp3", "title": "When a DDoS Attack Isn\"t a DDoS Attack", "pubdate": "20160816" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nordenberg-directLink-6-i-3290.mp3", "title": "Medical Device Security: Creating an Inventory", "pubdate": "20160816" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-those-initial-steps-to-create-isao-directLink-1-i-3289.mp3", "title": "Taking Initial Steps to Create an ISAO", "pubdate": "20160815" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-patient-consent-policies-affect-health-info-exchange-directLink-6-i-3281.mp3", "title": "How Patient Consent Policies Affect Health Info Exchange", "pubdate": "20160813" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russians-are-coming-russians-are-here-directLink-3-i-3288.mp3", "title": "The Russians Are Coming, the Russians Are Here", "pubdate": "20160812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-national-hie-privacy-security-obstacles-directLink-10-i-3280.mp3", "title": "Overcoming National HIE Privacy, Security Obstacles", "pubdate": "20160812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ex-fbi-agent-on-dnc-breach-investigation-directLink-7-i-3286.mp3", "title": "Ex-FBI Agent on DNC Breach Investigation", "pubdate": "20160811" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/comey-renews-debate-over-encryption-bypass-directLink-8-i-3284.mp3", "title": "Comey Renews the Debate Over Encryption Bypass", "pubdate": "20160809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-need-exist-for-us-department-cybersecurity-directLink-6-i-3283.mp3", "title": "Does US Need a Department of Cybersecurity?", "pubdate": "20160808" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/labeling-us-electoral-systems-as-critical-infrastructure-directLink-1-i-3282.mp3", "title": "Labeling US Electoral Systems as Critical Infrastructure", "pubdate": "20160805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-global-cybersecurity-skills-shortage-directLink-5-i-3279.mp3", "title": "Analyzing the Global Cybersecurity Skills Shortage", "pubdate": "20160804" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-plays-key-role-in-bank-fraud-directLink-2-i-3277.mp3", "title": "Social Media Plays Key Role in Bank Fraud", "pubdate": "20160803" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-risk-management-stuck-in-bronze-age-directLink-4-i-3275.mp3", "title": "Why Cyber Risk Management Is Stuck in the \"Bronze Age\"", "pubdate": "20160802" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vp-nominee-kaine-seeks-balance-between-security-privacy-directLink-3-i-3273.mp3", "title": "VP Nominee Kaine Seeks to Balance Security, Privacy", "pubdate": "20160729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-gang-claims-corporate-sabotage-sideline-directLink-1-i-3269.mp3", "title": "Ransom Smackdown: Group Promises Decryption Tools", "pubdate": "20160729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-phill-cracknell-founder-ciso-club-on-security-metrics-directLink-7-i-3268.mp3", "title": "Metrics Project May Help CISOs Measure Effectiveness Better", "pubdate": "20160728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solving-big-risk-problems-one-small-step-at-time-directLink-10-i-3271.mp3", "title": "Solving Big Risk Problems One Small Step at a Time", "pubdate": "20160728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/congress-considers-controversial-patient-id-matching-issue-directLink-1-i-3270.mp3", "title": "Congress Considers Controversial Patient ID Matching Issue", "pubdate": "20160728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-interview-david-dufour-webroot-directLink-3-i-3263.mp3", "title": "Defining a Smart City\"s Security Architecture", "pubdate": "20160727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-interview-zulfikar-ramzan-cto-rsa-directLink-6-i-3260.mp3", "title": "Three Principles of an Effective Cybersecurity Strategy", "pubdate": "20160727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-should-us-respond-if-russians-behind-hack-dnc-computers-directLink-8-i-3267.mp3", "title": "How Should US Respond If Russians Hacked DNC System?", "pubdate": "20160726" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-ransomware-directLink-3-i-3266.mp3", "title": "The Evolution of Ransomware", "pubdate": "20160726" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-interview-bruce-schneier-directLink-1-i-3261.mp3", "title": "Securing the World-Sized Web", "pubdate": "20160722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roadmap-for-integrating-cybersecurity-directLink-3-i-3256.mp3", "title": "A Roadmap for Integrating Cybersecurity", "pubdate": "20160722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gop-cyber-platform-being-aggressive-against-china-russia-touting-hack-back-directLink-5-i-3262.mp3", "title": "A Look at GOP Cybersecurity Platform", "pubdate": "20160722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-sony-breach-directLink-3-i-3247.mp3", "title": "Inside the Sony Breach", "pubdate": "20160722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ben-johnson-carbon-black-directLink-8-i-3258.mp3", "title": "Upgrading Security: Setting the Right Priorities", "pubdate": "20160721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-indicators-exposure-reveal-directLink-4-i-3237.mp3", "title": "What \"Indicators of Exposure\" Reveal", "pubdate": "20160721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-gaps-in-health-data-protection-identified-directLink-2-i-3259.mp3", "title": "Big Gaps in Health Data Protection Identified", "pubdate": "20160721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-cyber-expert-on-rethinking-approach-to-security-directLink-6-i-3255.mp3", "title": "Top Cyber Expert on Rethinking Approach to IT Security", "pubdate": "20160719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fireeye-on-extortion-to-pay-or-to-pay-directLink-7-i-3254.mp3", "title": "FireEye on Extortion: To Pay or Not to Pay?", "pubdate": "20160719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-prime-minister-theresa-mays-record-on-online-surveillance-cybersecurity-directLink-4-i-3252.mp3", "title": "U.K. Prime Minister Theresa May\"s Record on Cybersecurity", "pubdate": "20160715" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-voices-concerns-over-federal-government-security-directLink-1-i-3249.mp3", "title": "Obama Sees Need to Improve Federal Government IT Security", "pubdate": "20160712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-risks-shadow-it-directLink-3-i-3248.mp3", "title": "Mitigating \"Shadow IT\" Risks", "pubdate": "20160712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anti-virus-hullabaloo-real-story-behind-hillarys-email-server-use-directLink-10-i-3246.mp3", "title": "Anti-Virus Ruckus; Real Impact Over Hillary\"s Email Server", "pubdate": "20160708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/debating-hillarys-email-server-missing-element-directLink-7-i-3245.mp3", "title": "Debating Hillary\"s Email Server: The Missing Element", "pubdate": "20160707" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-security-risks-older-medical-devices-directLink-8-i-3244.mp3", "title": "Addressing Security Risks of Older Medical Devices", "pubdate": "20160707" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-framework-fosters-collaboration-to-build-secure-systems-directLink-7-i-3229.mp3", "title": "How NIST Framework Fosters Collaboration", "pubdate": "20160706" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartbleed-update-america-vulnerable-directLink-6-i-3242.mp3", "title": "Heartbleed Update: America the Vulnerable", "pubdate": "20160706" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ukraine-sees-bank-heist-organizations-crave-deception-directLink-8-i-3239.mp3", "title": "Ukraine Sees Bank Heist, Organizations Crave Deception", "pubdate": "20160705" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/orfei-directLink-1-i-3238.mp3", "title": "PCI-DSS Compliance: Are CEOs Buying In?", "pubdate": "20160705" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dark-overlord-deals-data-congress-tackles-crypto-directLink-9-i-3236.mp3", "title": "\"Dark Overlord\" Deals Data, and Congress Tackles Crypto", "pubdate": "20160701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fiserv-directLink-5-i-3233.mp3", "title": "Improving Fraud Prevention After SWIFT-Related Heists", "pubdate": "20160630" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roundup-brexit-shock-cybercrime-forum-sells-access-directLink-1-i-3231.mp3", "title": "Brexit Shocker, and Cybercrime Forum Sells Server Access", "pubdate": "20160628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-building-global-acceptance-directLink-1-i-3230.mp3", "title": "PCI-DSS: Building Global Acceptance", "pubdate": "20160628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roundup-fraud-crackdown-govt-sensitive-info-at-risk-directLink-3-i-3228.mp3", "title": "Roundup: Fraud Crackdown; Gov\"t Sensitive Info at Risk", "pubdate": "20160624" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/no-brainer-ransomware-defenses-directLink-8-i-3227.mp3", "title": "No-Brainer Ransomware Defenses", "pubdate": "20160623" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reimagining-api-creation-directLink-6-i-3140.mp3", "title": "Reimagining API Creation", "pubdate": "20160621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/problems-galore-java-script-fueled-ransomware-digital-currency-virtual-reality-privacy-directLink-3-i-3224.mp3", "title": "Update: Ransomware, Digital Currency, Virtual Reality", "pubdate": "20160621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/casb-challenge-apis-or-proxies-directLink-9-i-3225.mp3", "title": "The CASB Challenge: APIs or Proxies?", "pubdate": "20160621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/planning-for-aftermath-major-data-breach-directLink-7-i-3218.mp3", "title": "Breach Aftermath Planning: Focus on Saving Your Business", "pubdate": "20160621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-pci-dss-evolve-in-next-10-years-directLink-8-i-3223.mp3", "title": "How Will PCI-DSS Evolve in Next 10 Years?", "pubdate": "20160620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/watergate-dnc-breach-impact-two-types-break-ins-directLink-7-i-3222.mp3", "title": "Watergate and DNC Breach: Impact of 2 Types of Break-Ins", "pubdate": "20160617" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aba-retailers-should-meet-higher-cybersecurity-standards-directLink-10-i-3217.mp3", "title": "ABA: Retailers Should Meet Higher Cybersecurity Standards", "pubdate": "20160616" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/space-rogue-dj-vu-security-fail-directLink-8-i-3216.mp3", "title": "\"Space Rogue\" on Déjà Vu Security Failures", "pubdate": "20160616" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ibm-brings-watson-supercomputer-to-cybersecurity-fight-directLink-8-i-3213.mp3", "title": "IBM Brings \"Watson\" Supercomputer to Cybersecurity Fight", "pubdate": "20160615" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audio-report-deep-dive-into-symantec-blue-coat-merger-mobile-banking-flaws-directLink-10-i-3212.mp3", "title": "Symantec\"s Latest Buy; Mobile App Woes", "pubdate": "20160614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anatomy-ddos-attack-directLink-10-i-3214.mp3", "title": "Anatomy of a DDoS Attack", "pubdate": "20160614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adam-greene-directLink-2-i-3211.mp3", "title": "Analysis: FTC\"s Privacy Settlement with EHR Vendor", "pubdate": "20160614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rila-shell-for-interview-jensen-directLink-10-i-3204.mp3", "title": "Retailers: Don\"t Require Us to Meet Bank Security Standards", "pubdate": "20160613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/determining-if-ransomware-attack-reportable-breach-directLink-7-i-3208.mp3", "title": "Determining If a Ransomware Attack Is a Reportable Breach", "pubdate": "20160611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audio-report-updates-on-infosec-europe-nist-framework-directLink-1-i-3202.mp3", "title": "Audio Report: Updates on Infosec Europe, NIST Framework", "pubdate": "20160610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-dc-security-skills-crisis-directLink-6-i-3203.mp3", "title": "Tackling the D.C. Security Skills Crisis", "pubdate": "20160610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/great-now-more-phishing-packs-ransomware-directLink-2-i-3201.mp3", "title": "Report: Most Phishing Emails Pack Ransomware", "pubdate": "20160608" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/outdated-protocols-leave-organizations-at-risk-directLink-4-i-3200.mp3", "title": "Simple Security: How Organizations Fumble the Basics", "pubdate": "20160608" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-mulls-updating-cybersecurity-framework-directLink-8-i-3199.mp3", "title": "NIST Plans Cybersecurity Framework Update", "pubdate": "20160608" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/backstory-behind-swift-related-theft-directLink-8-i-3198.mp3", "title": "The Backstory Behind the SWIFT-Related Thefts", "pubdate": "20160607" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-report-special-edition-obamas-cybersecurity-legacy-directLink-7-i-3196.mp3", "title": "Analyzing the Cybersecurity Framework\"s Value", "pubdate": "20160603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/recruiting-cisos-skills-now-in-demand-directLink-2-i-3194.mp3", "title": "Recruiting CISOs: The Skills Now in Demand", "pubdate": "20160602" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-secure-systems-trustable-directLink-5-i-3193.mp3", "title": "Making Information Systems \"Trustable\"", "pubdate": "20160601" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-security-report-examining-national-data-breach-notification-directLink-2-i-3192.mp3", "title": "ISMG Security Report: Examining Global Breach Notification", "pubdate": "20160531" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-eu-countdown-begins-directLink-2-i-3185.mp3", "title": "Mandatory Breach Notifications: Europe\"s Countdown Begins", "pubdate": "20160527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-security-report-to-whom-should-ciso-report-directLink-4-i-3187.mp3", "title": "ISMG Security Report: To Whom Should CISO Report?", "pubdate": "20160527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-educated-response-directLink-6-i-3190.mp3", "title": "Ransomware - an Educated Response", "pubdate": "20160527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-could-congress-help-bolster-healthcare-cybersecurity-directLink-8-i-3188.mp3", "title": "How Could Congress Help Bolster Healthcare Cybersecurity?", "pubdate": "20160527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-management-as-business-enabler-directLink-10-i-3186.mp3", "title": "Identity Management as a Business Enabler", "pubdate": "20160526" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-security-report-unusual-twist-in-ransomware-directLink-6-i-3183.mp3", "title": "ISMG Security Report: Unusual Twist in Ransomware", "pubdate": "20160525" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-protection-value-masking-directLink-5-i-3184.mp3", "title": "Data Protection: The Value of Masking", "pubdate": "20160524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-walmarts-emv-lawsuit-against-visa-directLink-7-i-3182.mp3", "title": "Analysis: Walmart\"s EMV Lawsuit Against Visa", "pubdate": "20160524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-protect-wearable-device-data-directLink-4-i-3181.mp3", "title": "How to Protect Wearable Device Data", "pubdate": "20160523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-government-monitor-mobile-security-directLink-7-i-3180.mp3", "title": "Why Should Government Monitor Mobile Security?", "pubdate": "20160520" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ocrs-deven-mcgraw-on-hipaa-audit-preparation-directLink-3-i-3178.mp3", "title": "OCR\"s Deven McGraw on HIPAA Audit Preparation", "pubdate": "20160519" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/swift-hacks-how-banks-must-react-directLink-1-i-3177.mp3", "title": "Blocking Hack Attacks: SWIFT Must Do More", "pubdate": "20160518" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-re-evaluating-our-defenses-directLink-7-i-3175.mp3", "title": "Ransomware: Re-Evaluating Our Defenses", "pubdate": "20160513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-breach-what-if-your-defenses-fail-directLink-9-i-3172.mp3", "title": "Cyber Breach - What If Your Defenses Fail?", "pubdate": "20160512" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steve-durbin-directLink-4-i-3171.mp3", "title": "Information Security Forum\"s Durbin on Emerging Threats", "pubdate": "20160510" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-vulnerability-management-directLink-3-i-3169.mp3", "title": "Beyond Vulnerability Management", "pubdate": "20160509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internet-things-would-new-regulations-help-or-hurt-directLink-4-i-3167.mp3", "title": "Internet of Things: Would New Regulations Help or Hurt?", "pubdate": "20160507" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-bake-security-into-from-get-go-directLink-1-i-3166.mp3", "title": "How to Bake Security Into IT From the Start", "pubdate": "20160506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adopting-proactive-security-stance-directLink-4-i-3165.mp3", "title": "Why Banks Need To Be More Proactive With Security", "pubdate": "20160505" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-quantum-computing-threats-to-cryptography-directLink-9-i-3163.mp3", "title": "Tackling Quantum Computing Threats to Cryptography", "pubdate": "20160503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-phishing-attacks-surge-directLink-5-i-3161.mp3", "title": "Verizon\"s Latest Breach Report: Same Attacks, More Damage", "pubdate": "20160429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-update-5-new-requirements-for-service-providers-directLink-3-i-3160.mp3", "title": "PCI-DSS Update: 5 New Requirements for Service Providers", "pubdate": "20160428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/important-lesson-from-trade-secrets-case-directLink-8-i-3159.mp3", "title": "Important Lesson From Trade Secrets Case", "pubdate": "20160428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-career-advice-for-women-directLink-3-i-3158.mp3", "title": "InfoSec Career Advice for Women", "pubdate": "20160428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/test-driving-new-approach-to-online-credentials-directLink-10-i-3157.mp3", "title": "Test-Driving a New Approach to Online Credentials", "pubdate": "20160427" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pen-testing-internet-things-directLink-8-i-3155.mp3", "title": "Internet of Things: Security Insights for Developers", "pubdate": "20160421" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-state-threat-intelligence-directLink-7-i-3153.mp3", "title": "The Global State of Threat Intelligence", "pubdate": "20160419" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-anthem-breach-case-ruling-directLink-5-i-3150.mp3", "title": "Analysis: Impact of Anthem Breach Case Ruling", "pubdate": "20160416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/living-malware-how-to-become-intrusion-tolerant-directLink-6-i-3148.mp3", "title": "Living With Malware: How to Become \"Intrusion-Tolerant\"", "pubdate": "20160412" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurer-offers-ransomware-defense-insights-directLink-4-i-3146.mp3", "title": "Cyber Insurer Offers Ransomware Defense Insights", "pubdate": "20160408" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-distributed-workforce-directLink-8-i-3145.mp3", "title": "Securing the Distributed Workforce", "pubdate": "20160405" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-cloud-based-iam-directLink-8-i-3138.mp3", "title": "The Case for Cloud-Based IAM", "pubdate": "20160405" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-framework-for-security-privacy-compromise-directLink-3-i-3143.mp3", "title": "Creating a Framework for a Security-Privacy Dialogue", "pubdate": "20160404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-healthcare-fights-back-directLink-6-i-3144.mp3", "title": "Ransomware: Healthcare Fights Back", "pubdate": "20160401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-cybersecurity-task-force-will-make-difference-directLink-1-i-3142.mp3", "title": "New Cybersecurity Task Force: Will It Make a Difference?", "pubdate": "20160331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-its-necessarily-what-you-think-is-directLink-2-i-3141.mp3", "title": "DDoS: It\"s Not Necessarily What You Think It Is", "pubdate": "20160330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leveraging-security-to-meet-compliance-directLink-6-i-3124.mp3", "title": "Leveraging Security to Meet Compliance", "pubdate": "20160330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-threat-seen-intensifying-in-next-two-years-directLink-10-i-3139.mp3", "title": "Report: IT Security Threat to Intensify in Next Two Years", "pubdate": "20160329" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-prepare-for-phase-two-hipaa-compliance-audits-directLink-4-i-3137.mp3", "title": "How to Prepare for \"Phase Two\" HIPAA Compliance Audits", "pubdate": "20160328" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-issues-persist-as-fbi-backs-off-for-now-in-iphone-case-directLink-4-i-3135.mp3", "title": "Legal Issues Persist as FBI Backs Off in iPhone Case", "pubdate": "20160324" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciociso-finding-critical-balance-directLink-3-i-3131.mp3", "title": "CIO/CISO - Finding the Critical Balance", "pubdate": "20160323" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cambridge-savings-bank-directLink-6-i-3129.mp3", "title": "Case Study: A Community Bank Deploys Biometrics", "pubdate": "20160323" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-federal-ciso-faces-tough-challenges-directLink-1-i-3128.mp3", "title": "Federal CISO Will Face Tough Challenges", "pubdate": "20160322" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visualizing-entire-attack-surface-directLink-5-i-3126.mp3", "title": "Visualizing the Entire Attack Surface", "pubdate": "20160319" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/terrorist-financing-growing-worry-for-us-banks-directLink-9-i-3125.mp3", "title": "Terrorist Financing a Growing Worry for U.S. Banks", "pubdate": "20160317" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experts-buyers-market-for-cyber-insurance-directLink-9-i-3123.mp3", "title": "Cyber Insurance: A Buyers\" Market?", "pubdate": "20160312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-playing-larger-role-directLink-6-i-3121.mp3", "title": "CISOs Playing a Larger Role", "pubdate": "20160311" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automated-info-sharing-improves-threat-response-time-directLink-10-i-3122.mp3", "title": "Study: Automated Info Sharing Improves Threat Response Time", "pubdate": "20160310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/could-blockchain-play-broader-role-in-payments-directLink-4-i-3119.mp3", "title": "Could Blockchain Play Broader Role in Payments?", "pubdate": "20160310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-pii-ip-theft-true-cost-breach-directLink-3-i-3118.mp3", "title": "Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches", "pubdate": "20160310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/traditional-defenses-will-never-work-again-directLink-8-i-3116.mp3", "title": "Why Traditional Defenses Will Never Work Again", "pubdate": "20160308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-threats-shift-to-response-directLink-1-i-3117.mp3", "title": "Advanced Threats: The Shift to Response", "pubdate": "20160308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dellsecure-works-directLink-2-i-3107.mp3", "title": "More Hackers Relying on Compromised Credentials", "pubdate": "20160308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bringing-cias-information-sharing-values-to-congress-directLink-5-i-3109.mp3", "title": "Bringing CIA Cybersecurity Experience to Congress", "pubdate": "20160308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-revising-infusion-pump-cybersecurity-guidance-directLink-2-i-3094.mp3", "title": "Why NIST Is Revising Infusion Pump Cybersecurity Guidance", "pubdate": "20160307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ashish-thapar-directLink-1-i-3113.mp3", "title": "Up Close: Verizon Data Breach Digest", "pubdate": "20160305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chris-pierson-directLink-10-i-3115.mp3", "title": "Apple Case Creates Important Policy Debate", "pubdate": "20160305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/va-gov-mcauliffe-on-cybersecurity-directLink-4-i-3114.mp3", "title": "VA Gov. McAuliffe on Cybersecurity", "pubdate": "20160305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spotting-breaches-by-studying-users-directLink-2-i-3112.mp3", "title": "Spotting Breaches by Studying Users", "pubdate": "20160304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-good-versus-bad-directLink-5-i-3111.mp3", "title": "Emerging ID Management Issues for 2016", "pubdate": "20160304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-good-versus-bad-directLink-5-i-3110.mp3", "title": "Cloud Computing: The Security Concerns", "pubdate": "20160304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/testing-secure-texting-for-healthcare-directLink-10-i-3099.mp3", "title": "Testing Secure Texting for Healthcare", "pubdate": "20160303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-2016-be-record-year-hipaa-penalties-directLink-1-i-3095.mp3", "title": "Will 2016 Be a Record Year for HIPAA Penalties?", "pubdate": "20160303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pledge-to-facilitate-secure-health-data-exchange-directLink-1-i-3100.mp3", "title": "A \"Pledge\" to Facilitate Secure Health Data Exchange", "pubdate": "20160303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/george-tubin-directLink-2-i-3106.mp3", "title": "\"Industrialization\" of Cybercrime: Sizing Up the Impact", "pubdate": "20160302" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deven-mcgraw-directLink-4-i-3097.mp3", "title": "HIPAA Audits: A Progress Report", "pubdate": "20160302" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malcolm-harkins-directLink-1-i-3105.mp3", "title": "Are We Approaching Security Wrong?", "pubdate": "20160302" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-signatures-employing-malware-provenance-to-identify-malicious-software-directLink-5-i-3101.mp3", "title": "DHS Eyes Malware Provenance to Identify Malicious Code", "pubdate": "20160229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adapting-cyber-challenge-competitions-as-recruitment-tool-directLink-1-i-3092.mp3", "title": "Adapting Cybersecurity Contests as a Recruitment Tool", "pubdate": "20160225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-its-now-enabler-directLink-10-i-3083.mp3", "title": "Cloud Security: It\"s Now an Enabler", "pubdate": "20160225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-to-require-multifactor-authentication-for-administrators-directLink-4-i-3091.mp3", "title": "PCI DSS Update: What to Expect", "pubdate": "20160224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-cybersecurity-rating-systems-for-cars-directLink-3-i-3088.mp3", "title": "Creating Cybersecurity Rating Systems for Cars", "pubdate": "20160222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audio-report-time-right-to-debate-apple-fbi-crypto-battle-directLink-6-i-3087.mp3", "title": "The Crypto Debate: Apple vs. the FBI", "pubdate": "20160219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/strategies-for-advanced-endpoint-protection-directLink-7-i-3089.mp3", "title": "Strategies for Advanced Endpoint Protection", "pubdate": "20160219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jeff-shaffer-interview-directLink-5-i-3085.mp3", "title": "Inside the Cybercrime Investigator\"s Notebook", "pubdate": "20160218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-security-empower-your-people-directLink-2-i-3059.mp3", "title": "Network Security - Empower Your People", "pubdate": "20160212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pierson-interview-directLink-1-i-3079.mp3", "title": "Why CISOs Need a \"Separate Voice\" from CIOs", "pubdate": "20160211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-takes-center-stage-at-rsa-conference-directLink-5-i-3077.mp3", "title": "Privacy Takes Center Stage at RSA Conference", "pubdate": "20160211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-turns-25-directLink-10-i-3074.mp3", "title": "RSA Conference Turns 25", "pubdate": "20160211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-david-shearer-isc2-directLink-5-i-3078.mp3", "title": "Security Profession Must Get Younger", "pubdate": "20160209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-courts-business-to-share-cyberthreat-data-directLink-9-i-3076.mp3", "title": "DHS Tries to Entice Businesses to Share Cyberthreat Data", "pubdate": "20160206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ed-cabrera-trend-micro-directLink-1-i-3013.mp3", "title": "Be Secure and Comply in a Hybrid Cloud Environment", "pubdate": "20160204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-yahoo-hacks-itself-directLink-1-i-3073.mp3", "title": "How Yahoo Hacks Itself", "pubdate": "20160204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-risks-measuring-impact-directLink-10-i-3072.mp3", "title": "Medical Device Cybersecurity Risks: Measuring the Impact", "pubdate": "20160202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-french-caldwell-metric-stream-directLink-6-i-3069.mp3", "title": "How Will GRC Take on Mobility, IoT?", "pubdate": "20160202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/absolute-data-device-security-directLink-10-i-3070.mp3", "title": "Absolute Data & Device Security", "pubdate": "20160130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishme-directLink-9-i-3065.mp3", "title": "Phishing: How to Counter Targeted Attacks", "pubdate": "20160126" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-role-in-fighting-extortion-directLink-10-i-3060.mp3", "title": "The CISO\"s Role in Fighting Extortion", "pubdate": "20160121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rivals-avoid-taking-stand-on-backdoor-directLink-5-i-3056.mp3", "title": "Rivals Avoid Taking Stand on Backdoor", "pubdate": "20160119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-downside-to-proposed-hipaa-changes-directLink-6-i-3057.mp3", "title": "Privacy Downside to Proposed HIPAA Changes", "pubdate": "20160119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-identifying-malicious-insiders-directLink-7-i-3055.mp3", "title": "Special Report: Identifying Malicious Insiders", "pubdate": "20160118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-health-data-privacy-legislative-outlook-directLink-3-i-3050.mp3", "title": "2016 Health Data Privacy Regulatory Outlook", "pubdate": "20160113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/where-will-we-find-next-generation-security-leaders-directLink-9-i-3047.mp3", "title": "Where Will We Find Next Generation of Security Leaders?", "pubdate": "20160113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-accidental-insider-threat-directLink-4-i-3049.mp3", "title": "Mitigating the Accidental Insider Threat", "pubdate": "20160113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/group-seeks-measurable-infosec-solutions-directLink-3-i-3048.mp3", "title": "New Global Alliance Seeks Measurable InfoSec Solutions", "pubdate": "20160112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/traditional-security-tools-cant-cut-directLink-5-i-3046.mp3", "title": "Why Traditional Security Tools Can\"t Cut it", "pubdate": "20160108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-unusual-ruling-in-massachusetts-breach-case-directLink-10-i-3045.mp3", "title": "Analysis: Unusual Ruling in Massachusetts Breach Case", "pubdate": "20160108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-breach-prevention-time-to-purge-data-directLink-9-i-3042.mp3", "title": "2016 Breach Prevention: Time to Purge Data", "pubdate": "20160105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lance-hayden-directLink-7-i-3032.mp3", "title": "Cybersecurity as a Competitive Advantage", "pubdate": "20160104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-year-cyberthreat-info-sharing-directLink-9-i-3040.mp3", "title": "2016: Year of Cyberthreat Info Sharing", "pubdate": "20160104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opm-breach-game-changer-in-2015-directLink-9-i-3037.mp3", "title": "OPM Breach: A Game Changer in 2015", "pubdate": "20151231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2-worst-breaches-2015-directLink-4-i-3035.mp3", "title": "The 2 Worst Breaches of 2015", "pubdate": "20151231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breach-defense-please-stay-focused-directLink-6-i-3034.mp3", "title": "Solve Old Security Problems First", "pubdate": "20151230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-next-for-cybersecurity-framework-directLink-5-i-3033.mp3", "title": "What\"s Next for Cybersecurity Framework?", "pubdate": "20151230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-mobile-threats-in-healthcare-directLink-10-i-3026.mp3", "title": "Mitigating Mobile Risks in Healthcare", "pubdate": "20151228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/practical-application-user-behavior-analytics-directLink-1-i-3031.mp3", "title": "The Practical Application of User Behavior Analytics", "pubdate": "20151224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-user-behavior-analytics-directLink-7-i-3028.mp3", "title": "The Evolution of User Behavior Analytics", "pubdate": "20151224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bits-president-cyber-guidance-confuses-cisos-directLink-1-i-3029.mp3", "title": "BITS President: Cyber Guidance Confuses CISOs", "pubdate": "20151224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-infosec-educator-shortage-directLink-10-i-3025.mp3", "title": "Addressing the InfoSec Educator Shortage", "pubdate": "20151224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-year-cloud-exploit-directLink-7-i-3023.mp3", "title": "2016: The Year Hackers Exploit the Cloud?", "pubdate": "20151224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-info-sharing-law-on-healthcare-directLink-10-i-3027.mp3", "title": "Analysis: Cybersecurity Law\"s Impact on Healthcare", "pubdate": "20151223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exploring-ethics-behind-dnc-breach-directLink-1-i-3022.mp3", "title": "Exploring the Ethics Behind DNC Breach", "pubdate": "20151222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-hipaa-security-rule-need-updating-directLink-7-i-3021.mp3", "title": "Why the HIPAA Security Rule Needs Updating", "pubdate": "20151222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-interview-directLink-10-i-3019.mp3", "title": "PCI Council Extends Encryption Deadline", "pubdate": "20151221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-malware-taught-us-for-2016-directLink-10-i-3018.mp3", "title": "What Malware Taught us for 2016", "pubdate": "20151219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wearable-devices-will-they-face-regulatory-scrutiny-directLink-9-i-3017.mp3", "title": "Wearable Devices: Will They Face Regulatory Scrutiny?", "pubdate": "20151219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/check-fraud-remains-so-hot-what-to-do-about-it-directLink-7-i-3009.mp3", "title": "Why Check Fraud Remains So Hot - and What to Do About It", "pubdate": "20151215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leading-cybersecurity-out-medieval-times-directLink-9-i-3011.mp3", "title": "Leading Cybersecurity Out of Medieval Times", "pubdate": "20151210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/i-bet-my-career-on-directLink-7-i-3001.mp3", "title": "\"I Bet My Career on It ...\"", "pubdate": "20151210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/walter-mix-directLink-2-i-3010.mp3", "title": "Why Regulatory Scrutiny of Banks Will Intensify in 2016", "pubdate": "20151209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/look-for-more-fda-medical-device-security-alerts-in-2016-directLink-6-i-3008.mp3", "title": "Look for More FDA Medical Device Security Alerts in 2016", "pubdate": "20151209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-calling-for-encryption-bypass-directLink-9-i-3007.mp3", "title": "Is Obama Calling for Encryption Bypass?", "pubdate": "20151208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bas-hipaa-enforcement-priority-directLink-9-i-3004.mp3", "title": "Business Associates: A HIPAA Enforcement Priority?", "pubdate": "20151208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberattack-drill-eye-opening-lessons-directLink-2-i-3005.mp3", "title": "Cyberattack Drill: Eye-Opening Lessons", "pubdate": "20151205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/detecting-anomalous-behavior-new-strategy-directLink-2-i-2986.mp3", "title": "Detecting Anomalous Behavior: A New Strategy", "pubdate": "20151205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-on-how-security-shaping-for-2016-directLink-9-i-2998.mp3", "title": "Former RSA Chair Coviello on 2016 Security Outlook", "pubdate": "20151203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/joy-reverse-engineering-malware-directLink-6-i-3003.mp3", "title": "Building a Career on Taking Apart Malware", "pubdate": "20151203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishlabs-directLink-3-i-3000.mp3", "title": "Business Email Compromise Attacks Rapidly Evolving", "pubdate": "20151201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/report-insiders-still-top-breach-threat-directLink-6-i-2995.mp3", "title": "Report: Insiders Still Top Breach Threat", "pubdate": "20151130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/careers-dale-meyerrose-directLink-7-i-2997.mp3", "title": "Sending CISOs to Cyberthreat Bootcamp", "pubdate": "20151125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-compliance-in-cloud-directLink-4-i-2996.mp3", "title": "PCI Compliance in the Cloud", "pubdate": "20151125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lexis-nexis-shelton-directLink-9-i-2992.mp3", "title": "What is \"Sleeper Fraud,\" And Why Must Banks Beware?", "pubdate": "20151124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-privacy-patients-genomic-data-directLink-7-i-2993.mp3", "title": "Protecting the Privacy of Patients\" Genomic Data", "pubdate": "20151124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/labmd-ceo-speaks-about-ftc-legal-battle-directLink-1-i-2990.mp3", "title": "LabMD CEO Speaks About FTC Legal Battle", "pubdate": "20151123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rethinking-way-to-recruit-infosec-pros-directLink-4-i-2987.mp3", "title": "Rethinking How to Recruit InfoSec Pros", "pubdate": "20151120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-ftc-ruling-impact-future-data-security-cases-directLink-10-i-2988.mp3", "title": "Will FTC Ruling Impact Future Data Security Cases?", "pubdate": "20151118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-paris-attacks-dont-rush-to-kill-crypto-directLink-4-i-2985.mp3", "title": "After Paris Attacks, Beware Rush to Weaken Crypto", "pubdate": "20151118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/paris-attacks-reignite-encryption-debate-directLink-3-i-2984.mp3", "title": "Paris Attacks Reignite Encryption Debate", "pubdate": "20151117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-chase-breach-directLink-10-i-2982.mp3", "title": "What the JPMorgan Chase Breach Teaches Us", "pubdate": "20151116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-hipaa-audits-result-in-settlements-directLink-9-i-2983.mp3", "title": "Will HIPAA Audits Result in Settlements?", "pubdate": "20151116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pascual-directLink-5-i-2980.mp3", "title": "Why Banks Need to Prepare for More Chase-Like Breaches", "pubdate": "20151112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phi-breaches-just-healthcare-sectors-problem-directLink-10-i-2979.mp3", "title": "PHI Breaches: Not Just Healthcare Sector\"s Problem", "pubdate": "20151111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisas-healthcare-sector-provisions-directLink-3-i-2975.mp3", "title": "Analyzing CISA\"s Healthcare Sector Provisions", "pubdate": "20151106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-succeed-at-information-security-directLink-3-i-2974.mp3", "title": "How to Succeed at Information Security", "pubdate": "20151104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/x-directLink-10-i-2973.mp3", "title": "Why Tinba Trojan Is Now a Global Concern", "pubdate": "20151104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/oncs-top-privacy-priorities-for-2016-directLink-7-i-2971.mp3", "title": "ONC\"s Top Privacy Priorities for 2016", "pubdate": "20151103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviellos-new-cybersecurity-agenda-directLink-6-i-2968.mp3", "title": "Art Coviello\"s New Cybersecurity Agenda", "pubdate": "20151031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/durbin-from-london-directLink-10-i-2969.mp3", "title": "Cybersecurity: The CEO\"s Responsibilities", "pubdate": "20151030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-hipaa-myths-block-data-exchange-directLink-8-i-2967.mp3", "title": "How HIPAA Myths Block Data Exchange", "pubdate": "20151029" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mergers-create-challenges-for-cisos-directLink-5-i-2960.mp3", "title": "Mergers Create Challenges for CISOs", "pubdate": "20151028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-guide-to-spear-phishing-defense-directLink-5-i-2966.mp3", "title": "CISO\"s Guide to Spear Phishing Defense", "pubdate": "20151026" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pcis-king-directLink-5-i-2965.mp3", "title": "TalkTalk Attack Highlights Worldwide Breach Concerns", "pubdate": "20151026" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/genomic-data-exchange-challenges-directLink-6-i-2964.mp3", "title": "Genomic Data Exchange: The Security Challenges", "pubdate": "20151024" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-ehr-vendors-hope-to-measure-interoperability-directLink-4-i-2963.mp3", "title": "How EHR Vendors Hope to Measure Interoperability", "pubdate": "20151023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-health-data-exchange-hurdles-to-overcome-directLink-3-i-2962.mp3", "title": "Secure Health Data Exchange: Hurdles to Overcome", "pubdate": "20151021" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solving-secure-email-platform-challenge-directLink-6-i-2959.mp3", "title": "Solving Secure Email Platform Challenge", "pubdate": "20151019" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intel-sharing-project-ciso-leads-way-directLink-3-i-2958.mp3", "title": "Threat Intel Sharing Project: A CISO Leads the Way", "pubdate": "20151017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isaca-careers-directLink-7-i-2953.mp3", "title": "Attracting More Women to InfoSec Careers", "pubdate": "20151015" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/liz-garner-directLink-3-i-2951.mp3", "title": "Payment Security: What Factors Are Essential?", "pubdate": "20151014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chimes-charles-christian-on-2016-cyber-threat-outlook-directLink-7-i-2950.mp3", "title": "CHIME\"s Charles Christian on 2016 Cyber Threat Outlook", "pubdate": "20151014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-unifying-authentication-directLink-9-i-2947.mp3", "title": "Simplifying and Unifying Authentication", "pubdate": "20151009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nacs-emv-directLink-10-i-2946.mp3", "title": "Is EMV Bad News to Small Businesses?", "pubdate": "20151009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shift-to-file-centric-security-directLink-10-i-2930.mp3", "title": "The Shift to File-Centric Security", "pubdate": "20151009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-job-opportunities-directLink-7-i-2944.mp3", "title": "Cloud Security: Job Opportunities", "pubdate": "20151009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/change-heart-ex-nsa-chief-argues-against-circumvent-encryption-directLink-5-i-2943.mp3", "title": "Why Ex-NSA Chief Now Argues Against Encryption Backdoor", "pubdate": "20151008" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-medicare-move-to-chip-id-cards-directLink-7-i-2941.mp3", "title": "Should Medicare Move to Chip ID Cards?", "pubdate": "20151007" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-bitsights-benchmark-report-directLink-7-i-2940.mp3", "title": "Inside BitSight\"s Benchmark Report", "pubdate": "20151006" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-centric-security-directLink-3-i-2939.mp3", "title": "Identity-Centric Security", "pubdate": "20151006" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experian-breach-lessons-learned-directLink-8-i-2936.mp3", "title": "Experian Breach: Lessons Learned", "pubdate": "20151006" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/precision-medicine-initiative-big-data-security-privacy-concerns-directLink-2-i-2935.mp3", "title": "Precision Medicine: \"Big Data\" Security, Privacy Concerns", "pubdate": "20151002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/driehuis-directLink-9-i-2933.mp3", "title": "Banking Trojans Retooled for Data Mining", "pubdate": "20151001" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-raimund-genes-directLink-2-i-2932.mp3", "title": "Targeted Attacks Becoming the Norm", "pubdate": "20151001" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-pros-must-understand-privacy-issues-directLink-2-i-2931.mp3", "title": "Why InfoSec Professionals Must Understand Privacy Issues", "pubdate": "20150930" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-security-intelligence-centers-directLink-3-i-2816.mp3", "title": "Rise of Security Intelligence Centers", "pubdate": "20150929" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-be-security-auditor-directLink-8-i-2925.mp3", "title": "What It Takes to Be an IT Security Auditor", "pubdate": "20150924" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kevin-mandia-on-state-cybersecurity-directLink-6-i-2923.mp3", "title": "Kevin Mandia on the State of Cybersecurity", "pubdate": "20150923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/road-to-true-data-protection-directLink-5-i-2904.mp3", "title": "The Road to True Data Protection", "pubdate": "20150923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forensics-how-to-spoil-data-directLink-2-i-2890.mp3", "title": "Forensics - How Not to Spoil the Data", "pubdate": "20150923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aml-vinny-directLink-3-i-2918.mp3", "title": "How Banks Can Leverage the Bitcoin Infrastructure", "pubdate": "20150921" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/californias-proactive-approach-to-cyberthreats-directLink-10-i-2917.mp3", "title": "California\"s Proactive Approach to Cyberthreats", "pubdate": "20150919" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-risk-inaction-directLink-7-i-2824.mp3", "title": "Insider Threat: The Risk of Inaction", "pubdate": "20150918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gray-taylor-directLink-2-i-2913.mp3", "title": "Will Mobile Payments Overshadow EMV Card Migration?", "pubdate": "20150918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-cyber-challenge-seeks-to-boost-number-infosecurity-pros-directLink-3-i-2915.mp3", "title": "U.S. Cyber Challenge Seeks to Boost Number of Security Pros", "pubdate": "20150917" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-threatens-sanctions-against-china-if-hacks-continue-directLink-7-i-2914.mp3", "title": "Obama Threatens Sanctions Against China If Hacks Continue", "pubdate": "20150917" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-align-security-to-business-performance-directLink-9-i-2907.mp3", "title": "How to Align Security to Business Performance", "pubdate": "20150917" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybercrime-now-exceeds-traditional-crime-directLink-6-i-2901.mp3", "title": "Why Cybercrime Now Exceeds Conventional Crime", "pubdate": "20150916" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/charles-gunther-directLink-7-i-2906.mp3", "title": "How the FBI Helped Recover Millions from Wire Fraud", "pubdate": "20150915" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infusion-pump-security-nist-refining-guidance-directLink-5-i-2898.mp3", "title": "Infusion Pump Security: NIST Refining Guidance", "pubdate": "20150911" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/clyde-langley-directLink-9-i-2897.mp3", "title": "Fighting Fraud: New Insights from a Former FBI Agent", "pubdate": "20150910" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mit-unveils-new-cybersecurity-course-directLink-1-i-2893.mp3", "title": "MIT Offers Online Cybersecurity Training", "pubdate": "20150910" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-buy-in-to-fight-apt-directLink-5-i-2848.mp3", "title": "Securing Buy-in to Fight APT", "pubdate": "20150909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/commercializing-federal-security-wares-directLink-1-i-2894.mp3", "title": "Commercializing Federal IT Security Wares", "pubdate": "20150909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exclusive-ocrs-mcgraw-on-hipaa-audits-timing-directLink-1-i-2889.mp3", "title": "Exclusive: OCR\"s McGraw on Timing of HIPAA Audits", "pubdate": "20150905" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-interview-on-medical-devices-directLink-3-i-2869.mp3", "title": "FDA Official: More Medical Device Vulnerability Discoveries Are Likely", "pubdate": "20150903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-hacks-onc-emphasizing-id-access-management-directLink-3-i-2872.mp3", "title": "After Hacks, ONC Emphasizing ID and Access Management", "pubdate": "20150903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phil-burdette-directLink-9-i-2870.mp3", "title": "How Hackers Are Bypassing Intrusion Detection", "pubdate": "20150903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-lessons-government-learn-from-industry-directLink-5-i-2868.mp3", "title": "Incident Response: Lessons Government Can Learn from Industry", "pubdate": "20150903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/titus-directLink-5-i-2867.mp3", "title": "InfoSec Careers: How to Attract, Retain More Women", "pubdate": "20150903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proactive-malware-hunting-directLink-3-i-2866.mp3", "title": "Proactive Malware Hunting", "pubdate": "20150902" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-healthcare-payments-fraud-directLink-4-i-2865.mp3", "title": "Fighting Healthcare Payments Fraud", "pubdate": "20150902" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keyraider-directLink-10-i-2864.mp3", "title": "How KeyRaider Malware Hacked 225K Apple Accounts", "pubdate": "20150901" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacker-havens-rise-bulletproof-hosting-environments-directLink-3-i-2862.mp3", "title": "Hacker Havens: The Rise of Bulletproof Hosting Environments", "pubdate": "20150831" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/litan-part-2-directLink-2-i-2860.mp3", "title": "Gartner\"s Litan Warns of EMV Fraud Risks", "pubdate": "20150827" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/killing-bugs-focus-on-half-life-directLink-4-i-2859.mp3", "title": "Killing Bugs: Focus on \"Half-Life\"", "pubdate": "20150827" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/venture-capitalist-im-still-bullish-directLink-1-i-2857.mp3", "title": "Venture Capitalist: \"I\"m Still Bullish\"", "pubdate": "20150825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/economically-weaker-chinas-impact-on-cyberspying-directLink-10-i-2856.mp3", "title": "Impact of Economically Weaker China on Cyber Spying", "pubdate": "20150825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/extortion-alert-ashley-madison-emails-directLink-9-i-2854.mp3", "title": "Mitigating Organizational Risks After the Ashley Madison Leaks", "pubdate": "20150825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avivah-litan-directLink-1-i-2853.mp3", "title": "Gartner\"s Litan: Top New Threats to Banks", "pubdate": "20150824" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patient-data-matching-privacy-challenges-directLink-3-i-2851.mp3", "title": "Patient Data Matching: Privacy Challenges", "pubdate": "20150822" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-infosec-deficiencies-plaguing-federal-agencies-directLink-4-i-2849.mp3", "title": "3 InfoSec Woes Plaguing Federal Agencies", "pubdate": "20150820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-device-alert-catalyst-for-change-directLink-8-i-2845.mp3", "title": "FDA Device Alert: A Catalyst for Change", "pubdate": "20150819" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stop-griping-hacking-for-spying-ok-directLink-7-i-2842.mp3", "title": "Why It\"s OK to Hack for Spying", "pubdate": "20150817" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-neglect-made-healthcare-hackers-no1-target-directLink-7-i-2840.mp3", "title": "How \"Neglect\" Made Healthcare No.1 Target", "pubdate": "20150814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/windows-10-security-questions-directLink-3-i-2837.mp3", "title": "Is Windows 10 Secure for the Enterprise?", "pubdate": "20150814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-fbi-examine-hillarys-server-directLink-8-i-2839.mp3", "title": "How Will FBI Examine Hillary\"s Server?", "pubdate": "20150814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/levels-mobile-security-directLink-3-i-2836.mp3", "title": "The Levels of Mobile Security", "pubdate": "20150814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ozment-to-lead-dhs-integration-center-directLink-4-i-2834.mp3", "title": "DHS Appoints Key Cybersecurity Leader", "pubdate": "20150812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-assessing-skills-gap-directLink-4-i-2831.mp3", "title": "Re-Assessing the Skills Gap", "pubdate": "20150806" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fox-it-directLink-6-i-2830.mp3", "title": "Lessons from Gameover Zeus Takedown", "pubdate": "20150806" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kesner-directLink-4-i-2828.mp3", "title": "Ex-FBI Official on Why Attribution Matters", "pubdate": "20150805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/needle-in-haystack-finding-malware-directLink-4-i-2827.mp3", "title": "Needle in a Haystack: Finding Malware", "pubdate": "20150805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-new-measure-success-directLink-1-i-2826.mp3", "title": "Security: The New Measure of Success", "pubdate": "20150805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sea-to-sea-china-hacks-in-us-directLink-1-i-2825.mp3", "title": "Sea-to-Sea: China Hacks in U.S.", "pubdate": "20150802" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-context-king-directLink-6-i-2823.mp3", "title": "Threat Intelligence - Context is King", "pubdate": "20150801" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-anthem-hackers-motivations-directLink-4-i-2822.mp3", "title": "Anthem Attackers Tied to Espionage", "pubdate": "20150731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/julie-conroy-directLink-1-i-2821.mp3", "title": "Banks Brace for Fraud Migration", "pubdate": "20150731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-masayoshi-someya-directLink-6-i-2820.mp3", "title": "Targeted Attacks: How Ready is Japan?", "pubdate": "20150731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/planning-your-bot-management-program-directLink-6-i-2819.mp3", "title": "Planning Your Bot Management Program", "pubdate": "20150730" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-face-mobile-app-security-directLink-6-i-2818.mp3", "title": "The New Face of Mobile App Security", "pubdate": "20150730" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critical-steps-for-protecting-mobile-health-data-directLink-1-i-2815.mp3", "title": "NIST on Protecting Mobile Health Data", "pubdate": "20150730" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steering-death-passwords-directLink-4-i-2814.mp3", "title": "Steering the Death of Passwords", "pubdate": "20150730" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-lessons-learned-directLink-4-i-2813.mp3", "title": "Cloud Security: Lessons Learned", "pubdate": "20150729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internet-needs-new-security-model-directLink-9-i-2812.mp3", "title": "Internet Needs a New Security Model", "pubdate": "20150729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-privacy-threats-in-healthcare-directLink-2-i-2811.mp3", "title": "New Privacy Threats in Healthcare?", "pubdate": "20150728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/perez-directLink-10-i-2810.mp3", "title": "Visa on Reducing Merchant Risks", "pubdate": "20150727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-flash-java-now-kill-rc4-crypto-directLink-7-i-2804.mp3", "title": "Ditch RC4 Crypto Before It\"s Too Late", "pubdate": "20150724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-imagining-breach-defense-directLink-5-i-2808.mp3", "title": "Re-Imagining Breach Defense", "pubdate": "20150724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-munawar-hossain-directLink-5-i-2807.mp3", "title": "Data Center Security\"s Changing Face", "pubdate": "20150724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/staying-ahead-cybercrime-directLink-3-i-2805.mp3", "title": "Staying Ahead of Cybercrime", "pubdate": "20150724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacktivists-grown-up-dangerous-directLink-5-i-2803.mp3", "title": "Hacktivists: Grown Up and Dangerous", "pubdate": "20150723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-shared-assessments-directLink-10-i-2801.mp3", "title": "Making the Case for Shared Assessments", "pubdate": "20150723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-raimund-genes-directLink-6-i-2799.mp3", "title": "Moving Beyond the Buzzwords", "pubdate": "20150722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mike-smith-interview-rsa-directLink-8-i-2797.mp3", "title": "Secure DNS: Beyond Hijacks, Defacement", "pubdate": "20150722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/misusing-privileges-gray-areas-directLink-9-i-2798.mp3", "title": "Misusing Privileges: The Gray Areas", "pubdate": "20150722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/buyers-guide-to-ddos-mitigation-directLink-8-i-2794.mp3", "title": "Buyer\"s Guide to DDoS Mitigation", "pubdate": "20150721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-cures-bills-privacy-impact-directLink-4-i-2796.mp3", "title": "Analyzing \"Cures\" Bill\"s Privacy Impact", "pubdate": "20150721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-challenges-in-sdn-directLink-10-i-2795.mp3", "title": "Security Challenges in SDN", "pubdate": "20150720" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opm-breach-cyber-lessons-learned-directLink-8-i-2792.mp3", "title": "OPM Breach: Get Your Priorities Straight", "pubdate": "20150715" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-opm-breach-directLink-1-i-2793.mp3", "title": "Lessons from the OPM Breach", "pubdate": "20150714" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fed-reserves-gordon-directLink-5-i-2791.mp3", "title": "Fed\"s Faster Payments Security Priorities", "pubdate": "20150714" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-face-opm-breach-directLink-7-i-2790.mp3", "title": "OPM Breach: One Victim\"s Experience", "pubdate": "20150713" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-national-patient-id-directLink-7-i-2789.mp3", "title": "Making a Case for a National Patient ID", "pubdate": "20150710" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/toys-in-attic-iot-as-security-risk-directLink-10-i-2783.mp3", "title": "The \"Internet of Things\" as a Security Risk", "pubdate": "20150707" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ncua-directLink-6-i-2781.mp3", "title": "FFIEC Issues Cyber Assessment Tool", "pubdate": "20150702" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/swarming-talent-on-infosec-challenges-directLink-6-i-2780.mp3", "title": "\"Swarming\" Talent on InfoSec Challenges", "pubdate": "20150702" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-encryption-standard-updated-directLink-3-i-2775.mp3", "title": "PCI Encryption Standard Updated", "pubdate": "20150701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/classifying-data-seeking-automation-directLink-6-i-2774.mp3", "title": "Classifying Data: Seeking Automation", "pubdate": "20150701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/watch-for-visual-hacking-directLink-5-i-2772.mp3", "title": "Watch for \"Visual Hacking\"", "pubdate": "20150701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/federal-cio-backs-opm-leaders-directLink-8-i-2770.mp3", "title": "Federal CIO Backs OPM Leaders", "pubdate": "20150626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/house-divided-on-opm-directors-tenure-directLink-6-i-2769.mp3", "title": "House Divided on OPM Director\"s Fate", "pubdate": "20150625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-cyber-domino-effect-directLink-2-i-2768.mp3", "title": "Mitigating the Cyber Domino Effect", "pubdate": "20150624" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/context-aware-security-limiting-access-directLink-7-i-2767.mp3", "title": "Context-Aware Security: Limiting Access", "pubdate": "20150624" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malware-from-infection-to-detection-directLink-4-i-2645.mp3", "title": "Malware: From Infection to Detection", "pubdate": "20150620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tapping-analytics-in-cybersec-fraud-directLink-9-i-2765.mp3", "title": "Tapping Analytics In CyberSec, Fraud", "pubdate": "20150620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-homegrown-mobile-apps-directLink-9-i-2761.mp3", "title": "Securing Homegrown Mobile Apps", "pubdate": "20150618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disrupting-attacks-kill-chains-directLink-5-i-2760.mp3", "title": "Disrupting Attacks With Kill Chains", "pubdate": "20150618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-trusted-online-identities-directLink-10-i-2756.mp3", "title": "The Rise of Trusted Online Identities", "pubdate": "20150618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enterprise-risk-internet-things-directLink-7-i-2755.mp3", "title": "Enterprise Risk: Internet of Things", "pubdate": "20150617" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blocking-intellectual-property-theft-directLink-7-i-2748.mp3", "title": "How CIOs Must Prioritize Defenses", "pubdate": "20150615" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/path-to-privileged-access-management-directLink-9-i-2753.mp3", "title": "Path to Privileged Access Management", "pubdate": "20150613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tracking-missing-devices-directLink-9-i-2751.mp3", "title": "Tracking Missing Devices", "pubdate": "20150613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/navy-red-team-testing-moves-to-business-directLink-7-i-2750.mp3", "title": "Navy Red-Team Testing Moves to Business", "pubdate": "20150612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-inception-apt-campaign-directLink-1-i-2749.mp3", "title": "Inside the Inception APT Campaign", "pubdate": "20150612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-creating-new-security-platform-directLink-7-i-2747.mp3", "title": "Cisco to Launch New Security Platform", "pubdate": "20150612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/duqu-teardown-espionage-malware-directLink-2-i-2742.mp3", "title": "Duqu Teardown: Espionage Malware", "pubdate": "20150611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gets-more-proactive-directLink-7-i-2740.mp3", "title": "Breach Responders Get Proactive", "pubdate": "20150611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/detection-systems-dont-always-work-directLink-5-i-2741.mp3", "title": "Why Detection Systems Don\"t Always Work", "pubdate": "20150611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-how-attacks-have-evolved-directLink-9-i-2737.mp3", "title": "DDoS Attacks Continue to Evolve", "pubdate": "20150610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-eu-need-to-regain-trust-over-cyber-directLink-5-i-2738.mp3", "title": "Cybersecurity: Rebuilding U.S.-EU Trust", "pubdate": "20150610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/seeking-faster-data-breach-response-directLink-2-i-2736.mp3", "title": "Seeking Faster Data Breach Response", "pubdate": "20150609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ponemon-directLink-4-i-2734.mp3", "title": "Analysis: Ponemon Breach Cost Study", "pubdate": "20150609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visualizing-security-metrics-directLink-2-i-2731.mp3", "title": "Visualizing Security Metrics", "pubdate": "20150609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/weatherford-directLink-10-i-2732.mp3", "title": "Dissecting the OPM Breach", "pubdate": "20150606" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stroud-isaca-directLink-3-i-2728.mp3", "title": "ISACA: How Law Could Spur Info Sharing", "pubdate": "20150606" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/machine-learning-threat-protection-directLink-1-i-2730.mp3", "title": "Machine Learning & Threat Protection", "pubdate": "20150606" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-banking-security-will-evolve-directLink-6-i-2729.mp3", "title": "How Banking Security Will Evolve", "pubdate": "20150605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-borderless-workplace-directLink-9-i-2727.mp3", "title": "Securing a Borderless Workplace", "pubdate": "20150605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/busting-beebone-botnet-directLink-2-i-2725.mp3", "title": "Busting the Beebone Botnet", "pubdate": "20150605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/xx-directLink-6-i-2726.mp3", "title": "Inside An Elite APT Attack Group", "pubdate": "20150604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-cyber-security-directLink-5-i-2722.mp3", "title": "The Rise of \"Cyber\" Security", "pubdate": "20150604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evaluating-risk-digital-business-directLink-7-i-2724.mp3", "title": "Evaluating the Risk of \"Digital Business\"", "pubdate": "20150604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-learning-secures-networks-directLink-8-i-2721.mp3", "title": "Behavioral Learning Secures Networks", "pubdate": "20150604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeted-versus-zero-day-attacks-directLink-9-i-2720.mp3", "title": "Cybercrime: Niche Services Evolve", "pubdate": "20150603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irs-authentication-method-criticized-directLink-2-i-2714.mp3", "title": "IRS Authentication Method Criticized", "pubdate": "20150529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/selling-infosec-to-women-directLink-7-i-2713.mp3", "title": "Selling InfoSec Careers to Women", "pubdate": "20150528" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-snowden-world-new-infosec-model-directLink-6-i-2712.mp3", "title": "A New, Post-Snowden InfoSec Model", "pubdate": "20150528" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warning-security-alert-overload-directLink-4-i-2710.mp3", "title": "Warning: Security Alert Overload", "pubdate": "20150527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/researcher-describes-medical-device-flaws-directLink-5-i-2711.mp3", "title": "Researcher on Medical Device Flaws", "pubdate": "20150527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/manhattan-project-for-cybersecurity-rd-directLink-5-i-2708.mp3", "title": "Manhattan Project for Cybersecurity R&D", "pubdate": "20150523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/webroot-ceo-on-hiring-cyber-pros-directLink-10-i-2706.mp3", "title": "Webroot CEO on Hiring CyberSec Pros", "pubdate": "20150521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-venture-capitalist-directLink-5-i-2700.mp3", "title": "Art Coviello: Venture Capitalist", "pubdate": "20150515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/criminals-love-cybercrime-directLink-2-i-2696.mp3", "title": "Crime: Why So Much Is Cyber-Enabled", "pubdate": "20150513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marketing-infosec-profession-directLink-9-i-2690.mp3", "title": "Marketing the InfoSec Profession", "pubdate": "20150509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rapid-evolution-cyber-diplomacy-directLink-6-i-2687.mp3", "title": "The Rapid Evolution of Cyber Diplomacy", "pubdate": "20150506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/doj-fraud-summit-directLink-7-i-2686.mp3", "title": "U.S. Attorney: Managing Fraud Investigations", "pubdate": "20150505" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-hacker-attacks-directLink-8-i-2685.mp3", "title": "Defending Against Hacker Attacks", "pubdate": "20150505" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sophos-interview-directLink-5-i-2660.mp3", "title": "EMV: Changing U.S. Payments", "pubdate": "20150501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-moving-to-endpoint-directLink-8-i-2679.mp3", "title": "Security: Moving to the Endpoint", "pubdate": "20150430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bugcrowd-unites-code-builders-breakers-directLink-3-i-2677.mp3", "title": "Bugcrowd Unites Code Builders, Breakers", "pubdate": "20150430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-services-keep-evolving-directLink-8-i-2676.mp3", "title": "Security Services Keep Evolving", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-language-security-to-monitor-apps-directLink-2-i-2678.mp3", "title": "Application Protection: A New Approach", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-consume-threat-intelligence-directLink-8-i-2675.mp3", "title": "How to Consume Threat Intelligence", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/commoditization-ddos-directLink-9-i-2673.mp3", "title": "The Commoditization of DDoS", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-on-your-network-directLink-2-i-2681.mp3", "title": "What\"s on Your Network?", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-corporate-brand-directLink-9-i-2672.mp3", "title": "Securing the Corporate Brand", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/botnets-get-opportunistic-directLink-3-i-2680.mp3", "title": "Botnets Get More Opportunistic", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coordinating-cyberattacker-takedowns-directLink-5-i-2670.mp3", "title": "Helping Cybercrime Takedowns", "pubdate": "20150429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-standards-required-directLink-1-i-2669.mp3", "title": "Threat Intelligence: Standards Required", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/monitoring-behavior-to-flag-intrusions-directLink-3-i-2668.mp3", "title": "Monitoring Behavior to Flag Intrusions", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-versus-threat-data-directLink-1-i-2663.mp3", "title": "Threat Intelligence Versus Threat Data", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/strategies-for-secure-messaging-directLink-6-i-2667.mp3", "title": "Strategies for Secure Messaging", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/link-between-breaches-botnets-directLink-10-i-2666.mp3", "title": "Prioritizing Gaps in Breach Prevention: The Role of Third Party Risk Ratings", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-access-from-anywhere-directLink-2-i-2661.mp3", "title": "Securing Access from Anywhere", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-cyberthreat-analysis-directLink-10-i-2658.mp3", "title": "Automating Cyberthreat Analysis", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-behavior-to-identify-hackers-directLink-9-i-2657.mp3", "title": "Analyzing Behavior to Identify Hackers", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bracing-for-uptick-in-cnp-fraud-directLink-7-i-2662.mp3", "title": "Bracing for Uptick in CNP Fraud", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-cloud-security-directLink-6-i-2659.mp3", "title": "Automating Cloud Security", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-data-protection-directLink-10-i-2656.mp3", "title": "Simplifying Data Protection", "pubdate": "20150428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/target-could-owe-banks-directLink-8-i-2652.mp3", "title": "Why Target Could Owe Banks", "pubdate": "20150425" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mark-clancy-directLink-2-i-2650.mp3", "title": "Lessons from Intelligence Info Sharing", "pubdate": "20150421" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nelson-directLink-4-i-2649.mp3", "title": "Information Sharing: A Matter of Trust", "pubdate": "20150420" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-version-31-whats-new-directLink-10-i-2648.mp3", "title": "PCI DSS Version 3.1 - What\"s New?", "pubdate": "20150418" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-ensure-security-convenience-directLink-10-i-2639.mp3", "title": "How to Ensure Security and Convenience", "pubdate": "20150416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/framework-for-new-id-ecosystem-directLink-4-i-2638.mp3", "title": "Framework for a New ID Ecosystem", "pubdate": "20150416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/could-big-hipaa-settlements-be-coming-directLink-10-i-2633.mp3", "title": "Could Big HIPAA Settlements Be Coming?", "pubdate": "20150415" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exclusive-inside-verizon-breach-report-directLink-2-i-2632.mp3", "title": "Exclusive: Inside Verizon Breach Report", "pubdate": "20150414" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/oncs-privacy-officer-latest-tips-directLink-9-i-2628.mp3", "title": "ONC\"s Privacy Officer: The Latest Tips", "pubdate": "20150414" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-publishes-supply-chain-risk-guide-directLink-10-i-2630.mp3", "title": "NIST Publishes Supply Chain Risk Guide", "pubdate": "20150414" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-2015-sneak-peak-directLink-2-i-2626.mp3", "title": "RSA Conference 2015: A Sneak Peek", "pubdate": "20150408" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2015-state-ddos-directLink-7-i-2625.mp3", "title": "The 2015 State of DDoS", "pubdate": "20150408" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-on-rsa-conference-directLink-10-i-2624.mp3", "title": "Art Coviello on RSA Conference", "pubdate": "20150408" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/talking-security-to-board-directLink-2-i-2623.mp3", "title": "Talking Security to the Board", "pubdate": "20150407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emv-should-us-shift-oct-deadline-directLink-4-i-2622.mp3", "title": "EMV: Should Liability Shift Be Delayed?", "pubdate": "20150407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enhancing-authentication-status-report-directLink-1-i-2621.mp3", "title": "Enhancing Authentication: Status Report", "pubdate": "20150407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-amit-yoran-2015-security-agenda-directLink-9-i-2585.mp3", "title": "RSA\"s Amit Yoran: 2015 Security Agenda", "pubdate": "20150406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-coviello-on-state-security-directLink-7-i-2575.mp3", "title": "RSA\"s Coviello on the State of Security", "pubdate": "20150406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bitsight-ceo-on-nation-state-attacks-directLink-1-i-2618.mp3", "title": "BitSight CEO on Nation-State Attacks", "pubdate": "20150402" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/david-lott-directLink-4-i-2614.mp3", "title": "Mobile Fraud: A Focus for Fed Reserve", "pubdate": "20150327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tougher-challenges-ahead-to-secure-it-directLink-4-i-2613.mp3", "title": "Tougher Challenges Ahead to Secure IT", "pubdate": "20150326" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apt-cyber-extortion-whos-at-risk-directLink-10-i-2609.mp3", "title": "APT & Cyber-Extortion: Who\"s at Risk?", "pubdate": "20150321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-ethos-shaping-cyber-insurance-directLink-4-i-2608.mp3", "title": "Cyber-Insurance Coverage Shifting", "pubdate": "20150321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-directLink-3-i-2607.mp3", "title": "New Threat: ID Theft in the Workplace", "pubdate": "20150320" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lifelock-at-10-identity-fraud-evolves-directLink-3-i-2606.mp3", "title": "LifeLock at 10: Identity Fraud Evolves", "pubdate": "20150319" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/was-clinton-server-exposed-to-hacks-directLink-1-i-2602.mp3", "title": "Was Clinton Server Exposed to Hacks?", "pubdate": "20150312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spikes-ceo-advances-airgapped-browsers-directLink-6-i-2601.mp3", "title": "Spikes CEO on \"Air-Gapped\" Browsers", "pubdate": "20150312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-fraud-sees-first-drop-since-2010-directLink-1-i-2598.mp3", "title": "ID Fraud Drops for First Time Since 2010", "pubdate": "20150306" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bit9-ceo-on-data-breach-defense-directLink-2-i-2597.mp3", "title": "Bit9 CEO on Data Breach Defense", "pubdate": "20150305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/consolidating-as-security-measure-directLink-1-i-2588.mp3", "title": "Consolidating IT as a Security Measure", "pubdate": "20150303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-fraud-security-converge-directLink-1-i-2596.mp3", "title": "When Fraud and Security Converge", "pubdate": "20150303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lance-james-directLink-4-i-2594.mp3", "title": "What is Gov\"t Role in Info Sharing?", "pubdate": "20150227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hide-cyber-skirmishes-iran-directLink-5-i-2592.mp3", "title": "Why Hide Cyber Skirmishes With Iran?", "pubdate": "20150225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-obamas-information-sharing-plan-work-directLink-1-i-2587.mp3", "title": "Will Obama\"s Information Sharing Plan Work?", "pubdate": "20150220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-approach-to-ddos-protection-directLink-2-i-2570.mp3", "title": "The New Approach to DDoS Protection", "pubdate": "20150220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trusting-cloud-provider-to-secure-data-directLink-5-i-2583.mp3", "title": "Managing Cloud Providers: New Approach", "pubdate": "20150218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurance-how-much-enough-directLink-2-i-2579.mp3", "title": "Cyber-Insurance: How Much Is Enough?", "pubdate": "20150216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ctiic-matters-directLink-5-i-2576.mp3", "title": "Raduege: Why New Cyber Agency Matters", "pubdate": "20150212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-learning-from-anthem-breach-directLink-10-i-2577.mp3", "title": "Phishing: Learning from Recent Breaches", "pubdate": "20150212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/merkel-directLink-9-i-2574.mp3", "title": "Why \"Adaptive Defense\" Is Critical", "pubdate": "20150212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/liz-garner-directLink-3-i-2572.mp3", "title": "Can PINs Reduce Online Fraud?", "pubdate": "20150210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-cyberthreat-intelligence-directLink-2-i-2573.mp3", "title": "Improving Cyberthreat Intelligence", "pubdate": "20150210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-shifting-to-mobile-devices-directLink-4-i-2569.mp3", "title": "Why Fraud Is Shifting to Mobile Devices", "pubdate": "20150205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/monitoring-third-party-breach-risks-directLink-4-i-2567.mp3", "title": "Monitoring Third-Party Breach Risks", "pubdate": "20150205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-behavior-to-identify-intruders-directLink-5-i-2563.mp3", "title": "Radware CEO on Identifying Intruders", "pubdate": "20150202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brazil-global-fraud-test-kitchen-directLink-3-i-2562.mp3", "title": "Brazil: The Global Fraud Test Kitchen", "pubdate": "20150130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safenet-ceo-on-data-breach-security-directLink-9-i-2560.mp3", "title": "SafeNet CEO on Data Breach Security", "pubdate": "20150130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-security-training-to-next-level-directLink-1-i-2559.mp3", "title": "Taking Security Training to the Next Level", "pubdate": "20150129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/troy-leach-pci-directLink-2-i-2557.mp3", "title": "PCI\"s Leach on Fed\"s Fast Payment Plan", "pubdate": "20150129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vasco-ceo-on-authentication-trends-directLink-4-i-2556.mp3", "title": "VASCO CEO on Authentication Trends", "pubdate": "20150126" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boost-for-indo-us-cyber-cooperation-directLink-2-i-2552.mp3", "title": "A Boost for Indo-U.S. Cyber Cooperation", "pubdate": "20150120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expert-sony-hackers-sound-russian-directLink-5-i-2548.mp3", "title": "Expert: Sony Hackers Sound Russian", "pubdate": "20150113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fidelis-ceo-on-breach-response-directLink-9-i-2546.mp3", "title": "Fidelis CEO on Breach Response", "pubdate": "20150109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-cybercrime-as-service-directLink-2-i-2541.mp3", "title": "Fighting \"Cybercrime as a Service\"", "pubdate": "20150101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-ddos-threat-growing-directLink-5-i-2535.mp3", "title": "Arbor Networks\" President on DDoS", "pubdate": "20141230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/web-attacks-how-to-improve-defense-directLink-1-i-2540.mp3", "title": "Web Based Attack Trends and How to Leverage Information Sharing", "pubdate": "20141227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-indias-staffing-crisis-directLink-8-i-2539.mp3", "title": "Staffing Crisis: What India Can Do", "pubdate": "20141226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sony-hack-breaks-nation-state-mold-directLink-2-i-2536.mp3", "title": "Sony Hack Breaks \"Nation-State\" Mold", "pubdate": "20141223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zixcorp-ceo-on-evolution-email-security-directLink-8-i-2534.mp3", "title": "ZixCorp CEO on E-mail Security Evolution", "pubdate": "20141222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forescout-ceo-on-internet-things-directLink-5-i-2531.mp3", "title": "ForeScout CEO on Internet of Things", "pubdate": "20141218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/agencies-seen-improving-in-gauging-risk-directLink-6-i-2532.mp3", "title": "Agencies Seen Improving in Gauging Risk", "pubdate": "20141217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proofpoints-ceo-says-hackers-are-winning-directLink-1-i-2530.mp3", "title": "Proofpoint\"s CEO: Hackers Are Winning", "pubdate": "20141216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-mobile-financial-transactions-directLink-2-i-2529.mp3", "title": "AirWatch Chairman on Mobile Security", "pubdate": "20141213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-isc-head-tackles-staffing-crisis-directLink-9-i-2528.mp3", "title": "New (ISC)² Head Tackles Staffing Crisis", "pubdate": "20141211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/true-cost-data-breach-directLink-4-i-2527.mp3", "title": "The True Cost of a Data Breach", "pubdate": "20141208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/christy-wyatt-on-mobile-security-directLink-1-i-2518.mp3", "title": "Christy Wyatt on Mobile Security", "pubdate": "20141205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wiper-malware-what-you-need-to-know-directLink-1-i-2526.mp3", "title": "\"Wiper\" Malware: What You Need to Know", "pubdate": "20141203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boost-for-cybersecurity-policy-analysis-directLink-5-i-2517.mp3", "title": "A Boost for Cybersecurity Policy Analysis", "pubdate": "20141127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-staffing-real-crisis-directLink-7-i-2506.mp3", "title": "Security Staffing: The Real Crisis", "pubdate": "20141127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/embracing-adversary-mindset-directLink-2-i-2514.mp3", "title": "Embracing the Adversary Mindset", "pubdate": "20141121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-ibm-will-grow-security-services-directLink-10-i-2505.mp3", "title": "How IBM Will Grow Its Security Business", "pubdate": "20141117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multidisciplinary-security-team-directLink-2-i-2511.mp3", "title": "The Multidisciplinary IT Security Team", "pubdate": "20141114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fireeye-ceo-evolution-security-directLink-8-i-2500.mp3", "title": "FireEye CEO: The Evolution of Security", "pubdate": "20141113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/david-dewalt-business-security-directLink-6-i-2503.mp3", "title": "David DeWalt: The Business of Security", "pubdate": "20141113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fiberlink-president-on-future-byod-directLink-5-i-2504.mp3", "title": "Fiberlink President on Future of BYOD", "pubdate": "20141112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-fighting-fraud-directLink-3-i-2508.mp3", "title": "The Business of Fighting Fraud", "pubdate": "20141112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-on-one-fireeyes-dave-dewalt-directLink-4-i-2499.mp3", "title": "One on One with FireEye\"s Dave DeWalt", "pubdate": "20141112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-aftermath-image-vs-security-directLink-5-i-2507.mp3", "title": "Breach Aftermath: Messaging Matters", "pubdate": "20141111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-troy-leach-directLink-3-i-2498.mp3", "title": "Why PCI Will Issue Log Monitoring Guidance", "pubdate": "20141110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/savage-directLink-10-i-2502.mp3", "title": "New ONC Privacy Chief\"s Rallying Cry", "pubdate": "20141110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-following-his-dream-directLink-6-i-2496.mp3", "title": "NIST\"s Ron Ross on How a Career Evolves", "pubdate": "20141106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-6-i-2495.mp3", "title": "FFIEC: Boards Need Cyber Training", "pubdate": "20141105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wearable-health-tech-new-privacy-risks-directLink-4-i-2493.mp3", "title": "Wearable Health Tech: New Privacy Risks", "pubdate": "20141103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-hack-lesson-learned-directLink-4-i-2492.mp3", "title": "White House Hack: A Lesson Learned", "pubdate": "20141030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/online-voting-security-vs-expediency-directLink-5-i-2489.mp3", "title": "Online Voting: Security Vs. Expediency", "pubdate": "20141027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emv-rollout-role-pins-directLink-3-i-2488.mp3", "title": "EMV Rollout: Are PINs Essential?", "pubdate": "20141024" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fixing-two-factor-failures-directLink-4-i-2486.mp3", "title": "Fixing Two-Factor Failures", "pubdate": "20141023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-tom-carper-sees-fisma-reform-passing-directLink-2-i-2484.mp3", "title": "How Tom Carper Sees FISMA Bill Passing", "pubdate": "20141021" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apt-defense-executing-right-standards-directLink-6-i-2483.mp3", "title": "APT Defense: Executing the Right Standards", "pubdate": "20141020" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/group-ib-directLink-6-i-2480.mp3", "title": "Fighting the Globalization of Cybercrime", "pubdate": "20141017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-would-original-ciso-do-directLink-5-i-2472.mp3", "title": "What Would the Original CISO Do?", "pubdate": "20141016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/manipulating-hackers-as-cyberdefense-directLink-9-i-2477.mp3", "title": "Manipulating Hackers as a Cyberdefense", "pubdate": "20141015" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-you-prepared-for-breach-directLink-8-i-2476.mp3", "title": "Are You Prepared for a Breach?", "pubdate": "20141014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-changes-coming-in-year-directLink-4-i-2471.mp3", "title": "Authentication: Changes Coming In a Year", "pubdate": "20141013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-directLink-9-i-2473.mp3", "title": "Debunking Medical Device Cyber Myths", "pubdate": "20141013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mike-smith-interview-directLink-4-i-2469.mp3", "title": "Why Shellshock Battle Is Only Beginning", "pubdate": "20141008" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/slow-path-to-password-replacement-directLink-9-i-2467.mp3", "title": "The Slow Path to Password Replacement", "pubdate": "20141006" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-1-i-2466.mp3", "title": "Shellshock: The Patching Dilemma", "pubdate": "20141002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-secure-sensitive-data-on-cloud-directLink-2-i-2465.mp3", "title": "Adapting FedRAMP to Secure Sensitive Info", "pubdate": "20141002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/from-isis-to-fisma-conversation-directLink-10-i-2464.mp3", "title": "From ISIS to FISMA, A Conversation", "pubdate": "20140929" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bash-bug-podcast-directLink-5-i-2463.mp3", "title": "Shellshock Bug: How to Respond", "pubdate": "20140926" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-omnibus-one-year-later-directLink-4-i-2459.mp3", "title": "HIPAA Omnibus: One Year Later", "pubdate": "20140922" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-maximize-business-benefits-directLink-7-i-2441.mp3", "title": "Security: Maximize Business Benefits", "pubdate": "20140917" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vanderhoof-directLink-10-i-2451.mp3", "title": "The Biggest Challenge to EMV Migration", "pubdate": "20140916" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/army-cyber-leader-touts-hacking-skills-directLink-10-i-2446.mp3", "title": "Army Cyber Leader Touts Hacking Skills", "pubdate": "20140912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacker-attacks-are-you-prepared-directLink-10-i-2445.mp3", "title": "Hacker Attacks: Are You Prepared?", "pubdate": "20140912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michael-theis-directLink-9-i-2442.mp3", "title": "Keys to Fighting Insider Fraud", "pubdate": "20140910" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-prevention-new-approach-directLink-7-i-2436.mp3", "title": "Breach Prevention: A New Approach", "pubdate": "20140909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-framework-setting-record-straight-directLink-8-i-2430.mp3", "title": "Cyber Framework: Setting Record Straight", "pubdate": "20140827" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-cybercrime-in-canada-directLink-7-i-2432.mp3", "title": "Fighting Cybercrime in Canada", "pubdate": "20140827" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-modern-breach-directLink-3-i-2428.mp3", "title": "Breach Response: Are We Doing Enough?", "pubdate": "20140825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-banking-evolved-services-risks-directLink-6-i-2425.mp3", "title": "Mobile Banking: Evolved Services, Risks", "pubdate": "20140823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michael-daniels-path-to-white-house-directLink-7-i-2422.mp3", "title": "Michael Daniel\"s Path to the White House", "pubdate": "20140821" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critiquing-apple-ios-8-security-features-directLink-3-i-2424.mp3", "title": "Apple iOS 8: What\"s New for Security?", "pubdate": "20140820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-cybersecurity-complexity-directLink-9-i-2417.mp3", "title": "Simplifying Cybersecurity Complexity", "pubdate": "20140813" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-us-want-cyber-peace-directLink-5-i-2415.mp3", "title": "Does U.S. Truly Want Cyber Peace?", "pubdate": "20140812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blackphone-inside-secure-smartphone-directLink-5-i-2414.mp3", "title": "Blackphone: Inside a Secure Smart Phone", "pubdate": "20140808" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/holistic-approach-to-security-directLink-2-i-2408.mp3", "title": "A Holistic Approach to Security", "pubdate": "20140808" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-its-team-sport-directLink-7-i-2413.mp3", "title": "Cybersecurity: Why It\"s Got to Be a Team Sport", "pubdate": "20140808" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/password-dead-directLink-3-i-2407.mp3", "title": "The Password Is \"Dead\"", "pubdate": "20140807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-drowning-in-alerts-directLink-4-i-2409.mp3", "title": "Incident Response: \"Drowning in Alerts\"", "pubdate": "20140807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pcileach-interview-directLink-6-i-2406.mp3", "title": "New PCI Guidance for Third-Party Risks", "pubdate": "20140807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/putting-cybervor-in-perspective-directLink-5-i-2411.mp3", "title": "Putting CyberVor in Perspective", "pubdate": "20140807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/waging-war-against-healthcare-fraud-directLink-6-i-2410.mp3", "title": "Waging a War Against Healthcare Fraud", "pubdate": "20140807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-low-cyber-diet-improve-security-directLink-8-i-2405.mp3", "title": "Will Low-Cyber Diet Improve Security?", "pubdate": "20140807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeted-attacks-raising-risk-urgency-directLink-7-i-2396.mp3", "title": "Targeted Attacks: Raising Risk Urgency", "pubdate": "20140805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-security-lessons-from-nascar-directLink-8-i-2401.mp3", "title": "Assessing Controls: A NASCAR Lesson", "pubdate": "20140804" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internet-things-security-analysis-directLink-7-i-2400.mp3", "title": "\"Internet of Things\" Security Analysis", "pubdate": "20140801" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sifma-directLink-8-i-2398.mp3", "title": "Banks as Cybercrime Fighters?", "pubdate": "20140729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shaping-cloud-services-contract-directLink-4-i-2394.mp3", "title": "Shaping a Cloud Services Contract", "pubdate": "20140724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-lessons-in-small-data-directLink-5-i-2392.mp3", "title": "Big Lessons in Small Data", "pubdate": "20140723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-leaders-role-directLink-9-i-2393.mp3", "title": "Application Security: The Leader\"s Role", "pubdate": "20140723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-before-during-after-directLink-6-i-2388.mp3", "title": "Attack Response: Before, During, After", "pubdate": "20140723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/modernizing-vas-ehr-directLink-4-i-2387.mp3", "title": "Modernizing the VA\"s EHR System", "pubdate": "20140722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analytics-enabled-soc-directLink-6-i-2384.mp3", "title": "The Analytics-Enabled SOC", "pubdate": "20140721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-divided-we-fall-directLink-7-i-2383.mp3", "title": "Art Coviello: Divided We Fall", "pubdate": "20140718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/testing-your-apt-response-plan-directLink-9-i-2382.mp3", "title": "Testing Your APT Response Plan", "pubdate": "20140715" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-research-career-path-directLink-5-i-2377.mp3", "title": "Security Research: The Career Path", "pubdate": "20140708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breaches-what-victims-say-directLink-8-i-2374.mp3", "title": "Data Breaches: What the Victims Say", "pubdate": "20140703" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-lessons-from-trenches-directLink-8-i-2373.mp3", "title": "Breach Lessons from the Trenches", "pubdate": "20140703" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersec-game-fervent-geeks-play-directLink-9-i-2370.mp3", "title": "The \"Game\" Fervent IT Security Pros Play", "pubdate": "20140701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-staffs-role-in-vendor-audits-directLink-1-i-2366.mp3", "title": "InfoSec Staff\"s Role in Vendor Audits", "pubdate": "20140628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/focusing-on-vectors-threats-directLink-9-i-2365.mp3", "title": "Focusing on Vectors, Not Threats", "pubdate": "20140628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-digital-assets-directLink-7-i-2363.mp3", "title": "Improving Cyberthreat Communication", "pubdate": "20140627" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-learned-from-cyber-insurance-directLink-10-i-2362.mp3", "title": "Lessons Learned from Cyber-Insurance", "pubdate": "20140626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-breaking-down-silos-directLink-5-i-2360.mp3", "title": "Big Data: Breaking Down Silos", "pubdate": "20140626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/all-malware-created-equally-directLink-9-i-2358.mp3", "title": "Not All Malware is Created Equally", "pubdate": "20140626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/and-security-filling-gap-directLink-10-i-2357.mp3", "title": "IT and Security: Filling the Gap", "pubdate": "20140626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-secure-legacy-apps-directLink-9-i-2356.mp3", "title": "How to Secure Legacy Apps", "pubdate": "20140626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tim-pawlenty-directLink-5-i-2355.mp3", "title": "Why Information Sharing Isn\"t Working", "pubdate": "20140625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trend-micro-sherry-directLink-2-i-2352.mp3", "title": "BYOD: Bring Your Own Disaster?", "pubdate": "20140625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coalfire-dakin-directLink-5-i-2354.mp3", "title": "3 Key Questions from CEOs to CISOs", "pubdate": "20140625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/balancing-byod-company-data-directLink-8-i-2359.mp3", "title": "Combining MDM and BYOD: The Best of Both Worlds", "pubdate": "20140625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-constant-state-infection-directLink-1-i-2353.mp3", "title": "Security: A Constant State of Infection", "pubdate": "20140625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-privileged-id-governance-directLink-10-i-2349.mp3", "title": "The ROI of Privileged ID Governance", "pubdate": "20140625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/greg-garcia-directLink-4-i-2348.mp3", "title": "The Key to Anticipating Cyber-Attacks", "pubdate": "20140620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-women-advance-let-them-fail-directLink-1-i-2344.mp3", "title": "How Can Women Advance? Let Them Fail", "pubdate": "20140619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-fraud-scams-solutions-directLink-4-i-2341.mp3", "title": "Application Fraud: Scams and Solutions", "pubdate": "20140616" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-safely-reduce-security-controls-directLink-6-i-2340.mp3", "title": "How to Safely Reduce Security Controls", "pubdate": "20140611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/florida-fights-fraud-authentication-directLink-3-i-2339.mp3", "title": "Florida Fights Fraud with Authentication", "pubdate": "20140609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multidisciplinary-approach-to-infosec-directLink-8-i-2335.mp3", "title": "A Multidisciplinary Approach to InfoSec", "pubdate": "20140609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iam-improving-customer-experience-directLink-1-i-2337.mp3", "title": "IAM and Improving the Customer Experience", "pubdate": "20140606" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-6-i-2334.mp3", "title": "Stop Breaches? Improve Internet Hygiene", "pubdate": "20140605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-be-cso-for-fbi-directLink-5-i-2332.mp3", "title": "How To Be a CSO for the FBI", "pubdate": "20140603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-strategy-for-winning-funding-directLink-9-i-2331.mp3", "title": "A CISO\"s Strategy for Winning Funding", "pubdate": "20140602" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keeping-up-cybersecurity-framework-directLink-2-i-2329.mp3", "title": "Keeping Up with Cybersecurity Framework", "pubdate": "20140530" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-6-i-2326.mp3", "title": "Target\"s Impact on Mobile Payments", "pubdate": "20140521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-ciso-ceo-to-talk-same-language-directLink-10-i-2325.mp3", "title": "Getting CISO, CEO to Talk Same Language", "pubdate": "20140519" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fed-to-offer-fast-payments-game-plan-directLink-3-i-2318.mp3", "title": "Fed to Unveil Plan for \"Fast Payments\"", "pubdate": "20140516" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-context-aware-security-directLink-10-i-2317.mp3", "title": "Avivah Litan on \"Context-Aware\" Security", "pubdate": "20140515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/consumers-on-infosec-what-me-worry-directLink-10-i-2324.mp3", "title": "Consumers on InfoSec: What, Me Worry?", "pubdate": "20140515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/applying-engineering-values-to-infosec-directLink-10-i-2322.mp3", "title": "Applying Engineering Values to InfoSec", "pubdate": "20140515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-risk-based-approach-to-awareness-directLink-5-i-2321.mp3", "title": "A New Way to Build Security Awareness", "pubdate": "20140513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/haiyan-song-joe-goldberg-directLink-7-i-2284.mp3", "title": "Getting Up to Speed on Security", "pubdate": "20140510" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-cybercriminal-directLink-6-i-2279.mp3", "title": "The Evolution of the Cybercriminal", "pubdate": "20140510" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2nd-panel-oks-limits-on-bulk-collection-directLink-1-i-2315.mp3", "title": "2nd Panel OKs Limits on Bulk Collection", "pubdate": "20140509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-defense-cybersecurity-framework-directLink-10-i-2302.mp3", "title": "In Defense of Cybersecurity Framework", "pubdate": "20140508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compiling-byod-strategy-directLink-2-i-2274.mp3", "title": "BYOD: Building an Effective Strategy", "pubdate": "20140506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-file-sharing-trends-directLink-4-i-2297.mp3", "title": "Mobile File Sharing Trends", "pubdate": "20140506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ponemon-data-breach-costs-rising-directLink-10-i-2310.mp3", "title": "Ponemon: Data Breach Costs Rising", "pubdate": "20140506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/signature-vs-behavior-based-analysis-directLink-9-i-2275.mp3", "title": "Fighting Threats with Behavioral Analysis", "pubdate": "20140506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-generation-encryption-directLink-2-i-2300.mp3", "title": "The Next Generation of Encryption", "pubdate": "20140506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crawling-new-networks-directLink-8-i-2288.mp3", "title": "Using Network \"Situational Awareness\"", "pubdate": "20140506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-economic-view-to-cybersecurity-directLink-9-i-2294.mp3", "title": "Cybersecurity: Taking an Economic View", "pubdate": "20140503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-individual-directLink-2-i-2301.mp3", "title": "Authentication and the Individual", "pubdate": "20140503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-as-enabler-trusted-id-directLink-5-i-2292.mp3", "title": "Mobile as the Enabler of Trusted ID", "pubdate": "20140503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-network-visibility-directLink-1-i-2287.mp3", "title": "The Need for Network Visibility", "pubdate": "20140502" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-built-into-code-directLink-10-i-2283.mp3", "title": "Security Built Into the Code", "pubdate": "20140502" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-ddos-industry-directLink-7-i-2296.mp3", "title": "The New DDoS Industry", "pubdate": "20140502" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/filtering-content-for-different-regions-directLink-4-i-2306.mp3", "title": "Secure Web Gateway: Cultural Issues", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-websites-through-hacking-directLink-1-i-2298.mp3", "title": "The Role of Ethical Hacking", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/changing-ddos-environment-directLink-10-i-2293.mp3", "title": "DDoS: Evolving Attacks and Response", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-security-simpler-directLink-2-i-2305.mp3", "title": "Turning Awareness into Action", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-cloud-to-detect-malware-directLink-9-i-2277.mp3", "title": "Cloud-Based Threat Protection", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jason-hart-directLink-3-i-2281.mp3", "title": "Reassessing Information Security", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/matt-middleton-leal-directLink-8-i-2285.mp3", "title": "Protecting Credentialed Information", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-evolution-directLink-3-i-2289.mp3", "title": "The Authentication Evolution", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-network-testing-directLink-7-i-2304.mp3", "title": "The Need for Product Testing", "pubdate": "20140501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-ddos-attacks-work-as-smokescreen-directLink-4-i-2290.mp3", "title": "U.K. DDoS Attacks Work as Smokescreen", "pubdate": "20140430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enhancing-application-security-directLink-6-i-2286.mp3", "title": "Enhancing Application Security", "pubdate": "20140430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/choosing-application-components-directLink-2-i-2280.mp3", "title": "Choosing the Right App Components", "pubdate": "20140430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-vulnerability-management-directLink-10-i-2282.mp3", "title": "Understanding Vulnerability Management", "pubdate": "20140430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-security-within-technology-directLink-1-i-2303.mp3", "title": "Security for Smaller Organizations", "pubdate": "20140430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reducing-response-times-directLink-9-i-2278.mp3", "title": "Reducing Cyber-Attack Response Times", "pubdate": "20140429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-inbound-traffic-detect-trouble-directLink-10-i-2268.mp3", "title": "Eric Cole to Enter Hall of Fame", "pubdate": "20140424" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersec-framework-doomed-to-fail-directLink-5-i-2267.mp3", "title": "Is CyberSec Framework Doomed to Fail?", "pubdate": "20140423" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/v-directLink-4-i-2266.mp3", "title": "Verizon Report: Web App Attacks on Rise", "pubdate": "20140422" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/oncs-desalvo-on-privacy-security-directLink-5-i-2264.mp3", "title": "ONC\"s DeSalvo on Privacy, Security", "pubdate": "20140421" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-showcase-intels-malcolm-harkins-directLink-6-i-2258.mp3", "title": "CISO Showcase: Intel\"s Malcolm Harkins", "pubdate": "20140415" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/determining-heartbleed-exfiltration-directLink-10-i-2256.mp3", "title": "Determining Heartbleed Exfiltration", "pubdate": "20140411" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartbleed-rethinking-cybersecurity-directLink-8-i-2252.mp3", "title": "Heartbleed Discoverer Speaks Out", "pubdate": "20140410" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uphill-battle-against-cyber-attackers-directLink-1-i-2251.mp3", "title": "Inside Symantec\"s 2014 Threat Report", "pubdate": "20140409" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/viewing-information-as-asset-to-protect-directLink-5-i-2247.mp3", "title": "Cybersecurity: Involving Senior Leaders", "pubdate": "20140404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/changing-landscape-application-security-directLink-5-i-2244.mp3", "title": "Changing Landscape of Application Security", "pubdate": "20140403" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-new-global-threat-report-directLink-3-i-2246.mp3", "title": "Inside the New Global Threat Report", "pubdate": "20140401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/career-profile-attorney-kim-peretti-directLink-9-i-2245.mp3", "title": "Career Profile: Attorney Kim Peretti", "pubdate": "20140401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-threat-defense-directLink-6-i-2242.mp3", "title": "Advanced Threat Defense", "pubdate": "20140331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isc-turns-25-whats-ahead-directLink-8-i-2241.mp3", "title": "(ISC)² Turns 25: What\"s Ahead?", "pubdate": "20140325" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/end-to-end-encryption-challenges-directLink-10-i-2239.mp3", "title": "Why Is End-to-End Encryption So Daunting?", "pubdate": "20140324" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-marijuana-risks-directLink-9-i-2238.mp3", "title": "State Marijuana Laws: The Challenges", "pubdate": "20140320" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/so-you-want-career-in-privacy-directLink-1-i-2235.mp3", "title": "So, You Want a Career in Privacy?", "pubdate": "20140318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/retail-breaches-malware-source-directLink-2-i-2233.mp3", "title": "Retail Breaches: The Malware Source", "pubdate": "20140312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fido-pushing-international-buy-in-directLink-3-i-2229.mp3", "title": "FIDO: Pushing International Buy-In", "pubdate": "20140312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deploying-continuous-monitoring-plan-directLink-4-i-2227.mp3", "title": "Deploying a Continuous Monitoring Plan", "pubdate": "20140311" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-diagnostics-game-changer-directLink-7-i-2222.mp3", "title": "Continuous Diagnostics: A Game Changer", "pubdate": "20140304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/accelops-directLink-1-i-2204.mp3", "title": "Automating Data Analysis", "pubdate": "20140303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-professionals-time-to-step-up-directLink-2-i-2221.mp3", "title": "Security Professionals: Time to Step Up", "pubdate": "20140303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-threat-intelligence-directLink-6-i-2201.mp3", "title": "Real Threat Intelligence", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolving-threatscape-directLink-7-i-2211.mp3", "title": "The Evolving Threatscape", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keys-to-secure-content-sharing-directLink-4-i-2225.mp3", "title": "Keys to Secure Content Sharing", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-continue-to-grow-directLink-9-i-2212.mp3", "title": "DDoS Attacks Continue to Grow", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fox-it-directLink-9-i-2203.mp3", "title": "How to Improve Cybercrime Tracking", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-phone-fraud-directLink-4-i-2193.mp3", "title": "Fighting Phone Fraud", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/api-as-attack-vector-directLink-7-i-2192.mp3", "title": "The API as an Attack Vector", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-encryption-management-directLink-4-i-2191.mp3", "title": "Improving Encryption Management", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-mobile-hacks-threaten-enterprise-directLink-10-i-2199.mp3", "title": "How Mobile Hacks Threaten Enterprise", "pubdate": "20140227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threatmetrix-directLink-9-i-2206.mp3", "title": "Insights on Enhancing Authentication", "pubdate": "20140226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2014-brings-shift-in-cyber-attacks-directLink-3-i-2218.mp3", "title": "2014 Brings Shift in Cyber-Attacks", "pubdate": "20140226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/barrett-lyon-directLink-3-i-2217.mp3", "title": "DDoS: More Defenses Needed", "pubdate": "20140226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-going-beyond-compliance-directLink-1-i-2197.mp3", "title": "Security: Going Beyond Compliance", "pubdate": "20140226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iboss-offers-behavioral-analysis-directLink-10-i-2190.mp3", "title": "iBoss Offers Behavioral Analysis", "pubdate": "20140226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberthreat-protection-evolves-directLink-1-i-2209.mp3", "title": "Cyberthreat Protection Evolves", "pubdate": "20140226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fido-beyond-simple-authentication-directLink-7-i-2214.mp3", "title": "FIDO: Beyond \"Simple\" Authentication", "pubdate": "20140225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-unveils-open-source-initiative-directLink-7-i-2208.mp3", "title": "Cisco Unveils Open Source Initiative", "pubdate": "20140225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/impact-bit9-carbon-black-merger-directLink-3-i-2223.mp3", "title": "The Impact of Bit9, Carbon Black Merger", "pubdate": "20140225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cipherclouds-new-offering-directLink-2-i-2215.mp3", "title": "CipherCloud Unveils New Platform", "pubdate": "20140225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-network-architecture-directLink-4-i-2200.mp3", "title": "Securing Network Architecture", "pubdate": "20140225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dell-secureworks-directLink-1-i-2195.mp3", "title": "Cryptocurrency an Easy Target", "pubdate": "20140225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solutionary-directLink-1-i-2194.mp3", "title": "Log Analysis for Breach Prevention", "pubdate": "20140225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-threat-defense-directLink-8-i-2205.mp3", "title": "Advanced Threat Defense", "pubdate": "20140224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/litan-directLink-3-i-2198.mp3", "title": "2014 Fraud Prevention: 2 Key Steps", "pubdate": "20140222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-smart-grid-directLink-2-i-2188.mp3", "title": "Securing the Smart Grid", "pubdate": "20140220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-investments-venture-capitals-view-directLink-1-i-2187.mp3", "title": "InfoSec Investments: Venture Capital\"s View", "pubdate": "20140219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unfcu-directLink-3-i-2185.mp3", "title": "An EMV Pioneer Offers Lessons Learned", "pubdate": "20140217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/baking-privacy-into-health-it-directLink-10-i-2183.mp3", "title": "Baking Privacy Into Health IT", "pubdate": "20140213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cba-directLink-1-i-2182.mp3", "title": "Target Breach: The Cost to Banks", "pubdate": "20140212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-one-shot-memory-device-directLink-7-i-2181.mp3", "title": "Building a \"One-Shot\" Memory Device", "pubdate": "20140212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-directLink-7-i-2180.mp3", "title": "5 Ways to Improve PCI Compliance", "pubdate": "20140211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/javelin-directLink-10-i-2178.mp3", "title": "Card Breaches Pose Greatest Fraud Risk", "pubdate": "20140207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lax-security-to-blame-for-breaches-directLink-3-i-2176.mp3", "title": "Compensating Banks for Breaches", "pubdate": "20140206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2014-preview-directLink-6-i-2172.mp3", "title": "RSA 2014: A Preview", "pubdate": "20140205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-responds-to-critics-directLink-3-i-2175.mp3", "title": "PCI Council Responds to Critics", "pubdate": "20140203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/agency-security-audits-better-way-directLink-2-i-2168.mp3", "title": "Agency Security Audits: A Better Way?", "pubdate": "20140130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isight-directLink-8-i-2174.mp3", "title": "DHS Report Researcher: Retailers at Risk", "pubdate": "20140129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-state-privacy-directLink-4-i-2171.mp3", "title": "The Global State of Privacy", "pubdate": "20140128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/smarter-criminals-behind-breach-rise-directLink-2-i-2166.mp3", "title": "Records Exposed Hit New High in 2013", "pubdate": "20140124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iphone-app-offers-breach-law-guide-directLink-8-i-2163.mp3", "title": "iPhone App Offers Breach Law Guide", "pubdate": "20140122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ethics-technology-disconnect-directLink-7-i-2157.mp3", "title": "Ethics & Technology: The Disconnect", "pubdate": "20140121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intelcrawler-directLink-3-i-2161.mp3", "title": "Target Malware: Exploring the Origins", "pubdate": "20140120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exclusive-inside-cisco-security-report-directLink-2-i-2158.mp3", "title": "Exclusive: Inside Cisco Security Report", "pubdate": "20140117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-total-network-security-directLink-2-i-2159.mp3", "title": "Network Security: Enhancing Visibility Through Integration", "pubdate": "20140117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-predictions-for-2014-directLink-5-i-2130.mp3", "title": "Breach Predictions for 2014", "pubdate": "20140117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breaches-expose-flawed-payments-system-directLink-8-i-2155.mp3", "title": "Breaches Expose Payments System Flaws", "pubdate": "20140115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-trends-to-sway-cybersecuritys-future-directLink-2-i-2153.mp3", "title": "5 Trends to Sway Cybersecurity\"s Future", "pubdate": "20140111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/financial-trojans-what-to-expect-in-2014-directLink-10-i-2150.mp3", "title": "Financial Trojans: What to Expect in 2014", "pubdate": "20140110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-training-weaknesses-idd-directLink-9-i-2148.mp3", "title": "Why Training Doesn\"t Mitigate Phishing", "pubdate": "20140107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/background-screening-top-10-trends-directLink-9-i-2152.mp3", "title": "Background Screening: Top 10 Trends", "pubdate": "20140107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jump-starting-stronger-authentication-directLink-5-i-2151.mp3", "title": "FIDO\"s 2014 Authentication Agenda", "pubdate": "20140103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2014-cybersecurity-forecast-directLink-6-i-2144.mp3", "title": "2014 Cybersecurity Forecast", "pubdate": "20140103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-resolutions-for-security-pros-directLink-7-i-2140.mp3", "title": "5 Resolutions for IT Security Pros", "pubdate": "20131230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reworking-frameworks-privacy-approach-directLink-5-i-2145.mp3", "title": "Reworking Framework\"s Privacy Approach", "pubdate": "20131227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-way-to-manage-risk-directLink-4-i-2143.mp3", "title": "Improving the Way to Manage Risk", "pubdate": "20131226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/target-breach-watershed-event-directLink-10-i-2139.mp3", "title": "Target Breach: A Watershed Event", "pubdate": "20131223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enisa-on-new-threat-landscape-directLink-9-i-2135.mp3", "title": "ENISA on the New Threat Landscape", "pubdate": "20131220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emv-outlook-for-2014-directLink-8-i-2136.mp3", "title": "EMV: The Outlook for 2014", "pubdate": "20131218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unsecure-ids-lead-to-fraud-directLink-5-i-2132.mp3", "title": "Fighting Fraud With ID Management", "pubdate": "20131216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nccoe-to-address-iam-risks-directLink-7-i-2133.mp3", "title": "Timely Advice on IAM, Asset Management", "pubdate": "20131216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-flaw-in-va-software-was-found-directLink-i-2129.mp3", "title": "How a Flaw in VA Software Was Found", "pubdate": "20131211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-role-based-security-training-directLink-i-2128.mp3", "title": "Creating Role-Based Security Training", "pubdate": "20131210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bill-stewart-directLink-i-2126.mp3", "title": "How Will NIST Framework Affect Banks?", "pubdate": "20131209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/major-password-breach-lessons-learned-directLink-i-2125.mp3", "title": "Major Password Breach: Lessons Learned", "pubdate": "20131206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/questioning-culture-surveillance-directLink-i-2117.mp3", "title": "Questioning the Culture of Surveillance", "pubdate": "20131202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patent-reform-legislative-update-directLink-i-2121.mp3", "title": "Push for Patent Reform Advances", "pubdate": "20131127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-10-top-tips-directLink-i-2118.mp3", "title": "Cloud Security: Top 10 Tips", "pubdate": "20131127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-balancing-act-for-hies-directLink-i-2120.mp3", "title": "Authentication: Balancing Act for HIEs", "pubdate": "20131127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/somers-directLink-i-2116.mp3", "title": "How to Fight Cross-Border ATM Fraud", "pubdate": "20131125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/accessing-big-data-for-health-research-directLink-i-2114.mp3", "title": "Accessing Big Data for Health Research", "pubdate": "20131122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/consumer-advocate-shut-obamacare-site-directLink-i-2113.mp3", "title": "Consumer Advocate: Shut Obamacare Site", "pubdate": "20131121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-see-repute-at-risk-from-breaches-directLink-i-2111.mp3", "title": "How to Minimize Supply Chain Risks", "pubdate": "20131119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-encryption-tools-for-cloud-directLink-i-2109.mp3", "title": "New Encryption Tools for the Cloud", "pubdate": "20131118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prosecutor-id-theft-top-fraud-concern-directLink-i-2112.mp3", "title": "Prosecutor: ID Theft Top Fraud Concern", "pubdate": "20131118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-valuable-cybersecurity-metrics-directLink-i-2106.mp3", "title": "Creating Valuable Cybersecurity Metrics", "pubdate": "20131113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/governing-internet-things-directLink-i-2103.mp3", "title": "Governing the \"Internet of Things\"", "pubdate": "20131111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-insurance-exchange-works-directLink-i-2102.mp3", "title": "State Insurance Exchange: Why It Works", "pubdate": "20131108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-update-focus-on-third-party-risks-directLink-i-2101.mp3", "title": "PCI Update: Focus on Third-Party Risks", "pubdate": "20131107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-creates-cyber-national-guard-directLink-i-2099.mp3", "title": "State Creates \"Cyber National Guard\"", "pubdate": "20131107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-lessons-learned-directLink-i-2083.mp3", "title": "Breach Response: Lessons Learned", "pubdate": "20131106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/todays-greatest-online-payment-risk-directLink-i-2096.mp3", "title": "Today\"s Greatest Online Payment Risk", "pubdate": "20131105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/contain-mobile-security-threats-directLink-i-2095.mp3", "title": "Contain Mobile Security Threats", "pubdate": "20131105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-fis-talk-cybersecurity-directLink-i-2093.mp3", "title": "Obama, FIs Talk Cybersecurity", "pubdate": "20131101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-launches-single-identity-pilot-directLink-i-2092.mp3", "title": "State Launches Single Identity Pilot", "pubdate": "20131101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-unintentional-insider-threat-directLink-i-2091.mp3", "title": "What is Unintentional Insider Threat?", "pubdate": "20131031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-what-to-expect-next-directLink-i-2090.mp3", "title": "DDoS: What to Expect Next", "pubdate": "20131030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasonable-security-changing-rules-directLink-i-2089.mp3", "title": "Reasonable Security: Changing the Rules", "pubdate": "20131028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/synthetic-ids-understanding-threat-directLink-i-2087.mp3", "title": "Synthetic IDs: Understanding the Threat", "pubdate": "20131025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prosecutor-offers-fraud-fighting-advice-directLink-i-2086.mp3", "title": "Prosecutor Offers Fraud-Fighting Advice", "pubdate": "20131024" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-defensible-breach-response-directLink-i-2085.mp3", "title": "Building a \"Defensible\" Breach Response", "pubdate": "20131023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-mitigation-directLink-i-2081.mp3", "title": "Continuous Monitoring and Mitigation", "pubdate": "20131023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-balance-risk-tech-obligations-directLink-i-2084.mp3", "title": "CISOs Balance Risk, Tech Obligations", "pubdate": "20131022" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-fight-insider-fraud-directLink-i-2080.mp3", "title": "How to Fight Insider Fraud", "pubdate": "20131017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-ehrs-in-healthcare-fraud-directLink-i-2077.mp3", "title": "The Role of EHRs in Healthcare Fraud", "pubdate": "20131015" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/helping-businesses-cybersecurity-directLink-i-2069.mp3", "title": "Helping Businesses With Cybersecurity", "pubdate": "20131014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/finding-new-ways-to-fight-fraud-directLink-i-2076.mp3", "title": "Finding New Ways to Fight Fraud", "pubdate": "20131011" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-trade-on-collision-course-directLink-i-2071.mp3", "title": "Cybersecurity, Trade on Collision Course", "pubdate": "20131010" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-fighting-call-center-fraud-directLink-i-2074.mp3", "title": "Insights on Fighting Call Center Fraud", "pubdate": "20131009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/purdues-spafford-on-educating-executives-directLink-i-2072.mp3", "title": "Purdue\"s Spafford on Educating Executives", "pubdate": "20131009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-fixing-authentication-directLink-i-2073.mp3", "title": "Gartner\"s Litan on Fixing Authentication", "pubdate": "20131007" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/attackers-for-hire-troubling-trend-directLink-i-2070.mp3", "title": "Attackers-for-Hire: A Troubling Trend", "pubdate": "20131004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tracking-fraud-lifecycle-directLink-i-2048.mp3", "title": "Tracking the Fraud Lifecycle", "pubdate": "20131002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-updates-address-retail-breaches-directLink-i-2067.mp3", "title": "PCI Updates Address Retail Breaches", "pubdate": "20130930" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ceos-as-privacy-leaders-directLink-i-2065.mp3", "title": "CEOs as Privacy Leaders", "pubdate": "20130925" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pitfalls-professionalizing-infosec-directLink-i-2064.mp3", "title": "Pitfalls of Professionalizing InfoSec", "pubdate": "20130924" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/smus-new-cybersecurity-mission-directLink-i-2060.mp3", "title": "SMU\"s New Cybersecurity Mission", "pubdate": "20130918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-whats-overlooked-directLink-i-2058.mp3", "title": "Business Continuity: What\"s Overlooked?", "pubdate": "20130911" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expanding-continuous-diagnostic-effort-directLink-i-2056.mp3", "title": "Expanding Continuous Diagnostic Effort", "pubdate": "20130910" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/implementing-continuous-monitoring-plan-directLink-i-2053.mp3", "title": "Implementing Continuous Monitoring Plan", "pubdate": "20130905" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-nist-guidance-for-hipaa-compliance-directLink-i-2052.mp3", "title": "Using NIST Guidance for HIPAA Compliance", "pubdate": "20130904" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-federal-game-plan-directLink-i-2045.mp3", "title": "Continuous Monitoring: Federal Game Plan", "pubdate": "20130903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-fraudsters-edge-directLink-i-2050.mp3", "title": "Account Takeover: The Fraudsters\" Edge", "pubdate": "20130903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/call-center-fraud-succeeds-directLink-i-2049.mp3", "title": "Why Call Center Fraud Succeeds", "pubdate": "20130830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warning-new-ddos-fraud-link-directLink-i-2044.mp3", "title": "Warning: A New DDoS-Fraud Link", "pubdate": "20130826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/impact-big-data-on-privacy-policy-directLink-i-2041.mp3", "title": "Impact of Big Data on Privacy Policy", "pubdate": "20130822" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facing-advanced-threat-directLink-i-2039.mp3", "title": "Facing the Advanced Threat", "pubdate": "20130820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-30-draft-guidelines-released-directLink-i-2034.mp3", "title": "PCI 3.0 Draft Guidelines Released", "pubdate": "20130819" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-insurance-exchange-deadline-nears-directLink-i-2037.mp3", "title": "Health Insurance Exchange Deadline Nears", "pubdate": "20130819" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-be-trusted-to-protect-govt-it-directLink-i-2036.mp3", "title": "Can DHS Be Trusted to Protect Gov\"t IT?", "pubdate": "20130816" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confronting-iran-as-cyber-adversary-directLink-i-2035.mp3", "title": "Confronting Iran as a Cyber-Adversary", "pubdate": "20130815" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-assessing-ddos-lessons-learned-directLink-i-2033.mp3", "title": "Re-Assessing DDoS: The Lessons Learned", "pubdate": "20130814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-sharing-whats-missing-directLink-i-2028.mp3", "title": "Information Sharing: What\"s Missing?", "pubdate": "20130812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exit-interview-dhss-bruce-mcconnell-directLink-i-2027.mp3", "title": "Exit Interview: DHS\"s Bruce McConnell", "pubdate": "20130812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-mobile-payments-risks-directLink-i-2026.mp3", "title": "Addressing Mobile Payments Risks", "pubdate": "20130809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/is-my-security-program-protecting-my-business-directLink-i-2018.mp3", "title": "\"Is My Security Program Protecting My Business?\"", "pubdate": "20130809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/diplomat-security-openness-co-exist-directLink-i-2025.mp3", "title": "Diplomat: Security, Openness Can Co-Exist", "pubdate": "20130806" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hotlines-new-use-avert-cyber-disaster-directLink-i-2024.mp3", "title": "Hotline\"s New Use: Avert Cyber Disaster", "pubdate": "20130802" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/indictments-new-clues-into-fraud-schemes-directLink-i-2021.mp3", "title": "Indictments: New Clues Into Fraud Schemes", "pubdate": "20130731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-tips-for-managing-social-media-directLink-i-2017.mp3", "title": "Legal Tips for Managing Social Media", "pubdate": "20130724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exchanging-health-data-during-disasters-directLink-i-2015.mp3", "title": "Exchanging Health Data During Disasters", "pubdate": "20130722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-owns-your-social-media-assets-directLink-i-2014.mp3", "title": "Who Owns Your Social Media Assets?", "pubdate": "20130719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bill-endorses-obama-cybersecurity-plans-directLink-i-2013.mp3", "title": "Bill Endorses Obama Cybersecurity Plans", "pubdate": "20130718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/path-to-accelerated-breach-response-directLink-i-2011.mp3", "title": "The Path to Accelerated Breach Response", "pubdate": "20130718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-readies-incident-coordination-guide-directLink-i-2010.mp3", "title": "NIST Readies Incident Coordination Guide", "pubdate": "20130712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insurance-exchange-tackles-security-directLink-i-2008.mp3", "title": "An Insurance Exchange Tackles Security", "pubdate": "20130710" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/man-behind-cybersecurity-framework-directLink-i-2006.mp3", "title": "Man Behind the Cybersecurity Framework", "pubdate": "20130708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-cybersecurity-game-changers-directLink-i-2003.mp3", "title": "3 Cybersecurity Game Changers", "pubdate": "20130708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-borderless-breach-law-directLink-i-2005.mp3", "title": "The Case for a \"Borderless\" Breach Law", "pubdate": "20130705" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-for-cyber-patent-disputes-directLink-i-2002.mp3", "title": "Preparing for Cyber Patent Disputes", "pubdate": "20130701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-info-shared-even-without-cispa-directLink-i-2000.mp3", "title": "Threat Info Shared Even Without CISPA", "pubdate": "20130628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intels-harkins-on-mobile-security-directLink-i-1996.mp3", "title": "Intel\"s Harkins on Mobile Security", "pubdate": "20130627" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/laying-foundation-for-next-gen-workforce-directLink-i-1994.mp3", "title": "Laying Foundation for Next-Gen Workforce", "pubdate": "20130626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expanding-global-threat-data-sharing-directLink-i-1995.mp3", "title": "Expanding Global Threat Data Sharing", "pubdate": "20130626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-security-corporate-data-directLink-i-1987.mp3", "title": "Mobile Security of Corporate Data", "pubdate": "20130626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cias-ex-ciso-on-preventing-leaks-directLink-i-1992.mp3", "title": "CIA\"s Ex-CISO on Preventing Leaks", "pubdate": "20130621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nsa-leak-lessons-for-cisos-cpos-directLink-i-1991.mp3", "title": "NSA Leak: Lessons for CISOs, CPOs", "pubdate": "20130620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-on-preparing-for-ipv6-directLink-i-1989.mp3", "title": "Tips on Preparing for IPv6", "pubdate": "20130619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dlp-engage-end-user-directLink-i-1988.mp3", "title": "DLP: Engage the End-User", "pubdate": "20130619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defining-next-generation-security-directLink-i-1984.mp3", "title": "Defining Next-Generation Security", "pubdate": "20130619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-advanced-threats-directLink-i-1983.mp3", "title": "Defending Against Advanced Threats", "pubdate": "20130619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-access-intelligence-directLink-i-1986.mp3", "title": "The Power of Access Intelligence", "pubdate": "20130619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/where-s-in-grc-directLink-i-1985.mp3", "title": "Where Is the \\\"S\\\" in GRC?", "pubdate": "20130619" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dods-influence-on-smart-phone-security-directLink-i-1977.mp3", "title": "DoD\"s Influence on Smart Phone Security", "pubdate": "20130618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-grc-agenda-directLink-i-1981.mp3", "title": "The New GRC Agenda", "pubdate": "20130618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-leverage-threat-intelligence-directLink-i-1982.mp3", "title": "How to Leverage Threat Intelligence", "pubdate": "20130618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-state-sponsored-attacks-directLink-i-1980.mp3", "title": "Responding to State-Sponsored Attacks", "pubdate": "20130618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-gen-firewall-security-directLink-i-1978.mp3", "title": "Next-Gen Firewall Security", "pubdate": "20130618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/australia-mulls-data-breach-notice-law-directLink-i-1976.mp3", "title": "Australia Mulls Data Breach Notice Law", "pubdate": "20130614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-look-at-mobile-security-directLink-i-1975.mp3", "title": "A New Look at Mobile Security", "pubdate": "20130614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-breach-response-directLink-i-1974.mp3", "title": "The Case for Breach Response", "pubdate": "20130614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-view-ddos-directLink-i-1973.mp3", "title": "The Global View of DDoS", "pubdate": "20130614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adversarial-view-security-directLink-i-1972.mp3", "title": "An Adversarial View of Security", "pubdate": "20130614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-application-layer-attacks-directLink-i-1970.mp3", "title": "The Rise of Application-Layer Attacks", "pubdate": "20130613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-what-to-do-directLink-i-1971.mp3", "title": "Breach Response: What Not to Do", "pubdate": "20130612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-malware-telling-us-directLink-i-1969.mp3", "title": "What Malware is Telling Us", "pubdate": "20130612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/usc-launches-masters-in-cybersecurity-directLink-i-1956.mp3", "title": "USC Launches Master\"s in Cybersecurity", "pubdate": "20130612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/regulations-impact-on-data-breach-costs-directLink-i-1953.mp3", "title": "Regulations\" Impact on Data Breach Costs", "pubdate": "20130611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cold-facts-about-web-app-security-directLink-i-1955.mp3", "title": "Cold Facts About Web App Security", "pubdate": "20130611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-virtual-supply-chain-directLink-i-1947.mp3", "title": "Protecting the Virtual Supply Chain", "pubdate": "20130611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-impact-on-brand-directLink-i-1954.mp3", "title": "DDoS Attacks: The Impact on Brand", "pubdate": "20130610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-analytics-will-change-security-directLink-i-1952.mp3", "title": "How Analytics Will Change Security", "pubdate": "20130607" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-privatization-trojans-directLink-i-1951.mp3", "title": "Phishing: The Privatization of Trojans", "pubdate": "20130606" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-coviello-how-to-use-big-data-directLink-i-1950.mp3", "title": "RSA\"s Coviello: How to Use Big Data", "pubdate": "20130605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-security-lessons-from-asia-directLink-i-1948.mp3", "title": "Mobile Security: Lessons from Asia", "pubdate": "20130604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/americans-dont-fret-over-cybersecurity-directLink-i-1945.mp3", "title": "Americans Don\"t Fret Over Cybersecurity", "pubdate": "20130604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/questioning-legality-hack-back-directLink-i-1936.mp3", "title": "Questioning the Legality of Hack-Back", "pubdate": "20130603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-threats-outpace-pc-attacks-directLink-i-1940.mp3", "title": "Mobile Threats Outpace PC Attacks", "pubdate": "20130529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keys-to-successful-info-sharing-directLink-i-1935.mp3", "title": "Keys to Successful Info Sharing", "pubdate": "20130524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeted-cyber-attacks-how-to-respond-directLink-i-1933.mp3", "title": "Targeted Cyber-Attacks: How to Respond", "pubdate": "20130523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/logs-paint-picture-menacing-insider-directLink-i-1929.mp3", "title": "Logs Paint Picture of Menacing Insider", "pubdate": "20130521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/we-expect-more-atm-cash-outs-directLink-i-1920.mp3", "title": "Why We Can Expect More ATM Cash-Outs", "pubdate": "20130514" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-hovering-in-cloud-directLink-i-1921.mp3", "title": "Insider Threat Hovering in the Cloud", "pubdate": "20130513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-arrests-a-victory-for-us-directLink-i-1919.mp3", "title": "Fraud Arrests \"A Victory for Us\"", "pubdate": "20130511" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avivah-litan-on-bank-cyberheist-directLink-i-1918.mp3", "title": "Avivah Litan on Bank Cyberheist", "pubdate": "20130510" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-insider-threat-from-cloud-directLink-i-1917.mp3", "title": "Mitigating Insider Threat From the Cloud", "pubdate": "20130509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opusa-sizing-up-threat-directLink-i-1914.mp3", "title": "OpUSA: Sizing Up the Threat", "pubdate": "20130508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-ddos-in-risk-assessments-directLink-i-1911.mp3", "title": "Addressing DDoS in Risk Assessments", "pubdate": "20130503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-big-data-to-fight-phishing-directLink-i-1909.mp3", "title": "Using Big Data to Fight Phishing", "pubdate": "20130501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-unveils-security-privacy-controls-directLink-i-1907.mp3", "title": "NIST Unveils Security, Privacy Controls", "pubdate": "20130501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mandiant-on-nation-state-threats-directLink-i-1906.mp3", "title": "Mandiant on Nation-State Threats", "pubdate": "20130430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spamhaus-ddos-attack-called-preventable-directLink-i-1905.mp3", "title": "Spamhaus DDoS Attack Called Preventable", "pubdate": "20130430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/growing-global-security-community-directLink-i-1903.mp3", "title": "Growing the Global Security Community", "pubdate": "20130430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/240-ideas-to-secure-critical-it-directLink-i-1900.mp3", "title": "240 Ideas to Secure Critical IT", "pubdate": "20130429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/utah-breach-potential-costs-directLink-i-1901.mp3", "title": "Utah Breach: The Potential Costs", "pubdate": "20130429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-attacks-new-maturity-directLink-i-1898.mp3", "title": "Cyber-Attacks: The New Maturity", "pubdate": "20130425" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-skills-crisis-directLink-i-1899.mp3", "title": "Addressing the Skills Crisis", "pubdate": "20130425" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-era-third-party-risks-directLink-i-1895.mp3", "title": "The New Era of Third-Party Risks", "pubdate": "20130425" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-across-borders-directLink-i-1893.mp3", "title": "Privacy Across Borders", "pubdate": "20130424" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-are-no-big-deal-directLink-i-1894.mp3", "title": "Why DDoS Attacks Are \"No Big Deal\"", "pubdate": "20130424" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/professionalizing-security-field-directLink-i-1891.mp3", "title": "Professionalizing the IT Security Field", "pubdate": "20130423" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-report-ddos-broad-threat-directLink-i-1892.mp3", "title": "Verizon Report: DDoS a Broad Threat", "pubdate": "20130423" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enisa-aims-for-longer-stronger-role-directLink-i-1890.mp3", "title": "ENISA Aims for Longer, Stronger Role", "pubdate": "20130422" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boston-lockdown-business-continuity-directLink-i-1889.mp3", "title": "Boston Lockdown: Business Continuity", "pubdate": "20130419" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-breach-credit-monitoring-strategies-directLink-i-1884.mp3", "title": "Post-Breach Credit Monitoring Strategies", "pubdate": "20130418" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-new-hires-impede-future-security-directLink-i-1883.mp3", "title": "Will New Hires Impede Future Security?", "pubdate": "20130416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-new-focus-directLink-i-1882.mp3", "title": "Medical Device Security: A New Focus", "pubdate": "20130416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-careers-breaking-barriers-directLink-i-1880.mp3", "title": "Security Careers: Breaking Barriers", "pubdate": "20130410" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-data-to-cloud-reduce-risk-directLink-i-1878.mp3", "title": "Can Moving Data to Cloud Reduce Risk?", "pubdate": "20130409" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-goes-mobile-directLink-i-1877.mp3", "title": "Spear Phishing Goes Mobile", "pubdate": "20130408" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bits-improving-e-mail-authentication-directLink-i-1876.mp3", "title": "BITS: Improving E-mail Authentication", "pubdate": "20130404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-as-chief-privacy-officer-directLink-i-1875.mp3", "title": "CISO as Chief Privacy Officer", "pubdate": "20130402" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/6-ways-to-reform-fisma-without-new-law-directLink-i-1872.mp3", "title": "6 Ways to Reform FISMA Without New Law", "pubdate": "20130401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/diplomacy-pays-off-safer-networks-directLink-i-1871.mp3", "title": "Diplomacy Pays Off with Safer IT Networks", "pubdate": "20130329" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/old-cyberthreats-pose-greater-dangers-directLink-i-1865.mp3", "title": "Old Cyberthreats Pose Greater Dangers", "pubdate": "20130327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-how-to-use-it-directLink-i-1868.mp3", "title": "Big Data: How to Use it", "pubdate": "20130327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/predictive-analysis-in-cyberdefense-directLink-i-1864.mp3", "title": "Predictive Analysis in Cyberdefense", "pubdate": "20130326" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-breaches-teach-us-directLink-i-1867.mp3", "title": "What Breaches Can Teach Us", "pubdate": "20130326" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-cost-failed-trust-directLink-i-1863.mp3", "title": "What\"s the Cost of Failed Trust?", "pubdate": "20130326" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-motive-behind-south-korean-attack-directLink-i-1862.mp3", "title": "Analyzing Motive Behind South Korean Attack", "pubdate": "20130322" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/venture-capitals-role-in-security-directLink-i-1859.mp3", "title": "Venture Capital\"s Role in Security", "pubdate": "20130318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-the-new-normal-directLink-i-1887.mp3", "title": "DDoS: \"The New Normal\"", "pubdate": "20130311" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-evolving-threats-solutions-directLink-i-1840.mp3", "title": "DDoS: Evolving Threats, Solutions", "pubdate": "20130311" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/developing-information-superiority-directLink-i-1843.mp3", "title": "Developing Information Superiority", "pubdate": "20130307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-phishing-attacks-are-evolving-directLink-i-1849.mp3", "title": "How Phishing Attacks Are Evolving", "pubdate": "20130307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-ddos-attacks-directLink-i-1845.mp3", "title": "Evolution of DDoS Attacks", "pubdate": "20130307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-access-control-to-managers-directLink-i-1841.mp3", "title": "Giving Access Control to Managers", "pubdate": "20130306" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-internal-authentication-directLink-i-1835.mp3", "title": "Improving Internal Authentication", "pubdate": "20130306" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-audits-status-report-directLink-i-1838.mp3", "title": "HIPAA Audits: A Status Report", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/report-28-breaches-lead-to-fraud-directLink-i-1834.mp3", "title": "Report: 28% of Breaches Lead to Fraud", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/formalizing-cyber-physical-security-directLink-i-1832.mp3", "title": "Formalizing Cyber-Physical Security", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-new-perimeter-directLink-i-1842.mp3", "title": "Data: The New Perimeter", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-attacks-remain-no-1-risk-directLink-i-1836.mp3", "title": "Phishing Attacks Remain No. 1 Risk", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-intelligence-to-fight-apts-directLink-i-1837.mp3", "title": "Using Intelligence to Fight APTs", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-order-private-sectors-role-directLink-i-1831.mp3", "title": "Executive Order: Private Sector\"s Role", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-analytics-to-fight-fraud-directLink-i-1826.mp3", "title": "Using Analytics to Fight Fraud", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-cloud-affects-authentication-directLink-i-1823.mp3", "title": "How the Cloud Affects Authentication", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/masking-test-data-in-cloud-directLink-i-1822.mp3", "title": "Masking Test Data in the Cloud", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-mobile-device-management-directLink-i-1818.mp3", "title": "Beyond Mobile Device Management", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-directLink-i-1812.mp3", "title": "Fighting Fraud", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/public-cloud-services-security-issues-directLink-i-1825.mp3", "title": "Public Cloud Services: Security Issues", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/layered-security-for-mobile-apps-directLink-i-1824.mp3", "title": "Layered Security for Mobile Apps", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-mobile-app-security-key-issues-directLink-i-1821.mp3", "title": "Banking Mobile App Security: Key Issues", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-risk-profiling-directLink-i-1814.mp3", "title": "Automating Risk Profiling", "pubdate": "20130305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disrupting-ddos-directLink-i-1833.mp3", "title": "Disrupting DDoS", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-beyond-perimeter-directLink-i-1830.mp3", "title": "Security Beyond the Perimeter", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-securing-mobile-apps-directLink-i-1829.mp3", "title": "Tips for Securing Mobile Apps", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apt-protecting-against-fraud-directLink-i-1828.mp3", "title": "APT: Protecting Against Fraud", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-access-control-byod-directLink-i-1827.mp3", "title": "Network Access Control and BYOD", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simulating-cyberattacks-directLink-i-1819.mp3", "title": "Simulating Cyberattacks", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-governance-directLink-i-1817.mp3", "title": "Automating Governance", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/more-investment-needed-for-app-security-directLink-i-1816.mp3", "title": "More Investment Needed for App Security", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-too-much-data-directLink-i-1815.mp3", "title": "Overcoming Too Much Data", "pubdate": "20130304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/daniel-sees-path-to-new-infosec-law-directLink-i-1806.mp3", "title": "Daniel Sees Path to New Infosec Law", "pubdate": "20130301" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-data-for-id-management-directLink-i-1811.mp3", "title": "Using Data for ID Management", "pubdate": "20130301" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciphercloud-unveils-new-offering-directLink-i-1813.mp3", "title": "CipherCloud Unveils New Offering", "pubdate": "20130228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/embracing-byod-trend-directLink-i-1810.mp3", "title": "Embracing the BYOD Trend", "pubdate": "20130228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-omnibus-compliance-plan-directLink-i-1809.mp3", "title": "HIPAA Omnibus: A Compliance Plan", "pubdate": "20130227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-call-center-fraud-directLink-i-1807.mp3", "title": "Tackling Call Center Fraud", "pubdate": "20130227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-identity-risks-directLink-i-1808.mp3", "title": "Managing Identity Risks", "pubdate": "20130227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/staffing-crisis-what-to-do-about-it-directLink-i-1805.mp3", "title": "Staffing Crisis: What to Do About it", "pubdate": "20130227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-lessons-from-patco-fraud-case-directLink-i-1803.mp3", "title": "Legal Lessons from PATCO Fraud Case", "pubdate": "20130225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nists-ron-ross-on-risk-mgt-framework-directLink-i-1802.mp3", "title": "NIST\"s Ron Ross on Risk Mgt. Framework", "pubdate": "20130223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/psychology-risk-directLink-i-1794.mp3", "title": "The Psychology of Risk", "pubdate": "20130221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-for-fraud-detection-directLink-i-1800.mp3", "title": "Big Data for Fraud Detection", "pubdate": "20130221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-to-expect-at-rsa-2013-directLink-i-1778.mp3", "title": "What to Expect at RSA 2013", "pubdate": "20130220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multi-channel-fraud-defense-plan-directLink-i-1799.mp3", "title": "Multi-Channel Fraud: A Defense Plan", "pubdate": "20130220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banks-benefit-from-new-cyber-bill-directLink-i-1798.mp3", "title": "Why Banks Benefit from New Cyber Bill", "pubdate": "20130220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-threats-to-mobile-workers-directLink-i-1790.mp3", "title": "Top Threats to Mobile Workers", "pubdate": "20130220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-in-action-directLink-i-1797.mp3", "title": "Threat Intelligence in Action", "pubdate": "20130220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facebook-hack-what-breach-tells-us-directLink-i-1796.mp3", "title": "Facebook Hack: What the Breach Tells Us", "pubdate": "20130219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/move-to-data-centric-security-directLink-i-1791.mp3", "title": "The Move to Data-Centric Security", "pubdate": "20130215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/examining-new-eu-cybersec-directive-directLink-i-1793.mp3", "title": "Examining the New EU Cybersec Directive", "pubdate": "20130215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fdic-explains-social-media-guidance-directLink-i-1789.mp3", "title": "FDIC Explains Social Media Guidance", "pubdate": "20130214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-lessons-learned-directLink-i-1788.mp3", "title": "DDoS Attacks: Lessons Learned", "pubdate": "20130213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-secure-network-directLink-i-1785.mp3", "title": "BYOD: Secure the Network", "pubdate": "20130212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-data-breach-response-tips-directLink-i-1775.mp3", "title": "Health Data Breach Response Tips", "pubdate": "20130211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-its-skills-crisis-directLink-i-1783.mp3", "title": "Cybersecurity: It\"s a Skills Crisis", "pubdate": "20130208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-council-issues-cloud-guidance-directLink-i-1784.mp3", "title": "PCI Council Issues Cloud Guidance", "pubdate": "20130207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2013-data-protection-agenda-directLink-i-1780.mp3", "title": "2013 Data Protection Agenda", "pubdate": "20130206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-are-attacks-really-over-directLink-i-1782.mp3", "title": "DDoS: Are Attacks Really Over?", "pubdate": "20130205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-omnibus-more-breach-notices-directLink-i-1779.mp3", "title": "HIPAA Omnibus: More Breach Notices?", "pubdate": "20130204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-data-via-containerization-directLink-i-1777.mp3", "title": "Securing Data Via Containerization", "pubdate": "20130201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-big-data-used-for-research-directLink-i-1773.mp3", "title": "Protecting Big Data Used for Research", "pubdate": "20130126" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hhs-official-explains-hipaa-omnibus-directLink-i-1772.mp3", "title": "HHS Official Explains HIPAA Omnibus", "pubdate": "20130125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-cloud-directLink-i-1771.mp3", "title": "Continuous Monitoring and the Cloud", "pubdate": "20130125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-malware-threats-2013-directLink-i-1770.mp3", "title": "Top Malware Threats of 2013", "pubdate": "20130124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-reveal-top-threat-worries-directLink-i-1769.mp3", "title": "CISOs Reveal Top Threat Worries", "pubdate": "20130123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/linking-cyber-physical-threat-data-directLink-i-1768.mp3", "title": "Linking Cyber, Physical Threat Data", "pubdate": "20130122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enisa-identifies-top-cyberthreats-directLink-i-1766.mp3", "title": "ENISA Identifies Top Cyberthreats", "pubdate": "20130122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/arguing-against-voluntary-standards-directLink-i-1767.mp3", "title": "Arguing Against Voluntary Standards", "pubdate": "20130121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/maturing-biometrics-on-smart-phones-directLink-i-1764.mp3", "title": "Maturing of Biometrics on Smart Phones", "pubdate": "20130116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-incident-response-directLink-i-1761.mp3", "title": "The Evolution of Incident Response", "pubdate": "20130114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vanroekel-on-infosec-sequestration-directLink-i-1763.mp3", "title": "VanRoekel on Infosec and Sequestration", "pubdate": "20130114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-10-screening-trends-for-2013-directLink-i-1760.mp3", "title": "Top 10 Screening Trends for 2013", "pubdate": "20130111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-2013-top-trends-directLink-i-1759.mp3", "title": "ID Theft: 2013 Top Trends", "pubdate": "20130110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/educational-value-competition-directLink-i-1712.mp3", "title": "Educational Value of Competition", "pubdate": "20130109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-authentication-challenge-directLink-i-1755.mp3", "title": "Tackling the Authentication Challenge", "pubdate": "20130108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tom-ridge-on-dhss-security-role-directLink-i-1757.mp3", "title": "Tom Ridge on DHS\"s IT Security Role", "pubdate": "20130108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chicago-initiates-cloud-strategy-directLink-i-1754.mp3", "title": "Chicago Initiates a Cloud Strategy", "pubdate": "20130104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hanging-tough-intl-privacy-regs-directLink-i-1752.mp3", "title": "Hanging Tough with Int\"l Privacy Regs", "pubdate": "20130104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legislation-to-watch-in-2013-directLink-i-1751.mp3", "title": "Legislation to Watch in 2013", "pubdate": "20130103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-2013-outlook-directLink-i-1753.mp3", "title": "Account Takeover: The 2013 Outlook", "pubdate": "20130103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-say-yes-to-byod-directLink-i-1750.mp3", "title": "How to Say \"Yes\" to BYOD", "pubdate": "20130102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-prospects-for-new-infosec-law-directLink-i-1746.mp3", "title": "Assessing Prospects for New InfoSec Law", "pubdate": "20121231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012s-top-breaches-lessons-learned-directLink-i-1749.mp3", "title": "2012\"s Top Breaches & Lessons Learned", "pubdate": "20121227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-security-stall-technology-adoption-directLink-i-1747.mp3", "title": "Does Security Stall Technology Adoption?", "pubdate": "20121227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-address-securitys-weakest-link-directLink-i-1745.mp3", "title": "How to Address Security\"s Weakest Link", "pubdate": "20121224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/organizations-fail-to-encrypt-directLink-i-1740.mp3", "title": "Why Organizations Fail to Encrypt", "pubdate": "20121222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/langevin-treaty-stifles-internet-freedom-directLink-i-1744.mp3", "title": "Langevin: Treaty Stifles Internet Freedom", "pubdate": "20121221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-3-security-priorities-for-2013-directLink-i-1743.mp3", "title": "Top 3 Security Priorities for 2013", "pubdate": "20121221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-reasonable-security-directLink-i-1739.mp3", "title": "What is \"Reasonable Security?\"", "pubdate": "20121221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/its-time-for-next-gen-firewall-directLink-i-1742.mp3", "title": "Why It\"s Time for Next-Gen Firewall", "pubdate": "20121220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2013-mobile-security-payments-outlook-directLink-i-1741.mp3", "title": "2013 Mobile Security, Payments Outlook", "pubdate": "20121219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-breach-led-to-change-in-culture-directLink-i-1738.mp3", "title": "How a Breach Led to Change in Culture", "pubdate": "20121218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-enforcer-reveals-audit-timeline-directLink-i-1736.mp3", "title": "HIPAA Enforcer Reveals Audit Timeline", "pubdate": "20121215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banks-must-brace-for-blitzkrieg-attacks-directLink-i-1735.mp3", "title": "Banks Must Brace for \"Blitzkrieg\" Attacks", "pubdate": "20121214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-protection-us-falls-short-directLink-i-1732.mp3", "title": "Privacy Protection: U.S. Falls Short", "pubdate": "20121214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-continuous-monitoring-culture-directLink-i-1733.mp3", "title": "Creating a Continuous Monitoring Culture", "pubdate": "20121212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-merits-hack-back-strategy-directLink-i-1729.mp3", "title": "Legal Merits of \"Hack Back\" Strategy", "pubdate": "20121211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/paying-more-mind-to-malicious-insider-directLink-i-1731.mp3", "title": "Paying More Mind to Malicious Insider", "pubdate": "20121210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-trojan-exploits-mobile-channel-directLink-i-1730.mp3", "title": "New Trojan Exploits Mobile Channel", "pubdate": "20121207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-vs-security-dialogue-directLink-i-1727.mp3", "title": "Privacy vs. Security: A Dialogue", "pubdate": "20121205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-creating-byod-policy-directLink-i-1725.mp3", "title": "Tips for Creating a BYOD Policy", "pubdate": "20121127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-forensics-investigation-directLink-i-1723.mp3", "title": "Inside a Forensics Investigation", "pubdate": "20121121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-ddos-attacks-on-israeli-sites-directLink-i-1721.mp3", "title": "Assessing DDoS Attacks on Israeli Sites", "pubdate": "20121120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/surviving-sandy-important-lessons-directLink-i-1722.mp3", "title": "Surviving Sandy: Important Lessons", "pubdate": "20121120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-4-cyberthreats-2013-directLink-i-1720.mp3", "title": "Top 4 Cyberthreats of 2013", "pubdate": "20121116" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/storm-offers-disaster-planning-lessons-directLink-i-1716.mp3", "title": "Storm Offers Disaster Planning Lessons", "pubdate": "20121113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-siem-to-cloud-directLink-i-1717.mp3", "title": "Moving SIEM to the Cloud", "pubdate": "20121113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gathering-facts-directLink-i-1718.mp3", "title": "Incident Response: Gathering the Facts", "pubdate": "20121113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-reassess-your-strategy-directLink-i-1715.mp3", "title": "Social Media: Reassess Your Strategy", "pubdate": "20121110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-ids-patient-safety-directLink-i-1714.mp3", "title": "Medical Device IDs and Patient Safety", "pubdate": "20121109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gathering-facts-directLink-i-1713.mp3", "title": "Incident Response: Gathering the Facts", "pubdate": "20121109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-secure-are-wares-you-buy-directLink-i-1711.mp3", "title": "How Secure are the IT Wares You Buy?", "pubdate": "20121106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hies-help-in-disasters-directLink-i-1710.mp3", "title": "HIEs: Help in Disasters?", "pubdate": "20121102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irene-prepares-state-to-confront-sandy-directLink-i-1708.mp3", "title": "Irene Prepares State to Confront Sandy", "pubdate": "20121030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/storm-prep-key-to-recovery-directLink-i-1707.mp3", "title": "Storm Prep Key to Recovery", "pubdate": "20121030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hurricane-sandy-triple-threat-disaster-directLink-i-1706.mp3", "title": "Hurricane Sandy: Triple-Threat Disaster", "pubdate": "20121030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-protecting-genomic-data-directLink-i-1704.mp3", "title": "Insights on Protecting Genomic Data", "pubdate": "20121026" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-first-signs-fraud-directLink-i-1705.mp3", "title": "DDoS Attacks: First Signs of Fraud?", "pubdate": "20121026" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breaches-small-incidents-add-up-to-greatest-losses-directLink-i-1703.mp3", "title": "Breaches: Small Incidents Add Up to Greatest Losses", "pubdate": "20121025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-china-detente-in-air-directLink-i-1702.mp3", "title": "Is U.S.-China Détente in the Air?", "pubdate": "20121025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experts-offer-fed-infosec-governance-plan-directLink-i-1701.mp3", "title": "Experts Offer Fed Infosec Governance Plan", "pubdate": "20121024" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-challenge-security-risk-directLink-i-1700.mp3", "title": "CISO\"s Challenge: Security & Risk", "pubdate": "20121023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-use-cloud-to-repel-ddos-attacks-directLink-i-1698.mp3", "title": "NIST: Use Cloud to Repel DDoS Attacks", "pubdate": "20121022" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/transparency-key-after-cyberattack-directLink-i-1696.mp3", "title": "Transparency Key after Cyberattack", "pubdate": "20121019" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-how-to-reduce-your-risks-directLink-i-1695.mp3", "title": "DDoS Attacks: How to Reduce Your Risks", "pubdate": "20121017" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evil-8-threats-to-mobile-computing-directLink-i-1689.mp3", "title": "The \"Evil 8\" Threats to Mobile Computing", "pubdate": "20121016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-assessments-expert-advice-directLink-i-1688.mp3", "title": "Risk Assessments: Expert Advice", "pubdate": "20121011" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-one-step-forward-one-step-back-directLink-i-1684.mp3", "title": "Infosec: One Step Forward, One Step Back", "pubdate": "20121009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lacking-gut-feeling-for-cybersecurity-directLink-i-1679.mp3", "title": "Lacking a Gut Feeling for Cybersecurity", "pubdate": "20121004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-warns-new-attacks-on-banks-directLink-i-1681.mp3", "title": "RSA Warns of New Attacks on Banks", "pubdate": "20121004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/windows-8-security-upgrade-directLink-i-1677.mp3", "title": "Windows 8: A Security Upgrade?", "pubdate": "20121004" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fine-tuning-data-breach-notification-law-directLink-i-1676.mp3", "title": "Fine Tuning Data Breach Notification Law", "pubdate": "20121002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/on-job-training-for-isos-directLink-i-1669.mp3", "title": "On the Job Training for ISOs", "pubdate": "20120928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberthreats-whats-next-directLink-i-1668.mp3", "title": "Cyberthreats: What\"s Next?", "pubdate": "20120928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-on-new-risk-assessment-guide-directLink-i-1666.mp3", "title": "Ron Ross on New Risk Assessment Guide", "pubdate": "20120927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-trust-9-million-pilots-directLink-i-1663.mp3", "title": "Creating Trust: The $9 Million Pilots", "pubdate": "20120924" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosecs-cheerleader-in-chief-governor-directLink-i-1661.mp3", "title": "Infosec\"s Cheerleader-In-Chief: Governor", "pubdate": "20120920" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-payment-guidelines-issued-directLink-i-1658.mp3", "title": "Mobile Payment Guidelines Issued", "pubdate": "20120918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurance-getting-started-directLink-i-1660.mp3", "title": "Cyber Insurance: Getting Started", "pubdate": "20120918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iphone-5-next-gen-mobile-security-directLink-i-1657.mp3", "title": "iPhone 5 and Next-Gen Mobile Security", "pubdate": "20120914" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-policy-one-size-doesnt-fit-all-directLink-i-1655.mp3", "title": "Mobile Policy: One Size Doesn\"t Fit All", "pubdate": "20120914" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-cso-reflects-on-breach-directLink-i-1656.mp3", "title": "A State CSO Reflects on a Breach", "pubdate": "20120913" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visas-new-end-to-end-encryption-service-directLink-i-1650.mp3", "title": "Visa\"s New End-to-End Encryption Service", "pubdate": "20120912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/10-tips-for-evolved-defense-directLink-i-1653.mp3", "title": "10 Tips for Evolved Defense", "pubdate": "20120912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-perspective-on-regulation-directLink-i-1645.mp3", "title": "New Perspective on Regulation", "pubdate": "20120911" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/Roel_Schouwenberg _Gauss_090712.mp3", "title": "New Nation-State Attacks Target Banks", "pubdate": "20120910" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-overcome-challenges-directLink-i-1651.mp3", "title": "Continuous Monitoring: Overcome the Challenges", "pubdate": "20120910" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-big-data-challenge-directLink-i-1647.mp3", "title": "Tackling the Big Data Challenge", "pubdate": "20120905" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-fraud-low-slow-approach-directLink-i-1643.mp3", "title": "Insider Fraud: The \"Low, Slow\" Approach", "pubdate": "20120904" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hurricane-season-are-we-prepared-directLink-i-1640.mp3", "title": "Hurricane Season: Are We Prepared?", "pubdate": "20120830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rethinking-security-best-practices-directLink-i-1636.mp3", "title": "Rethinking Security Best Practices", "pubdate": "20120828" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apple-samsung-case-lessons-for-cisos-directLink-i-1637.mp3", "title": "Apple-Samsung Case: Lessons for CISOs", "pubdate": "20120828" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-messaging-risks-directLink-i-1635.mp3", "title": "Mitigating Messaging Risks", "pubdate": "20120827" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-cloud-facilitate-risk-management-directLink-i-1634.mp3", "title": "How Cloud Can Facilitate Risk Management", "pubdate": "20120824" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-lines-cyberdefense-directLink-i-1631.mp3", "title": "3 Lines of Cyberdefense", "pubdate": "20120823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wisconsin-hie-favors-hybrid-data-model-directLink-i-1630.mp3", "title": "Wisconsin HIE Favors Hybrid Data Model", "pubdate": "20120820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/onc-plans-mobile-security-guidance-directLink-i-1629.mp3", "title": "ONC Plans Mobile Security Guidance", "pubdate": "20120817" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-hackers-take-aim-at-us-banks-directLink-i-1628.mp3", "title": "Global Hackers Take Aim at U.S. Banks", "pubdate": "20120816" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-new-approach-to-merchant-security-directLink-i-1626.mp3", "title": "PCI: New Approach to Merchant Security", "pubdate": "20120815" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-assurance-job-market-soars-directLink-i-1162.mp3", "title": "Information Assurance Job Market Soars", "pubdate": "20120815" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-talk-security-to-board-directors-directLink-i-1625.mp3", "title": "How to Talk Security to the Board of Directors", "pubdate": "20120814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ftcs-google-fine-privacy-message-directLink-i-1623.mp3", "title": "FTC\"s Google Fine: The Privacy Message", "pubdate": "20120811" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-us-attorneys-war-on-cyberfraud-directLink-i-1622.mp3", "title": "One U.S. Attorney\"s War on Cyberfraud", "pubdate": "20120810" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thinking-smartly-about-cloud-computing-directLink-i-1619.mp3", "title": "Thinking Smartly About Cloud Computing", "pubdate": "20120809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-pros-cons-directLink-i-1620.mp3", "title": "Social Media: Pros & Cons", "pubdate": "20120807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-grid-too-reliable-for-own-good-directLink-i-1617.mp3", "title": "Power Grid Too Reliable for Own Good?", "pubdate": "20120806" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/symantecs-ciso-on-security-leadership-directLink-i-1615.mp3", "title": "Symantec\"s CISO on Security Leadership", "pubdate": "20120803" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-act-fails-what-next-directLink-i-1616.mp3", "title": "Cybersecurity Act Fails; What Next?", "pubdate": "20120803" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-do-track-debate-directLink-i-1612.mp3", "title": "Privacy: \"Do Not Track\" Debate", "pubdate": "20120731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eddie-schwartz-on-his-year-as-rsas-ciso-directLink-i-1608.mp3", "title": "Eddie Schwartz on His Year as RSA\"s CISO", "pubdate": "20120723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-update-no-brand-safe-directLink-i-1609.mp3", "title": "Phishing Update: \"No Brand is Safe\"", "pubdate": "20120723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cobit-5-for-security-what-you-need-to-know-directLink-i-1590.mp3", "title": "COBIT 5 for Security: What You Need to Know", "pubdate": "20120723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-breach-planning-fails-directLink-i-1606.mp3", "title": "When Breach Planning Fails", "pubdate": "20120720" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-success-requires-collaboration-directLink-i-1605.mp3", "title": "CISO Success Requires Collaboration", "pubdate": "20120719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/smart-grids-unique-security-challenge-directLink-i-1603.mp3", "title": "Smart Grid\"s Unique Security Challenge", "pubdate": "20120718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-california-isos-up-to-snuff-directLink-i-1602.mp3", "title": "Getting California ISOs Up to Snuff", "pubdate": "20120717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breached-organizations-are-tight-lipped-directLink-i-1601.mp3", "title": "Breached Organizations Are Tight-Lipped", "pubdate": "20120717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-all-that-security-directLink-i-1599.mp3", "title": "Managing All That Security", "pubdate": "20120717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolving-role-id-access-management-directLink-i-1593.mp3", "title": "Evolving Role of ID, Access Management", "pubdate": "20120709" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zeus-how-to-fight-back-directLink-i-1592.mp3", "title": "Zeus: How to Fight Back", "pubdate": "20120706" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bargain-hunting-raises-infosec-awareness-directLink-i-1587.mp3", "title": "Bargain Hunting Raises Infosec Awareness", "pubdate": "20120628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-exists-to-refocus-infosec-skills-directLink-i-1585.mp3", "title": "Need Exists to Refocus Infosec Skills", "pubdate": "20120626" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protection-from-online-risks-directLink-i-1581.mp3", "title": "Protection from Online Risks", "pubdate": "20120620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-wares-need-to-id-unknown-threats-directLink-i-1583.mp3", "title": "Infosec Wares Need to ID Unknown Threats", "pubdate": "20120620" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-risk-to-fund-infosec-projects-directLink-i-1579.mp3", "title": "Using Risk to Fund Infosec Projects", "pubdate": "20120614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wireless-monitoring-risks-benefits-directLink-i-1578.mp3", "title": "Wireless Monitoring: Risks, Benefits", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-challenge-directLink-i-1968.mp3", "title": "The BYOD Challenge", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-mobile-risks-directLink-i-1967.mp3", "title": "Mitigating Mobile Risks", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-identity-access-management-directLink-i-1966.mp3", "title": "Improving Identity and Access Management", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-business-driven-iam-to-improve-security-directLink-i-1965.mp3", "title": "Using Business-Driven IAM to Improve Security", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-cloud-in-government-directLink-i-1964.mp3", "title": "Addressing Cloud in Government", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-byod-advice-directLink-i-1963.mp3", "title": "Getting BYOD Advice", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-advanced-cyber-attacks-directLink-i-1962.mp3", "title": "Mitigating Advanced Cyber-Attacks", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-address-byod-directLink-i-1961.mp3", "title": "How to Address BYOD", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-risk-concerns-directLink-i-1960.mp3", "title": "Top Risk Concerns", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-mobile-to-authenticate-directLink-i-1959.mp3", "title": "Using Mobile to Authenticate", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/move-to-data-centric-security-directLink-i-1958.mp3", "title": "The Move to Data-Centric Security", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-in-encryption-directLink-i-1957.mp3", "title": "A Rise in Encryption?", "pubdate": "20120613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-its-about-size-directLink-i-1576.mp3", "title": "Big Data: It\"s Not About Size", "pubdate": "20120612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-linkedin-breach-directLink-i-1577.mp3", "title": "Lessons from LinkedIn Breach", "pubdate": "20120612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-malware-intel-sharing-system-directLink-i-1575.mp3", "title": "Creating a Malware Intel Sharing System", "pubdate": "20120612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/employing-cybersecurity-index-as-metric-directLink-i-1567.mp3", "title": "Employing Cybersecurity Index as a Metric", "pubdate": "20120604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/five-application-security-tips-directLink-i-1571.mp3", "title": "Five Application Security Tips", "pubdate": "20120530" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-electronically-stored-info-directLink-i-1570.mp3", "title": "Understanding Electronically Stored Info", "pubdate": "20120529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boards-directors-dont-get-it-directLink-i-1569.mp3", "title": "Why Boards of Directors Don\"t Get It", "pubdate": "20120524" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-respond-to-hacktivism-directLink-i-1568.mp3", "title": "How to Respond to Hacktivism", "pubdate": "20120523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intelligent-defense-against-intruders-directLink-i-1565.mp3", "title": "Intelligent Defense Against Intruders", "pubdate": "20120523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/matching-personalities-to-jobs-directLink-i-1562.mp3", "title": "Matching Personalities to Jobs", "pubdate": "20120518" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risks-false-credentials-directLink-i-1561.mp3", "title": "Risks of False Credentials", "pubdate": "20120514" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-breach-investigations-directLink-i-1560.mp3", "title": "Improving Breach Investigations", "pubdate": "20120511" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-spot-fraudster-directLink-i-1558.mp3", "title": "How to Spot a Fraudster", "pubdate": "20120509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/americans-less-jittery-about-net-security-directLink-i-1559.mp3", "title": "Americans Less Jittery About Net Security", "pubdate": "20120509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-characteristics-influential-cisos-directLink-i-1555.mp3", "title": "Key Characteristics of Influential CISOs", "pubdate": "20120507" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/its-war-for-talent-directLink-i-1553.mp3", "title": "\"It\"s a War for Talent\"", "pubdate": "20120504" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-engineering-next-generation-directLink-i-1554.mp3", "title": "Social Engineering: The Next Generation", "pubdate": "20120504" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/teaming-up-to-fight-ach-fraud-directLink-i-1552.mp3", "title": "Teaming Up to Fight ACH Fraud", "pubdate": "20120502" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anti-fraud-evolution-directLink-i-1546.mp3", "title": "The Anti-Fraud Evolution", "pubdate": "20120427" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-bc-standard-an-end-to-uncertainty-directLink-i-1547.mp3", "title": "New BC Standard: \"An End to Uncertainty\"", "pubdate": "20120425" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identifying-undetected-breaches-directLink-i-1542.mp3", "title": "Identifying Undetected Breaches", "pubdate": "20120421" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-fighting-how-to-engage-customer-directLink-i-1534.mp3", "title": "Fraud Fighting: How to Engage the Customer", "pubdate": "20120420" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prospects-iffy-for-cybersecurity-bills-directLink-i-1541.mp3", "title": "Prospects Iffy for Cybersecurity Bills", "pubdate": "20120420" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-costs-for-government-could-rise-directLink-i-1535.mp3", "title": "Cloud Costs for Government Could Rise", "pubdate": "20120417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-breach-pr-lessons-learned-directLink-i-1536.mp3", "title": "Post-Breach PR: Lessons Learned", "pubdate": "20120417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartland-ceo-on-breach-response-directLink-i-1531.mp3", "title": "Heartland CEO on Breach Response", "pubdate": "20120416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/6-steps-to-secure-big-data-directLink-i-1529.mp3", "title": "6 Steps to Secure Big Data", "pubdate": "20120413" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gaps-directLink-i-1528.mp3", "title": "Incident Response: The Gaps", "pubdate": "20120413" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012-faces-fraud-first-look-directLink-i-1524.mp3", "title": "2012 Faces of Fraud: First Look", "pubdate": "20120412" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-changing-corporate-culture-directLink-i-1526.mp3", "title": "Privacy: Changing a Corporate Culture", "pubdate": "20120411" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-education-for-senior-execs-directLink-i-1509.mp3", "title": "Security Education for Senior Execs", "pubdate": "20120406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-big-data-to-identify-anomalies-directLink-i-1515.mp3", "title": "Using Big Data to Identify Anomalies", "pubdate": "20120406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/selecting-breach-resolution-vendor-directLink-i-1518.mp3", "title": "Selecting a Breach Resolution Vendor", "pubdate": "20120404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-global-payments-breach-directLink-i-1516.mp3", "title": "Gartner\"s Litan on Global Payments Breach", "pubdate": "20120403" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assuring-security-ipv6-directLink-i-1512.mp3", "title": "Assuring the Security of IPv6", "pubdate": "20120403" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-decides-how-to-allot-infosec-funds-directLink-i-1508.mp3", "title": "Who Decides How to Allot Infosec Funds?", "pubdate": "20120331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-device-management-tips-directLink-i-1507.mp3", "title": "Mobile Device Management Tips", "pubdate": "20120329" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/designing-privacy-into-online-products-directLink-i-1506.mp3", "title": "Designing Privacy into Online Products", "pubdate": "20120328" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cost-data-breach-directLink-i-1502.mp3", "title": "The Cost of a Data Breach", "pubdate": "20120323" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-hacktivists-1-breach-threat-directLink-i-1501.mp3", "title": "Verizon: Hacktivists #1 Breach Threat", "pubdate": "20120322" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/redefining-securitys-core-tenets-directLink-i-1498.mp3", "title": "Redefining IT Security\"s Core Tenets", "pubdate": "20120317" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avoiding-pitfalls-cloud-contract-directLink-i-1497.mp3", "title": "Avoiding Pitfalls of the Cloud Contract", "pubdate": "20120315" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-new-ipad-be-blast-from-past-directLink-i-1495.mp3", "title": "How New iPad Can Be Blast from the Past", "pubdate": "20120312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ipad3-4g-nudges-byod-directLink-i-1490.mp3", "title": "iPad3 4G Nudges BYOD", "pubdate": "20120309" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dissecting-hacktivist-attack-directLink-i-1446.mp3", "title": "Dissecting a Hacktivist Attack", "pubdate": "20120306" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deferring-to-business-on-cybersecurity-directLink-i-1444.mp3", "title": "Deferring to Business on Cybersecurity", "pubdate": "20120305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breaches-top-trends-directLink-i-1433.mp3", "title": "Breaches: The Top Trends", "pubdate": "20120302" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/schmidt-hopeful-on-bills-passage-directLink-i-1422.mp3", "title": "Schmidt Hopeful on Bill\"s Passage", "pubdate": "20120301" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/framework-for-vulnerability-reports-directLink-i-1412.mp3", "title": "A Framework for Vulnerability Reports", "pubdate": "20120229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-attacks-if-or-when-but-now-directLink-i-1409.mp3", "title": "Cyber Attacks: Not If or When, But Now", "pubdate": "20120228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fewer-than-150-hipaa-audits-expected-directLink-i-1407.mp3", "title": "Fewer Than 150 HIPAA Audits Expected", "pubdate": "20120227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/scholarship-for-service-program-grows-directLink-i-1406.mp3", "title": "Scholarship for Service Program Grows", "pubdate": "20120227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-bill-rights-be-all-end-all-directLink-i-1405.mp3", "title": "Privacy Bill of Rights: Not Be-All, End-All", "pubdate": "20120224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-to-expect-at-rsa-conference-directLink-i-1404.mp3", "title": "What to Expect at RSA Conference", "pubdate": "20120223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-security-enabling-byod-directLink-i-1399.mp3", "title": "Mobile Security: Enabling BYOD", "pubdate": "20120222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/book-on-insider-threats-directLink-i-1396.mp3", "title": "The Book on Insider Threats", "pubdate": "20120222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/putting-to-rest-rsa-key-security-worries-directLink-i-1395.mp3", "title": "Putting to Rest RSA Key Security Worries", "pubdate": "20120221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-challenge-directLink-i-1393.mp3", "title": "The CISO Challenge", "pubdate": "20120218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-initiate-forensic-probe-directLink-i-1382.mp3", "title": "Breach Response: Initiate Forensic Probe", "pubdate": "20120217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-fight-how-to-pick-your-battles-directLink-i-1385.mp3", "title": "Fraud Fight: How to Pick Your Battles", "pubdate": "20120216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-latest-threats-directLink-i-1384.mp3", "title": "Fraud: The Latest Threats", "pubdate": "20120216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-to-unveil-controls-guidance-at-rsa-directLink-i-1383.mp3", "title": "NIST to Unveil Controls Guidance at RSA", "pubdate": "20120216" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-latest-threats-directLink-i-1379.mp3", "title": "Fraud: The Latest Threats", "pubdate": "20120215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/7-steps-to-building-security-program-directLink-i-1375.mp3", "title": "7 Steps to Building a Security Program", "pubdate": "20120210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-officer-in-hot-seat-directLink-i-1372.mp3", "title": "Privacy Officer in the Hot Seat", "pubdate": "20120208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-breach-3-lessons-directLink-i-1368.mp3", "title": "After a Breach: 3 Lessons", "pubdate": "20120201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/elements-social-media-policy-directLink-i-1359.mp3", "title": "Elements of a Social Media Policy", "pubdate": "20120123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-anti-piracy-laws-really-needed-directLink-i-1356.mp3", "title": "Are Anti-Piracy Laws Really Needed?", "pubdate": "20120121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visa-on-emv-in-us-directLink-i-1354.mp3", "title": "Visa on EMV in the U.S.", "pubdate": "20120120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-resolution-8-lessons-learned-directLink-i-1351.mp3", "title": "Breach Resolution: 8 Lessons Learned", "pubdate": "20120119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-identify-insider-threat-directLink-i-1348.mp3", "title": "How to Identify the Insider Threat", "pubdate": "20120118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-encrypting-mobile-devices-directLink-i-1340.mp3", "title": "Tips for Encrypting Mobile Devices", "pubdate": "20120112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tablets-seen-mitigating-security-risks-directLink-i-1339.mp3", "title": "Tablets Seen Mitigating Security Risks", "pubdate": "20120110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insource-forensics-directLink-i-1336.mp3", "title": "Why Insource Forensics?", "pubdate": "20120109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automation-dash-humanity-directLink-i-1325.mp3", "title": "Automation with a Dash of Humanity", "pubdate": "20120104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012-government-strategy-guide-to-defending-against-cyber-attacks-directLink-i-1254.mp3", "title": "2012 Government Strategy Guide to Defending Against Cyber-Attacks", "pubdate": "20120102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-tech-trends-for-2012-directLink-i-1329.mp3", "title": "Top Tech Trends for 2012", "pubdate": "20111230" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-manage-risks-directLink-i-1327.mp3", "title": "BYOD: Manage the Risks", "pubdate": "20111229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/complexity-major-info-risk-challenge-directLink-i-1324.mp3", "title": "Complexity Is Major Info Risk Challenge", "pubdate": "20111229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compliance-cant-create-security-directLink-i-1326.mp3", "title": "Why Compliance Can\"t Create Security", "pubdate": "20111227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012-fraud-fighting-agenda-directLink-i-1322.mp3", "title": "2012 Fraud-Fighting Agenda", "pubdate": "20111220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-vs-info-risk-management-directLink-i-1267.mp3", "title": "IT Security Vs. Info Risk Management", "pubdate": "20111219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hannaford-breach-ruling-what-means-directLink-i-1321.mp3", "title": "Hannaford Breach Ruling: What it Means", "pubdate": "20111217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-awareness-what-do-ceos-need-to-know-directLink-i-1261.mp3", "title": "Risk Awareness: What Do CEOs Need to Know?", "pubdate": "20111215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disaster-recovery-supply-chain-at-risk-directLink-i-1319.mp3", "title": "Disaster Recovery: Supply Chain at Risk", "pubdate": "20111215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ahima-ceo-tackles-privacy-challenges-directLink-i-1318.mp3", "title": "AHIMA CEO Tackles Privacy Challenges", "pubdate": "20111214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-planning-tips-directLink-i-1314.mp3", "title": "Breach Notification Planning Tips", "pubdate": "20111208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-web-applications-secure-directLink-i-1312.mp3", "title": "Making Web Applications Secure", "pubdate": "20111208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pace-charters-new-cyber-institute-directLink-i-1313.mp3", "title": "Pace Charters New Cyber Institute", "pubdate": "20111208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/organizing-breach-notification-team-directLink-i-1301.mp3", "title": "Organizing a Breach Notification Team", "pubdate": "20111205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/toolkit-helps-risk-assessments-directLink-i-1308.mp3", "title": "Toolkit Helps With Risk Assessments", "pubdate": "20111202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-reputational-risk-directLink-i-1302.mp3", "title": "Breach Response: Reputational Risk", "pubdate": "20111130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-security-education-directLink-i-1300.mp3", "title": "The State of Security Education", "pubdate": "20111129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-legislation-next-generation-directLink-i-1273.mp3", "title": "Breach Legislation: The Next Generation", "pubdate": "20111129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ip-protection-bills-threaten-internet-directLink-i-1299.mp3", "title": "IP Protection Bills Threaten Internet", "pubdate": "20111128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-priority-for-2012-directLink-i-1297.mp3", "title": "Breach Notification Priority for 2012", "pubdate": "20111128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/influencing-policy-if-law-directLink-i-1295.mp3", "title": "Influencing Policy, If Not the Law", "pubdate": "20111123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/firewalls-next-generation-directLink-i-1072.mp3", "title": "Firewalls: The Next Generation", "pubdate": "20111117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identifying-infosec-jobs-skills-tasks-directLink-i-1293.mp3", "title": "Identifying Infosec Jobs, Skills, Tasks", "pubdate": "20111115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-corporate-policy-directLink-i-1292.mp3", "title": "BYOD and Corporate Policy", "pubdate": "20111115" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/community-service-how-to-give-back-directLink-i-1289.mp3", "title": "Community Service: How to Give Back", "pubdate": "20111109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/web-apps-top-vulnerabilities-directLink-i-1286.mp3", "title": "Web Apps: The Top Vulnerabilities", "pubdate": "20111103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-intel-employs-risk-approach-directLink-i-1285.mp3", "title": "Cyber Intel Employs Risk Approach", "pubdate": "20111102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-physical-security-synergized-directLink-i-1283.mp3", "title": "Digital, Physical Security Synergized", "pubdate": "20111101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-how-to-help-consumers-directLink-i-1282.mp3", "title": "ID Theft: How to Help Consumers", "pubdate": "20111031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/NACS_Part2_102711.mp3", "title": "Fighting Fraud: Banks, Merchants Must Align", "pubdate": "20111028" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vas-plan-for-mobile-device-security-directLink-i-1272.mp3", "title": "VA\"s Plan for Mobile Device Security", "pubdate": "20111020" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-audits-increase-infosec-budgets-directLink-i-1268.mp3", "title": "How Audits Can Increase Infosec Budgets", "pubdate": "20111019" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blackberry-episode-strikes-at-security-tenet-directLink-i-1265.mp3", "title": "BlackBerry Episode Strikes at IT Security Tenet", "pubdate": "20111014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/app-sec-pro-shark-directLink-i-1263.mp3", "title": "The App Sec Pro and the Shark", "pubdate": "20111013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/barriers-stunting-cloud-adoption-directLink-i-1260.mp3", "title": "Barriers Stunting Cloud Adoption", "pubdate": "20111007" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-computing-compliance-challenges-directLink-i-1259.mp3", "title": "Cloud Computing: Compliance Challenges", "pubdate": "20111005" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-new-hipaa-enforcer-directLink-i-1258.mp3", "title": "Interview: The New HIPAA Enforcer", "pubdate": "20111003" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-what-were-missing-directLink-i-1256.mp3", "title": "Business Continuity: What We\"re Missing", "pubdate": "20111003" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/7-steps-to-secure-mobile-devices-directLink-i-1255.mp3", "title": "7 Steps to Secure Mobile Devices", "pubdate": "20110930" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-merchants-still-fall-short-directLink-i-1252.mp3", "title": "PCI: Merchants Still Fall Short", "pubdate": "20110928" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-charge-physical-security-directLink-i-1251.mp3", "title": "Taking Charge of Physical, IT Security", "pubdate": "20110926" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-are-security-risks-overblown-directLink-i-1249.mp3", "title": "Mobile: Are Security Risks Overblown?", "pubdate": "20110923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dodd-frank-what-to-expect-in-2012-directLink-i-1248.mp3", "title": "Dodd-Frank: What to Expect in 2012", "pubdate": "20110922" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-approach-to-security-directLink-i-1244.mp3", "title": "A New Approach to IT Security", "pubdate": "20110914" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hurricane-irene-offers-lessons-directLink-i-1242.mp3", "title": "Hurricane Irene Offers Lessons", "pubdate": "20110912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/911-global-perspective-directLink-i-1241.mp3", "title": "9/11: The Global Perspective", "pubdate": "20110909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-in-post-911-world-directLink-i-1240.mp3", "title": "Security in a Post-9/11 World", "pubdate": "20110909" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shifting-course-on-infosec-post-911-directLink-i-1239.mp3", "title": "Shifting Course on Infosec Post-9/11", "pubdate": "20110908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-sept-11-directLink-i-1238.mp3", "title": "Lessons of Sept. 11", "pubdate": "20110907" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-training-key-directLink-i-1237.mp3", "title": "Social Media: Why Training Is Key", "pubdate": "20110903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-next-generation-firewall-directLink-i-1235.mp3", "title": "The Power of the Next Generation Firewall", "pubdate": "20110901" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/it-security-careers-remain-hot-directLink-i-1233.mp3", "title": "Why IT Security Careers Remain Hot", "pubdate": "20110830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facial-biometrics-pose-privacy-woes-directLink-i-1231.mp3", "title": "Facial Biometrics Pose Privacy Woes", "pubdate": "20110829" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/offering-helping-hand-to-agencies-directLink-i-1229.mp3", "title": "Offering a Helping Hand to Agencies", "pubdate": "20110826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-a-serious-problem-directLink-i-1228.mp3", "title": "Fraud: \"A Serious Problem\"", "pubdate": "20110826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-in-decentralized-environment-directLink-i-1223.mp3", "title": "Infosec in a Decentralized Environment", "pubdate": "20110823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-new-tokenization-guidance-issued-directLink-i-1218.mp3", "title": "PCI: New Tokenization Guidance Issued", "pubdate": "20110812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-ideas-for-securing-web-directLink-i-1217.mp3", "title": "New Ideas for Securing the Web", "pubdate": "20110812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-ag-extension-agent-for-cyber-directLink-i-1216.mp3", "title": "Creating Ag Extension Agent for Cyber", "pubdate": "20110810" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-culture-security-directLink-i-1214.mp3", "title": "Creating a Culture of Security", "pubdate": "20110809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-cloud-directLink-i-1211.mp3", "title": "Securing the Cloud", "pubdate": "20110805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-fraud-investigation-directLink-i-1207.mp3", "title": "Inside a Fraud Investigation", "pubdate": "20110803" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-computing-critical-issues-directLink-i-1208.mp3", "title": "Cloud Computing: Critical Issues", "pubdate": "20110802" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/value-penetration-testing-directLink-i-1205.mp3", "title": "The Value of Penetration Testing", "pubdate": "20110801" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/easing-burden-to-comply-irs-rules-directLink-i-1202.mp3", "title": "Easing Burden to Comply with IRS Rules", "pubdate": "20110728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-trustable-identities-directLink-i-1180.mp3", "title": "The ROI of Trustable Identities", "pubdate": "20110727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-normal-under-attack-directLink-i-1201.mp3", "title": "New Normal: Under Attack", "pubdate": "20110727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forensics-in-cloud-directLink-i-1200.mp3", "title": "Forensics in the Cloud", "pubdate": "20110727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ethics-information-security-directLink-i-1199.mp3", "title": "The Ethics of Information Security", "pubdate": "20110725" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-new-frontier-directLink-i-1198.mp3", "title": "Cybersecurity: The New Frontier", "pubdate": "20110725" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-on-nists-new-privacy-controls-directLink-i-1196.mp3", "title": "Ron Ross on NIST\"s New Privacy Controls", "pubdate": "20110722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/elements-social-media-policy-directLink-i-1194.mp3", "title": "Elements of a Social Media Policy", "pubdate": "20110719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bringing-risk-assessment-in-house-directLink-i-1188.mp3", "title": "Bringing Risk Assessment In-House", "pubdate": "20110718" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-cso-tells-he-took-job-directLink-i-1187.mp3", "title": "RSA\"s CSO Tells Why He Took the Job", "pubdate": "20110712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-roles-in-risk-management-directLink-i-1185.mp3", "title": "New Roles in Risk Management", "pubdate": "20110711" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shutdown-takes-toll-on-infosec-pros-directLink-i-1184.mp3", "title": "Shutdown Takes Toll on Infosec Pros", "pubdate": "20110708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/biometrics-seen-as-securid-alternative-directLink-i-1182.mp3", "title": "Biometrics Seen as SecurID Alternative", "pubdate": "20110707" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-fighters-wanted-directLink-i-1177.mp3", "title": "Fraud Fighters Wanted", "pubdate": "20110705" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-post-breach-security-directLink-i-1178.mp3", "title": "RSA\"s Post-Breach Security", "pubdate": "20110701" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-associates-minimizing-risk-directLink-i-1173.mp3", "title": "Business Associates: Minimizing Risk", "pubdate": "20110629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govt-shutdown-poses-unseen-challenges-directLink-i-1174.mp3", "title": "Gov\"t Shutdown Poses Unseen Challenges", "pubdate": "20110629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-by-redesign-new-concept-directLink-i-1171.mp3", "title": "Privacy by Redesign: A New Concept", "pubdate": "20110628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-decision-what-to-encrypt-directLink-i-1170.mp3", "title": "Executive Decision: What to Encrypt", "pubdate": "20110628" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-bits-supports-obama-bill-directLink-i-1169.mp3", "title": "Cybersecurity: BITS Supports Obama Bill", "pubdate": "20110627" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compelling-compliance-via-regulations-directLink-i-1167.mp3", "title": "Compelling Compliance Via Regulations", "pubdate": "20110623" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-rd-initiatives-focus-on-infosec-directLink-i-1165.mp3", "title": "4 R&D Initiatives Focus on Infosec", "pubdate": "20110621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/va-addresses-medical-device-security-directLink-i-1163.mp3", "title": "VA Addresses Medical Device Security", "pubdate": "20110621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fdic-on-disaster-recovery-directLink-i-1158.mp3", "title": "FDIC on Disaster Recovery", "pubdate": "20110614" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-token-replacement-smart-directLink-i-1154.mp3", "title": "RSA Breach: Token Replacement is \"Smart\"", "pubdate": "20110608" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-devices-risks-rewards-directLink-i-1152.mp3", "title": "Mobile Devices - Risks & Rewards", "pubdate": "20110603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-index-measures-cyberspace-safety-directLink-i-1148.mp3", "title": "New Index Measures Cyberspace Safety", "pubdate": "20110602" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/author-describes-disclosures-rule-directLink-i-1150.mp3", "title": "Author Describes Disclosures Rule", "pubdate": "20110601" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/public-health-serves-as-cybersec-model-directLink-i-1147.mp3", "title": "Public Health Serves as Cybersec Model", "pubdate": "20110531" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-software-industry-perspective-directLink-i-1137.mp3", "title": "Securing the Software: An Industry Perspective", "pubdate": "20110531" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/we-need-ethical-hacking-directLink-i-1145.mp3", "title": "Why We Need Ethical Hacking", "pubdate": "20110527" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pressure-on-privacy-pros-directLink-i-1144.mp3", "title": "Pressure is on Privacy Pros", "pubdate": "20110526" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-mobile-technology-concerns-me-directLink-i-1141.mp3", "title": "Privacy: \\\"Mobile Technology Concerns Me\\\"", "pubdate": "20110523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-you-cant-prepare-enough-directLink-i-1140.mp3", "title": "Privacy: \\\"You Can\"t Prepare Enough\\\"", "pubdate": "20110523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-breaking-silos-directLink-i-1139.mp3", "title": "Business Continuity: Breaking the Silos", "pubdate": "20110520" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-initiates-cybersecurity-diplomacy-directLink-i-1138.mp3", "title": "U.S. Initiates Cybersecurity Diplomacy", "pubdate": "20110520" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-information-exchange-success-strategies-directLink-i-959.mp3", "title": "Health Information Exchange Success Strategies", "pubdate": "20110516" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/congressman-sees-obama-plan-as-start-directLink-i-1133.mp3", "title": "Congressman Sees Obama Plan as a Start", "pubdate": "20110513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disaster-recovery-cross-training-key-directLink-i-1131.mp3", "title": "Disaster Recovery: Cross-Training Key", "pubdate": "20110512" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/survey-analysis-securing-cloud-directLink-i-1122.mp3", "title": "Survey Analysis: Securing the Cloud", "pubdate": "20110512" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-minimizing-risks-directLink-i-1127.mp3", "title": "Social Media: Minimizing Risks", "pubdate": "20110509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-e-government-initiatives-directLink-i-1118.mp3", "title": "Protecting E-Government Initiatives", "pubdate": "20110509" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/public-jitters-over-security-on-rise-directLink-i-1125.mp3", "title": "Public Jitters Over IT Security on Rise", "pubdate": "20110506" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/limited-government-path-to-nstic-directLink-i-1124.mp3", "title": "Limited Government: Path to NSTIC", "pubdate": "20110504" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-cloud-security-standards-directLink-i-1121.mp3", "title": "The Case for Cloud Security Standards", "pubdate": "20110503" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-must-care-about-sony-breach-directLink-i-1120.mp3", "title": "Why CISOs Must Care About Sony Breach", "pubdate": "20110502" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-editors-choicefor-april-2011-directLink-i-1114.mp3", "title": "GovInfoSecurity.com
Editor\"s Choice
for April 2011", "pubdate": "20110430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-fed-health-chief-ids-priorities-directLink-i-1112.mp3", "title": "New Fed Health IT Chief IDs Priorities", "pubdate": "20110428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-testing-comes-age-directLink-i-1110.mp3", "title": "Security Testing Comes of Age", "pubdate": "20110427" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hidden-files-on-iphone-pose-risk-directLink-i-1107.mp3", "title": "Hidden Files on iPhone Pose Risk", "pubdate": "20110424" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-reviewfor-friday-april-22-2011-directLink-i-1104.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, April 22, 2011", "pubdate": "20110423" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/durbins-impact-on-fraud-directLink-i-1101.mp3", "title": "Durbin\"s Impact on Fraud", "pubdate": "20110422" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/governance-its-all-about-risk-directLink-i-1099.mp3", "title": "Governance: It\"s All About Risk", "pubdate": "20110422" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breaches-inside-2011-verizon-report-directLink-i-1096.mp3", "title": "Data Breaches: Inside the 2011 Verizon Report", "pubdate": "20110419" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-april-15-2011-directLink-i-1093.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, April 15, 2011", "pubdate": "20110416" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/danger-seen-in-slashing-infosec-spend-directLink-i-1088.mp3", "title": "Danger Seen In Slashing Infosec Spend", "pubdate": "20110414" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-season-how-to-avoid-fraud-directLink-i-1086.mp3", "title": "Phishing Season: How to Avoid Fraud", "pubdate": "20110412" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfossecuritycomweek-in-reviewfor-friday-april-8-2011-directLink-i-1083.mp3", "title": "GovInfosSecurity.com
Week In Review
for Friday, April 8, 2011", "pubdate": "20110409" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reitingers-quest-build-safer-internet-directLink-i-1079.mp3", "title": "Reitinger\"s Quest: Build a Safer Internet", "pubdate": "20110407" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/epsilon-breach-time-to-come-clean-directLink-i-1080.mp3", "title": "Epsilon Breach: Time to \"Come Clean\"", "pubdate": "20110406" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/epsilon-breach-risks-lessons-directLink-i-1077.mp3", "title": "Epsilon Breach: Risks and Lessons", "pubdate": "20110405" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-challenge-for-state-governments-directLink-i-1069.mp3", "title": "The Authentication Challenge for State Governments", "pubdate": "20110404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycomeditors-choice-for-march-2011-directLink-i-1073.mp3", "title": "GovInfoSecurity.com
Editor\"s Choice
for March 2011", "pubdate": "20110402" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-emerging-global-threats-directLink-i-1070.mp3", "title": "Fraud: Emerging Global Threats", "pubdate": "20110401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/senate-vote-seen-on-security-bill-directLink-i-1068.mp3", "title": "Senate Vote Seen on IT Security Bill", "pubdate": "20110329" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycomweek-in-revewfor-friday-march-25-2011-directLink-i-1061.mp3", "title": "GovInfoSecurity.com
Week In Revew
for Friday, March 25, 2011", "pubdate": "20110326" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-cisos-action-items-directLink-i-1063.mp3", "title": "RSA Breach: A CISO\"s Action Items", "pubdate": "20110325" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-cisos-action-items-directLink-i-1059.mp3", "title": "RSA Breach: A CISO\"s Action Items", "pubdate": "20110323" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-customers-perspective-directLink-i-1058.mp3", "title": "RSA Breach: Customer\"s Perspective", "pubdate": "20110323" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-new-pci-guidance-directLink-i-1056.mp3", "title": "Inside New PCI Guidance", "pubdate": "20110321" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-rsa-breach-its-impact-directLink-i-1054.mp3", "title": "Special Report: The RSA Breach and its Impact", "pubdate": "20110319" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-march-18-2011-directLink-i-1049.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, March 18, 2011", "pubdate": "20110319" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-not-game-changer-directLink-i-1050.mp3", "title": "RSA Breach: \"Not a Game-Changer\"", "pubdate": "20110319" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-japans-disaster-directLink-i-1045.mp3", "title": "Lessons From Japan\"s Disaster", "pubdate": "20110318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-view-rsa-breach-directLink-i-1053.mp3", "title": "Legal View of RSA Breach", "pubdate": "20110318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-week-in-review-for-fri-march-18-2011-directLink-i-1047.mp3", "title": "ISMG Week in Review for Fri., March 18, 2011", "pubdate": "20110318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/japans-crisis-what-you-need-to-know-directLink-i-1044.mp3", "title": "Japan\"s Crisis: What You Need to Know", "pubdate": "20110317" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-ohio-decided-on-nist-framework-directLink-i-1041.mp3", "title": "How Ohio Decided on NIST Framework", "pubdate": "20110316" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multifactor-authentication-needs-focus-directLink-i-1015.mp3", "title": "Multifactor Authentication Needs Focus", "pubdate": "20110316" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/australia-cyber-crime-fight-directLink-i-969.mp3", "title": "Australia: Cyber Crime Fight", "pubdate": "20110316" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-cross-channel-fraud-directLink-i-1038.mp3", "title": "Fighting Cross-Channel Fraud", "pubdate": "20110315" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ocrs-mcandrew-on-enforcing-hipaa-directLink-i-1039.mp3", "title": "OCR\"s McAndrew on Enforcing HIPAA", "pubdate": "20110314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-govt-will-fix-wikileaks-problem-directLink-i-1035.mp3", "title": "How Gov\"t Will Fix WikiLeaks Problem", "pubdate": "20110312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/japan-disaster-business-continuity-directLink-i-1037.mp3", "title": "Japan Disaster: Business Continuity", "pubdate": "20110312" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-infosec-unit-shifts-focus-to-risk-directLink-i-1029.mp3", "title": "State Infosec Unit Shifts Focus to Risk", "pubdate": "20110310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-pillars-trust-directLink-i-985.mp3", "title": "The 3 Pillars of Trust", "pubdate": "20110309" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-national-security-directLink-i-1026.mp3", "title": "Breach Notification and National Security", "pubdate": "20110308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-infosec-challenges-states-face-directLink-i-1018.mp3", "title": "3 Infosec Challenges States Face", "pubdate": "20110308" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roadmap-to-emv-directLink-i-1025.mp3", "title": "Roadmap to EMV", "pubdate": "20110307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-pelgrin-ciso-plus-directLink-i-1017.mp3", "title": "Will Pelgrin: The CISO-Plus", "pubdate": "20110307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patrick-bedwell-directLink-i-1380.mp3", "title": "Patrick Bedwell", "pubdate": "20110305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-march-4-2011-directLink-i-1021.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, March 4, 2011", "pubdate": "20110305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-month-in-review-for-february-2011-directLink-i-1003.mp3", "title": "GovInfoSecurity.com
Month in Review
for February 2011", "pubdate": "20110226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/diversity-devices-number-them-presents-infosec-challenges-directLink-i-1001.mp3", "title": "Diversity of Devices, Not the Number of Them, Presents Infosec Challenges", "pubdate": "20110225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-scientists-on-firewalls-circa-2011-directLink-i-997.mp3", "title": "NIST Scientists on Firewalls Circa 2011", "pubdate": "20110222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preventing-online-fraud-directLink-i-995.mp3", "title": "Preventing Online Fraud", "pubdate": "20110222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-feb-18-2011-directLink-i-992.mp3", "title": "GovInfoSecurity.com
Week In Review
for Feb. 18, 2011", "pubdate": "20110218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-firewalls-are-easy-to-pierce-directLink-i-988.mp3", "title": "Cybersecurity: Firewalls Are Easy to Pierce", "pubdate": "20110215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/placing-in-context-infosec-skills-gap-directLink-i-986.mp3", "title": "Placing in Context Infosec Skills Gap", "pubdate": "20110214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-feb-11-2011-directLink-i-982.mp3", "title": "GovInfoSecurity.com
Week In Review
for Feb. 11, 2011", "pubdate": "20110212" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-fraud-costs-on-rise-directLink-i-977.mp3", "title": "ID Fraud Costs on the Rise", "pubdate": "20110209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lauding-president-on-cybersecurity-directLink-i-976.mp3", "title": "Lauding the President on Cybersecurity", "pubdate": "20110208" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/allow-by-default-deny-by-exception-directLink-i-974.mp3", "title": "\\\"Allow by Default, Deny by Exception\\\"", "pubdate": "20110207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-feb-4-2011-directLink-i-970.mp3", "title": "GovInfoSecurity.com
Week In Review
for Feb. 4, 2011", "pubdate": "20110205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-disclosure-new-laws-higher-standard-directLink-i-946.mp3", "title": "Breach Disclosure: New Laws, Higher Standard", "pubdate": "20110203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/merits-cyberweaponry-directLink-i-965.mp3", "title": "The Merits of Cyberweaponry", "pubdate": "20110202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/73-hospital-system-sets-security-goals-directLink-i-967.mp3", "title": "73-Hospital System Sets Security Goals", "pubdate": "20110201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-security-compliance-directLink-i-964.mp3", "title": "The ROI of Security Compliance", "pubdate": "20110131" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-editors-choice-for-january-2011-directLink-i-963.mp3", "title": "GovInfoSecurity.com
Editor\"s Choice
for January 2011", "pubdate": "20110129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/selecting-data-loss-prevention-app-directLink-i-956.mp3", "title": "Selecting a Data Loss Prevention App", "pubdate": "20110127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beware-social-media-for-screening-directLink-i-951.mp3", "title": "Beware of Social Media for Screening", "pubdate": "20110125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycomweek-in-reviewfor-friday-jan-21-2011-directLink-i-954.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, Jan. 21, 2011", "pubdate": "20110122" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-terrorism-how-to-fight-back-directLink-i-945.mp3", "title": "Cyber Terrorism: How to Fight Back", "pubdate": "20110121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-chip-emv-directLink-i-944.mp3", "title": "The Mobile Chip and EMV", "pubdate": "20110120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/national-breach-warning-system-urged-directLink-i-941.mp3", "title": "National Breach Warning System Urged", "pubdate": "20110117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptography-in-cloud-directLink-i-936.mp3", "title": "Cryptography in the Cloud", "pubdate": "20110114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-jan-14-2011-directLink-i-940.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, Jan. 14, 2011", "pubdate": "20110114" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-compliance-improvements-needed-directLink-i-934.mp3", "title": "PCI Compliance: Improvements Needed", "pubdate": "20110112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/history-emv-directLink-i-933.mp3", "title": "The History of EMV", "pubdate": "20110112" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-non-it-execs-onus-for-risk-directLink-i-923.mp3", "title": "Giving Non-IT Execs Onus for IT Risk", "pubdate": "20110111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-security-privacy-topics-2011-directLink-i-929.mp3", "title": "Top Security & Privacy Topics of 2011", "pubdate": "20110111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-jan-7-2011-directLink-i-926.mp3", "title": "GovInfoSecurity.com Week In Review for Friday, Jan. 7, 2011", "pubdate": "20110108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-challenge-directLink-i-924.mp3", "title": "The Social Media Challenge", "pubdate": "20110107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rd-focuses-on-finding-data-in-cloud-directLink-i-919.mp3", "title": "R&D Focuses on Finding Data in Cloud", "pubdate": "20110104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-editors-choice-for-december-2010-directLink-i-916.mp3", "title": "GovInfoSecurity.com
Editor\"s Choice for December 2010", "pubdate": "20101231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/8-security-threats-for-2011-directLink-i-908.mp3", "title": "8 IT Security Threats for 2011", "pubdate": "20101228" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/age-involuntary-transparency-directLink-i-907.mp3", "title": "The Age of \"Involuntary Transparency\"", "pubdate": "20101227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-components-insider-threat-directLink-i-906.mp3", "title": "4 Components of the Insider Threat", "pubdate": "20101223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-security-challenges-for-2011-directLink-i-904.mp3", "title": "Global Security Challenges for 2011", "pubdate": "20101223" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/firestorm-privacy-activity-directLink-i-903.mp3", "title": "Firestorm of Privacy Activity", "pubdate": "20101221" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-dec-17-2010-directLink-i-901.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, Dec. 17, 2010", "pubdate": "20101218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-risk-its-hot-topic-directLink-i-893.mp3", "title": "Managing Risk: Why It\"s a Hot Topic", "pubdate": "20101214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-ranum-on-2011-security-outlook-directLink-i-890.mp3", "title": "Marcus Ranum on 2011 Security Outlook", "pubdate": "20101214" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosecs-role-in-feds-25-pt-plan-directLink-i-888.mp3", "title": "Infosec\"s Role in Feds\" 25-Pt. IT Plan", "pubdate": "20101213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-dec-10-2010-directLink-i-885.mp3", "title": "GovInfoSecurity.com
Week In Review for
Friday, Dec. 10, 2010", "pubdate": "20101211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wikileaks-backlash-we-are-going-to-take-you-down-directLink-i-882.mp3", "title": "WikiLeaks Backlash: \"We Are Going to Take You Down\"", "pubdate": "20101210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warrior-battles-militarys-pii-misuse-directLink-i-880.mp3", "title": "Warrior Battles Military\"s PII Misuse", "pubdate": "20101209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wipe-out-data-vanish-on-smart-phones-directLink-i-878.mp3", "title": "Wipe Out: Data Vanish on Smart Phones", "pubdate": "20101207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/electronic-drivers-license-new-secure-id-solution-directLink-i-879.mp3", "title": "Electronic Driver\"s License: The New Secure ID Solution", "pubdate": "20101207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internal-audit-2011-agenda-directLink-i-875.mp3", "title": "Internal Audit: The 2011 Agenda", "pubdate": "20101207" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-learned-from-wikileaks-directLink-i-873.mp3", "title": "Lessons Not Learned from WikiLeaks", "pubdate": "20101206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-will-rule-cyberspace-in-2020-directLink-i-847.mp3", "title": "Who Will Rule Cyberspace in 2020?", "pubdate": "20101205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-dec-3-2010-directLink-i-871.mp3", "title": "GovInfoSecurity.com Week In Review for Dec. 3, 2010", "pubdate": "20101204" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cio-calls-for-security-vigilance-directLink-i-867.mp3", "title": "A CIO Calls for Security Vigilance", "pubdate": "20101203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wikileaks-its-major-wake-up-call-directLink-i-866.mp3", "title": "WikiLeaks: \\\"It\"s a Major Wake-up Call\\\"", "pubdate": "20101201" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exempting-infosec-from-civil-service-directLink-i-865.mp3", "title": "Exempting Infosec from Civil Service", "pubdate": "20101130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2011-outlook-complexity-biggest-problem-directLink-i-863.mp3", "title": "2011 Outlook: \"Complexity is the Biggest Problem\"", "pubdate": "20101129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-month-in-review-for-november-2010-directLink-i-859.mp3", "title": "GovInfoSecurity.com Month In Review for November 2010", "pubdate": "20101127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-skills-demand-has-never-been-greater-directLink-i-857.mp3", "title": "Security Skills: Demand Has Never Been Greater", "pubdate": "20101126" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/grc-agenda-for-2011-directLink-i-856.mp3", "title": "GRC Agenda for 2011", "pubdate": "20101124" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facing-tradeoffs-to-secure-systems-directLink-i-858.mp3", "title": "Facing Tradeoffs to Secure IT Systems", "pubdate": "20101123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-nov-19-2010-directLink-i-852.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, Nov. 19, 2010", "pubdate": "20101120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-new-security-metrics-directLink-i-854.mp3", "title": "Understanding New IT Security Metrics", "pubdate": "20101119" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-nov-12-2010-directLink-i-843.mp3", "title": "GovInfoSecurity.com
Week In Review
for Friday, Nov. 12, 2010", "pubdate": "20101113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-assurance-education-2011-directLink-i-839.mp3", "title": "Information Assurance Education 2011", "pubdate": "20101111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/physical-vs-virtual-security-no-contest-directLink-i-838.mp3", "title": "Physical Vs. Virtual Security: No Contest", "pubdate": "20101111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-insider-access-no-1-threat-directLink-i-836.mp3", "title": "ID Theft: Insider Access Is No. 1 Threat", "pubdate": "20101110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-public-wi-fi-security-risks-directLink-i-833.mp3", "title": "Addressing Public Wi-Fi Security Risks", "pubdate": "20101108" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-nov-5-2010-directLink-i-831.mp3", "title": "GovInfoSecurity.com Week In Review for Friday, Nov. 5, 2010", "pubdate": "20101106" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ex-cyber-chair-in-house-extols-new-one-directLink-i-828.mp3", "title": "Ex-Cyber Chair in House Extols New One", "pubdate": "20101105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-career-trends-directLink-i-824.mp3", "title": "Incident Response Career Trends", "pubdate": "20101105" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tech-skills-enough-for-advance-directLink-i-827.mp3", "title": "Tech Skills Not Enough for Advance", "pubdate": "20101104" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-trends-for-2011-directLink-i-823.mp3", "title": "Incident Response Trends for 2011", "pubdate": "20101103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/never-say-never-apps-on-off-cloud-directLink-i-826.mp3", "title": "Never Say Never: Apps On, Off the Cloud", "pubdate": "20101102" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/editors-choice-govinfosecuritycom-octobers-best-directLink-i-815.mp3", "title": "Editor\"s Choice: GovInfoSecurity.com October\"s Best", "pubdate": "20101031" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-oct-29-2010-directLink-i-821.mp3", "title": "GovInfoSecurity.com Week In Review for Friday, Oct. 29, 2010", "pubdate": "20101030" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isaca-on-risk-compliance-trends-directLink-i-808.mp3", "title": "ISACA on Risk, Compliance Trends", "pubdate": "20101027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-mass-man-shares-story-directLink-i-805.mp3", "title": "ID Theft: Mass. Man Shares Story", "pubdate": "20101025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-plan-to-transform-government-directLink-i-796.mp3", "title": "CISO\"s Plan to Transform Government", "pubdate": "20101025" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-oct-22-2010-directLink-i-803.mp3", "title": "GovInfoSecurity.com Week In Review for Oct. 22, 2010", "pubdate": "20101023" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cag-vs-ig-conflict-over-infosec-directLink-i-795.mp3", "title": "CAG Vs. IG: Conflict Over Infosec", "pubdate": "20101022" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-education-initiative-creating-metrics-directLink-i-793.mp3", "title": "Cyber Education Initiative: Creating Metrics", "pubdate": "20101021" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steady-approach-to-critical-controls-directLink-i-794.mp3", "title": "Steady Approach to Critical Controls", "pubdate": "20101020" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-articulating-value-directLink-i-789.mp3", "title": "Risk Management: Articulating the Value", "pubdate": "20101020" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nice-feds-cyber-education-initiative-directLink-i-792.mp3", "title": "NICE: Fed\"s Cyber Education Initiative", "pubdate": "20101019" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-wrong-application-security-directLink-i-785.mp3", "title": "What\"s Wrong with Application Security?", "pubdate": "20101019" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/editors-notebook-jim-lewis-directLink-i-790.mp3", "title": "Editor\"s Notebook: Jim Lewis", "pubdate": "20101018" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-oct-15-2010-directLink-i-786.mp3", "title": "GovInfoSecurity.com Week In Review for Oct. 15, 2010", "pubdate": "20101016" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securitys-future-rests-young-directLink-i-780.mp3", "title": "IT Security\"s Future Rests with Young", "pubdate": "20101014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lack-spending-alarms-state-ciso-directLink-i-779.mp3", "title": "Lack of Spending Alarms State CISO", "pubdate": "20101013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-evolution-mimics-immune-system-directLink-i-778.mp3", "title": "Infosec Evolution Mimics Immune System", "pubdate": "20101013" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-oct-8-2010-directLink-i-775.mp3", "title": "GovInfoSecurity.com Week In Review for Oct. 8, 2010", "pubdate": "20101009" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-getting-right-directLink-i-768.mp3", "title": "Business Continuity: Getting it Right", "pubdate": "20101008" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/itll-take-time-to-achieve-obamas-goals-directLink-i-771.mp3", "title": "It\"ll Take Time to Achieve Obama\"s Goals", "pubdate": "20101008" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/physical-logical-security-convergence-directLink-i-767.mp3", "title": "Physical, Logical Security Convergence", "pubdate": "20101007" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zeus-global-cyber-threat-directLink-i-763.mp3", "title": "Zeus: The Global Cyber Threat", "pubdate": "20101002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycoms-month-in-review-for-september-2010-directLink-i-758.mp3", "title": "GovInfoSecurity.com\"s Month In Review for September 2010", "pubdate": "20101002" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fdic-on-vendor-management-directLink-i-746.mp3", "title": "The FDIC on Vendor Management", "pubdate": "20100927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-about-stuxnet-directLink-i-752.mp3", "title": "What About Stuxnet?", "pubdate": "20100927" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-sept-24-2010-directLink-i-747.mp3", "title": "GovInfoSecurity.com Week In Review for Sept. 24, 2010", "pubdate": "20100925" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-emerging-technology-needs-standardization-directLink-i-745.mp3", "title": "PCI: Emerging Technology Needs Standardization", "pubdate": "20100925" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/redefining-role-cybersec-adviser-directLink-i-742.mp3", "title": "Redefining Role of Cybersec Adviser", "pubdate": "20100924" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/surviving-social-media-directLink-i-743.mp3", "title": "Surviving Social Media", "pubdate": "20100923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-fear-cloud-directLink-i-738.mp3", "title": "Overcoming Fear of the Cloud", "pubdate": "20100922" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-sept-17-2010-directLink-i-734.mp3", "title": "GovInfoSecurity.com Week In Review for Friday, Sept. 17, 2010", "pubdate": "20100918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-issues-in-cloud-computing-directLink-i-728.mp3", "title": "Legal Issues in Cloud Computing", "pubdate": "20100916" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/itll-go-on-your-permanent-record-directLink-i-727.mp3", "title": "\\\"It\"ll Go on Your Permanent Record\\\"", "pubdate": "20100913" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-sept-sept-10-2010-directLink-i-724.mp3", "title": "GovInfoSecurity.com Week In Review for Sept, Sept. 10, 2010", "pubdate": "20100911" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-worker-need-underestimated-directLink-i-719.mp3", "title": "Is Infosec Worker Need Underestimated?", "pubdate": "20100907" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/editors-choice-for-august-senate-tackles-cybersecurity-bill-dod-infosec-strategy-us-cert-state-cisos-directLink-i-709.mp3", "title": "Editor\"s Choice for August: Senate Tackles Cybersecurity Bill, DoD Infosec Strategy, U.S.-CERT, State CISOs", "pubdate": "20100905" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-sept-3-2010-directLink-i-716.mp3", "title": "GovInfoSecurity.com Week In Review for Friday, Sept. 3, 2010", "pubdate": "20100904" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-social-media-directLink-i-706.mp3", "title": "Risk Management and Social Media", "pubdate": "20100831" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasoning-behind-enhancing-dhs-infosec-prowess-directLink-i-705.mp3", "title": "Reasoning Behind Enhancing DHS Infosec Prowess", "pubdate": "20100831" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/senator-gives-white-house-incomplete-on-cybersecurity-performance-directLink-i-703.mp3", "title": "Senator Gives White House \"Incomplete\"
on Cybersecurity Performance", "pubdate": "20100830" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-aug-27-2010-directLink-i-701.mp3", "title": "GovInfoSecurity.com Week In Review for Friday, Aug. 27, 2010", "pubdate": "20100828" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intrusion-detection-analyzing-data-proves-valuable-directLink-i-698.mp3", "title": "Intrusion Detection: Analyzing Data Proves Valuable", "pubdate": "20100827" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dod-unveils-new-cyber-defense-strategy-directLink-i-697.mp3", "title": "DoD Unveils New Cyber Defense Strategy", "pubdate": "20100826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-more-secure-environment-directLink-i-694.mp3", "title": "The Cloud: A More Secure Environment?", "pubdate": "20100825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ibm-names-top-trends-risks-directLink-i-693.mp3", "title": "IBM Names Top Trends, Risks", "pubdate": "20100825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michigan-eyes-hosting-own-cloud-data-center-directLink-i-691.mp3", "title": "Michigan Eyes Hosting Own Cloud Data Center", "pubdate": "20100824" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nasas-jpl-reaches-for-cloud-directLink-i-689.mp3", "title": "NASA\"s JPL Reaches for the Cloud", "pubdate": "20100823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-aug-20-2010-directLink-i-687.mp3", "title": "GovInfoSecurity.com Week In Review for Friday, Aug. 20, 2010", "pubdate": "20100821" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cracking-down-on-id-theft-directLink-i-682.mp3", "title": "Cracking Down on ID Theft", "pubdate": "20100817" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fundamentals-risk-management-directLink-i-681.mp3", "title": "The Fundamentals of Risk Management", "pubdate": "20100814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-aug-13-2010-directLink-i-679.mp3", "title": "GovInfoSecurity.com Week In Review for Aug. 13, 2010", "pubdate": "20100814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/altruistic-cisos-employ-their-smarts-to-succeed-directLink-i-674.mp3", "title": "Altruistic CISOs Employ Their Smarts to Succeed", "pubdate": "20100811" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-update-no-surprises-directLink-i-671.mp3", "title": "PCI Update: \"No Surprises\"", "pubdate": "20100810" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-theft-how-to-protect-consumers-directLink-i-670.mp3", "title": "Identity Theft: How To Protect Consumers", "pubdate": "20100809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-it-swimming-against-tide-directLink-i-669.mp3", "title": "Defending IT: Swimming Against the Tide", "pubdate": "20100809" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-aug-6-2010-directLink-i-668.mp3", "title": "GovInfoSecurity.com Week in Review for Aug. 6, 2010", "pubdate": "20100807" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-computing-case-for-certification-directLink-i-661.mp3", "title": "Cloud Computing: The Case for Certification", "pubdate": "20100806" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycoms-best-july-directLink-i-652.mp3", "title": "GovInfoSecurity.com\"s Best of July", "pubdate": "20100731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-31-2010-directLink-i-649.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, July 31, 2010", "pubdate": "20100731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compliance-i-might-get-breached-but-i-will-get-fined-directLink-i-648.mp3", "title": "Compliance: \"I Might Get Breached, But I Will Get Fined\"", "pubdate": "20100730" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/living-security-breaches-directLink-i-645.mp3", "title": "Living with IT Security Breaches", "pubdate": "20100729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2010-verizon-data-breach-report-insiders-are-1-threat-directLink-i-644.mp3", "title": "2010 Verizon Data Breach Report: Insiders are #1 Threat", "pubdate": "20100728" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/physical-virtual-security-commonalities-directLink-i-643.mp3", "title": "Physical, Virtual Security Commonalities", "pubdate": "20100727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-24-2010-directLink-i-639.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, July 24, 2010", "pubdate": "20100724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conflict-interest-certifiers-who-train-directLink-i-636.mp3", "title": "Conflict of Interest: Certifiers Who Train?", "pubdate": "20100723" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-skills-gap-threatens-key-systems-directLink-i-634.mp3", "title": "Infosec Skills Gap Threatens Key IT Systems", "pubdate": "20100722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dangers-consumerization-directLink-i-633.mp3", "title": "The Dangers of Consumerization", "pubdate": "20100722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartlands-bob-carr-on-leadership-in-crisis-directLink-i-632.mp3", "title": "Heartland\"s Bob Carr on Leadership in a Crisis", "pubdate": "20100720" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/departing-words-from-navy-cio-directLink-i-630.mp3", "title": "Departing Words from the Navy CIO", "pubdate": "20100720" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-getting-attention-needs-directLink-i-629.mp3", "title": "Is Cybersecurity Getting the Attention It Needs?", "pubdate": "20100719" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-17-2010-directLink-i-625.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, July 17, 2010", "pubdate": "20100717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentications-chicken-n-egg-dilemma-directLink-i-623.mp3", "title": "Authentication\"s Chicken \"n\" Egg Dilemma", "pubdate": "20100715" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-you-cant-stop-stupid-directLink-i-622.mp3", "title": "Insider Threat: \"You Can\"t Stop Stupid\"", "pubdate": "20100715" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-commission-encore-presents-challenges-directLink-i-621.mp3", "title": "Cyber Commission Encore Presents Challenges", "pubdate": "20100714" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/doug-johnson-aba-on-careers-in-banking-public-policy-directLink-i-620.mp3", "title": "Doug Johnson of the ABA on Careers in Banking, Public Policy", "pubdate": "20100713" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ranum-part-ii-on-banking-healthcare-government-directLink-i-619.mp3", "title": "Ranum Part II: On Banking, Healthcare and Government", "pubdate": "20100712" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-10-2010-directLink-i-618.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, July 10, 2010", "pubdate": "20100710" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-addresses-new-fisma-responsibilities-directLink-i-617.mp3", "title": "DHS Addresses New FISMA Responsibilities", "pubdate": "20100710" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-warfare-prevention-securing-your-software-applications-directLink-i-611.mp3", "title": "Cyber Warfare Prevention - Securing Your Software and Applications", "pubdate": "20100709" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-ranum-on-todays-top-threats-directLink-i-610.mp3", "title": "Marcus Ranum on Today\"s Top Threats", "pubdate": "20100708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tom-smedinghoff-on-legal-side-information-security-directLink-i-609.mp3", "title": "Tom Smedinghoff on the Legal Side of Information Security", "pubdate": "20100708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/its-time-to-take-security-out-closet-directLink-i-608.mp3", "title": "It\"s Time to \"Take Security Out of the Closet\"", "pubdate": "20100703" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-june-editors-choice-for-monday-july-5-2010-directLink-i-605.mp3", "title": "GovInfoSecurity.com June Editor\"s Choice for Monday, July 5, 2010", "pubdate": "20100703" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-3-2010-directLink-i-603.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, July 3, 2010", "pubdate": "20100702" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-need-to-be-at-ceos-side-directLink-i-596.mp3", "title": "Why CISOs Need to be at CEO\"s Side", "pubdate": "20100629" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-26-2010-directLink-i-592.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, June 26, 2010", "pubdate": "20100625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-trends-for-security-pros-directLink-i-589.mp3", "title": "Tips & Trends for Security Pros", "pubdate": "20100625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/karen-evans-us-cyber-challenge-director-ex-federal-e-government-chief-directLink-i-585.mp3", "title": "Karen Evans, U.S. Cyber Challenge director and ex-federal e-government chief.", "pubdate": "20100622" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/guy-kawasaki-on-power-social-media-directLink-i-584.mp3", "title": "Guy Kawasaki on the Power of Social Media", "pubdate": "20100622" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenges-global-leadership-directLink-i-583.mp3", "title": "Challenges of Global Leadership", "pubdate": "20100622" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-questions-for-karen-evans-directLink-i-582.mp3", "title": "3 Questions for Karen Evans", "pubdate": "20100621" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-19-2010-directLink-i-578.mp3", "title": "GovInfoSecurity.com Week In Review for Saturday, June 19, 2010", "pubdate": "20100618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-12-2010-directLink-i-572.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, June 12, 2010", "pubdate": "20100612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-new-senate-cybersecurity-bill-directLink-i-571.mp3", "title": "Understanding the New Senate Cybersecurity Bill", "pubdate": "20100611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internal-fraud-part-2-new-solutions-directLink-i-570.mp3", "title": "Internal Fraud Part 2: New Solutions", "pubdate": "20100611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/story-behind-nasas-move-to-continuous-monitoring-directLink-i-567.mp3", "title": "Story Behind NASA\"s Move to Continuous Monitoring", "pubdate": "20100609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prof-eugene-spafford-purdue-university-directLink-i-566.mp3", "title": "Prof. Eugene Spafford, Purdue University", "pubdate": "20100609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/were-getting-enough-education-to-right-people-directLink-i-565.mp3", "title": "\\\"We\"re Not Getting Enough Education to the Right People\\\"", "pubdate": "20100609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-5-2010-directLink-i-561.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, June 5, 2010", "pubdate": "20100605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internal-fraud-global-threats-solutions-directLink-i-556.mp3", "title": "Internal Fraud: Global Threats, Solutions", "pubdate": "20100604" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/showcasing-infosec-talent-to-recruit-infosec-talent-directLink-i-555.mp3", "title": "Showcasing Infosec Talent to Recruit Infosec Talent", "pubdate": "20100603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intrusion-detection-myths-realities-directLink-i-554.mp3", "title": "Intrusion Detection: Myths & Realities", "pubdate": "20100603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crafting-social-media-security-policy-directLink-i-553.mp3", "title": "Crafting a Social Media Security Policy", "pubdate": "20100603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/earn-masters-in-cybersecurity-directLink-i-552.mp3", "title": "Earn a Master\"s in Cybersecurity", "pubdate": "20100602" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-may-29-2010-directLink-i-548.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, May 29, 2010", "pubdate": "20100529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-month-in-review-monday-may-31-2010-directLink-i-547.mp3", "title": "GovInfoSecurity.com Month in Review, Monday, May 31, 2010", "pubdate": "20100529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-may-22-2010-directLink-i-532.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, May 22, 2010", "pubdate": "20100522" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-open-source-app-development-directLink-i-531.mp3", "title": "Securing Open Source App Development", "pubdate": "20100521" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-cybersecurity-directLink-i-528.mp3", "title": "The State of Cybersecurity", "pubdate": "20100520" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steve-katz-worlds-first-ciso-directLink-i-526.mp3", "title": "Steve Katz, the World\"s First CISO", "pubdate": "20100518" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-take-to-be-ciro-directLink-i-525.mp3", "title": "What\"s it Take to be a CIRO?", "pubdate": "20100518" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-you-need-to-know-about-data-privacy-directLink-i-524.mp3", "title": "What You Need to Know About Data Privacy", "pubdate": "20100517" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-may-15-2010-directLink-i-523.mp3", "title": "GovInfoSecurity.com Week in Review for Saturday, May 15, 2010", "pubdate": "20100515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/skills-needed-for-cloud-computing-directLink-i-520.mp3", "title": "The Skills Needed for Cloud Computing", "pubdate": "20100514" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/curing-cloud-computing-jitters-directLink-i-519.mp3", "title": "Curing the Cloud Computing Jitters", "pubdate": "20100513" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-saturday-may-8-2010-directLink-i-512.mp3", "title": "GovInfoSecurity.Com Week in Review: Saturday, May 8, 2010", "pubdate": "20100508" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-sweeping-budgeting-power-to-white-house-cyberspace-director-directLink-i-510.mp3", "title": "Giving Sweeping Budgeting Power to White House Cyberspace Director", "pubdate": "20100507" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kim-peretti-ex-senior-counsel-department-justice-directLink-i-507.mp3", "title": "Kim Peretti, ex-Senior Counsel, Department of Justice", "pubdate": "20100505" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/surviving-cyber-war-directLink-i-506.mp3", "title": "Surviving Cyber War", "pubdate": "20100504" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-may-1-2010-directLink-i-503.mp3", "title": "GovInfoSecurity.Com Week in Review: May 1, 2010", "pubdate": "20100501" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-firewalls-speeding-cloud-adoption-story-behind-cisos-firing-directLink-i-501.mp3", "title": "Beyond Firewalls, Speeding Cloud Adoption, Story Behind CISO\"s Firing", "pubdate": "20100430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-tjxheartland-investigations-directLink-i-500.mp3", "title": "Inside the TJX/Heartland Investigations", "pubdate": "20100430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/microsoft-echoes-public-private-partnership-mantra-directLink-i-497.mp3", "title": "Microsoft Echoes Public-Private Partnership Mantra", "pubdate": "20100428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-stupidity-look-lot-alike-directLink-i-495.mp3", "title": "\\\"Fraud & Stupidity Look a Lot Alike\\\"", "pubdate": "20100428" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-summit-building-trust-globally-directLink-i-493.mp3", "title": "Cybersecurity Summit: Building Trust, Globally", "pubdate": "20100426" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/meeting-minds-over-fed-cybersecurity-directLink-i-491.mp3", "title": "Meeting of the Minds Over Fed Cybersecurity", "pubdate": "20100423" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-april-24-2010-directLink-i-490.mp3", "title": "GovInfoSecurity.Com Week in Review: April 24, 2010", "pubdate": "20100423" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/speeding-cloud-adoption-through-new-fedramp-initiative-directLink-i-486.mp3", "title": "Speeding Cloud Adoption Through New FedRAMP Initiative", "pubdate": "20100419" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-crime-new-threats-new-targets-directLink-i-484.mp3", "title": "Cyber Crime: New Threats, New Targets", "pubdate": "20100417" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-what-every-senior-leader-must-know-directLink-i-479.mp3", "title": "Social Media: What Every Senior Leader Must Know", "pubdate": "20100408" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-needs-improvement-directLink-i-475.mp3", "title": "Business Continuity: Needs Improvement", "pubdate": "20100401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-most-misunderstood-about-cloud-computing-directLink-i-474.mp3", "title": "What\"s Most Misunderstood About Cloud Computing?", "pubdate": "20100331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-gregory-wilshusen-talks-people-listen-directLink-i-472.mp3", "title": "When Gregory Wilshusen Talks, People Listen", "pubdate": "20100331" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-federated-id-management-directLink-i-471.mp3", "title": "The Case for Federated ID Management", "pubdate": "20100330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/payments-privacy-vendor-management-global-best-practices-directLink-i-470.mp3", "title": "Payments, Privacy and Vendor Management - Global Best Practices", "pubdate": "20100330" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-your-greatest-risks-directLink-i-465.mp3", "title": "Insider Threat: Your Greatest Risks", "pubdate": "20100322" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-access-to-sensitive-data-insights-from-john-bordwine-public-sector-cto-symantec-directLink-i-464.mp3", "title": "Secure Access to Sensitive Data: Insights from John Bordwine, Public Sector CTO, Symantec", "pubdate": "20100318" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartland-payment-systems-works-feds-to-secure-it-directLink-i-462.mp3", "title": "Heartland Payment Systems Works with Feds to Secure IT", "pubdate": "20100310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hathaway-speaks-out-on-cnci-declassification-directLink-i-460.mp3", "title": "Hathaway Speaks Out on CNCI Declassification", "pubdate": "20100309" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2010-warren-axelrod-on-information-security-directLink-i-456.mp3", "title": "RSA 2010: Warren Axelrod on Information Security", "pubdate": "20100306" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2010-bankingsecurity-agenda-paul-smocer-financial-services-roundtable-directLink-i-454.mp3", "title": "RSA 2010: Banking/Security Agenda - Paul Smocer, Financial Services Roundtable", "pubdate": "20100305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/certifications-whats-new-hord-tipton-isc2-directLink-i-453.mp3", "title": "Certifications: What\"s New? - Hord Tipton, (ISC)2", "pubdate": "20100305" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-whats-next-when-directLink-i-452.mp3", "title": "PCI: What\"s Next and When?", "pubdate": "20100303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-happening-trusted-internet-connection-directLink-i-451.mp3", "title": "What\"s Happening with the Trusted Internet Connection?", "pubdate": "20100302" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bridging-silicon-valley-beltway-directLink-i-448.mp3", "title": "Bridging Silicon Valley and the Beltway", "pubdate": "20100227" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-guru-ron-ross-on-nists-revolutionary-guidance-directLink-i-447.mp3", "title": "Infosec Guru Ron Ross on NIST\"s Revolutionary Guidance", "pubdate": "20100225" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/follow-risk-tips-from-richard-chambers-president-institute-internal-auditors-directLink-i-444.mp3", "title": "\\\"Follow the Risk\\\" - Tips from Richard Chambers, President of the Institute of Internal Auditors", "pubdate": "20100220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/skinny-on-kneber-botnet-directLink-i-442.mp3", "title": "The Skinny on the Kneber Botnet", "pubdate": "20100219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-manage-social-media-jerry-mechling-harvard-kennedy-school-directLink-i-439.mp3", "title": "How to Manage Social Media - Jerry Mechling, Harvard Kennedy School", "pubdate": "20100213" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-compliance-forresters-5-key-principles-directLink-i-437.mp3", "title": "Beyond Compliance: Forrester\"s 5 Key Principles", "pubdate": "20100209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/putting-threats-cloud-computing-in-perspective-directLink-i-436.mp3", "title": "Putting Threats of Cloud Computing in Perspective", "pubdate": "20100209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-forensics-careers-tips-from-rob-lee-sans-institute-directLink-i-435.mp3", "title": "Digital Forensics - Careers Tips from Rob Lee of SANS Institute", "pubdate": "20100206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-avivah-litan-on-fraud-trends-directLink-i-434.mp3", "title": "Gartner\"s Avivah Litan on Fraud Trends", "pubdate": "20100205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-cyber-awareness-strategies-from-dena-haritos-tsamitis-carnegie-mellon-directLink-i-433.mp3", "title": "Improving Cyber Awareness - Strategies from Dena Haritos Tsamitis of Carnegie Mellon", "pubdate": "20100205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2010-identity-fraud-study-threats-trends-directLink-i-432.mp3", "title": "2010 Identity Fraud Study: Threats and Trends", "pubdate": "20100205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/setting-tone-at-top-jennifer-bayuk-on-leadership-directLink-i-431.mp3", "title": "Setting Tone at the Top: Jennifer Bayuk on Leadership", "pubdate": "20100203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-make-in-information-security-today-directLink-i-430.mp3", "title": "What it Takes to Make it in Information Security Today", "pubdate": "20100202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-ready-for-cyberwar-directLink-i-426.mp3", "title": "Getting Ready for Cyberwar", "pubdate": "20100130" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/howard-schmidt-white-house-cybersecurity-coordinator-directLink-i-425.mp3", "title": "Howard Schmidt, White House Cybersecurity Coordinator", "pubdate": "20100128" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-agenda-kevin-richards-president-issa-directLink-i-424.mp3", "title": "Information Security Agenda - Kevin Richards, President of ISSA", "pubdate": "20100127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-be-risk-manager-kenneth-newman-central-pacific-bank-directLink-i-422.mp3", "title": "What it Takes to be a Risk Manager - Kenneth Newman, Central Pacific Bank", "pubdate": "20100126" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/google-attack-prelude-to-more-intrusions-directLink-i-421.mp3", "title": "Google Attack: Prelude to More Intrusions", "pubdate": "20100125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cost-data-breach-dr-larry-ponemon-ponemon-institute-directLink-i-420.mp3", "title": "Cost of a Data Breach - Dr. Larry Ponemon, Ponemon Institute", "pubdate": "20100123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-trends-in-background-screening-lester-rosen-employment-screening-resources-directLink-i-418.mp3", "title": "Top Trends in Background Screening - Lester Rosen, Employment Screening Resources", "pubdate": "20100121" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-consumer-protection-what-to-expect-in-2010-directLink-i-415.mp3", "title": "Privacy & Consumer Protection: What to Expect in 2010", "pubdate": "20100118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taming-wild-west-internet-directLink-i-411.mp3", "title": "Taming the Wild-West Internet", "pubdate": "20100109" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/grading-obamas-first-year-cybersecurity-performance-directLink-i-407.mp3", "title": "Grading Obama\"s First-Year Cybersecurity Performance", "pubdate": "20100107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-career-predictions-david-foote-on-whats-hot-why-directLink-i-404.mp3", "title": "Information Security Career Predictions - David Foote on What\"s Hot and Why", "pubdate": "20091231" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/einstein-citizens-privacy-philip-reitinger-deputy-undersecretary-homeland-security-national-protection-programs-directorate-directLink-i-402.mp3", "title": "Einstein and Citizens\" Privacy: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate", "pubdate": "20091229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-security-report-malware-social-media-are-top-risks-directLink-i-401.mp3", "title": "Cisco Security Report: Malware, Social Media are Top Risks", "pubdate": "20091229" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eliminating-persistent-cyber-threats-against-government-networks-directLink-i-399.mp3", "title": "Eliminating Persistent Cyber Threats Against Government Networks", "pubdate": "20091224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dont-overload-dhs-cybersecurity-tasks-directLink-i-398.mp3", "title": "Don\"t Overload DHS with Cybersecurity Tasks", "pubdate": "20091224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-ranum-biggest-security-threats-getting-least-attention-directLink-i-396.mp3", "title": "Marcus Ranum: The Biggest Security Threats Getting the Least Attention", "pubdate": "20091222" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rep-david-wu-takes-on-his-allies-conversation-chair-house-technology-innovation-subcommittee-directLink-i-395.mp3", "title": "Rep. David Wu Takes On His Allies: Conversation with the Chair of the House Technology & Innovation Subcommittee", "pubdate": "20091219" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/myra-powell-mission-assurance-network-operations-program-disa-directLink-i-394.mp3", "title": "Myra Powell, Mission Assurance and Network Operations Program, DISA", "pubdate": "20091218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-threats-to-watch-in-2010-directLink-i-393.mp3", "title": "ID Theft Threats to Watch in 2010", "pubdate": "20091215" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2010-data-breach-trends-verizon-business-report-update-directLink-i-392.mp3", "title": "2010 Data Breach Trends: Verizon Business Report Update", "pubdate": "20091211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-career-trends-barbara-massa-mcafee-directLink-i-391.mp3", "title": "Information Security Career Trends: Barbara Massa of McAfee", "pubdate": "20091211" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/human-capital-no-1-infosec-goal-philip-reitinger-deputy-undersecretary-homeland-security-national-protection-programs-directorate-directLink-i-390.mp3", "title": "Human Capital No. 1 Infosec Goal: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate", "pubdate": "20091210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-trends-for-2010-james-pajakowski-protiviti-directLink-i-389.mp3", "title": "Risk Management Trends for 2010: James Pajakowski, Protiviti", "pubdate": "20091205" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/having-his-subordinates-back-nist-director-patrick-gallagher-directLink-i-387.mp3", "title": "Having His Subordinate\"s Back: NIST Director Patrick Gallagher", "pubdate": "20091202" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/well-rounded-security-pro-insights-from-mark-lobel-isaca-directLink-i-384.mp3", "title": "The Well-Rounded Security Pro: Insights from Mark Lobel, ISACA", "pubdate": "20091127" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blurring-bulls-eye-on-federal-it-dickie-george-technical-director-information-assurance-national-security-agency-directLink-i-383.mp3", "title": "Blurring the Bull\"s Eye on Federal IT: Dickie George, Technical Director of Information Assurance, National Security Agency", "pubdate": "20091126" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-trends-2010-sue-kerr-bcdr-consultant-directLink-i-382.mp3", "title": "Business Continuity Trends 2010: Sue Kerr, BC/DR Consultant", "pubdate": "20091125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equipping-federal-workforce-for-cyber-age-ruby-demesme-senior-adviser-deloitte-directLink-i-381.mp3", "title": "Equipping the Federal Workforce for the Cyber Age: Ruby DeMesme, Senior Adviser, Deloitte", "pubdate": "20091125" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thinking-like-hacker-dickie-george-technical-director-information-assurance-national-security-agency-directLink-i-378.mp3", "title": "Thinking Like a Hacker: Dickie George, Technical Director of Information Assurance, National Security Agency", "pubdate": "20091123" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-nists-infosec-guru-on-institutes-latest-transformational-guidance-directLink-i-377.mp3", "title": "Ron Ross, NIST\"s Infosec Guru, on the Institute\"s Latest Transformational Guidance", "pubdate": "20091120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-trends-laws-j-trevor-hughes-iapp-directLink-i-376.mp3", "title": "Privacy Trends and Laws: J. Trevor Hughes of the IAPP", "pubdate": "20091118" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/user-centric-identity-comes-to-washington-heather-west-center-for-democracy-technology-directLink-i-375.mp3", "title": "User-Centric Identity Comes to Washington: Heather West of the Center for Democracy and Technology", "pubdate": "20091117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/community-outreach-need-for-information-security-pros-directLink-i-373.mp3", "title": "Community Outreach: The Need for Information Security Pros", "pubdate": "20091117" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-must-lead-melissa-hathaway-white-house-cybersecurity-policy-review-leader-part-2-directLink-i-372.mp3", "title": "White House Must Lead: Melissa Hathaway, White House Cybersecurity Policy Review Leader - Part 2", "pubdate": "20091113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creatively-securing-it-melissa-hathaway-white-house-cybersecurity-policy-review-leader-directLink-i-371.mp3", "title": "Creatively Securing IT: Melissa Hathaway, White House Cybersecurity Policy Review Leader", "pubdate": "20091113" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iris-recognition-nist-computer-scientist-patrick-grother-directLink-i-368.mp3", "title": "Iris Recognition: NIST Computer Scientist Patrick Grother", "pubdate": "20091111" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/softer-side-leadership-heidi-kraft-careers-coach-directLink-i-367.mp3", "title": "The Softer Side of Leadership - Heidi Kraft, Careers Coach", "pubdate": "20091110" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/career-in-secret-service-what-takes-directLink-i-366.mp3", "title": "A Career in the Secret Service: What it Takes", "pubdate": "20091107" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-allan-bachman-association-certified-fraud-examiners-directLink-i-364.mp3", "title": "Fighting Fraud - Allan Bachman, Association of Certified Fraud Examiners", "pubdate": "20091103" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-john-pescatore-on-2010-threats-trends-directLink-i-361.mp3", "title": "Gartner\"s John Pescatore on 2010 Threats, Trends", "pubdate": "20091027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enterprise-risk-management-how-to-engage-your-board-directors-directLink-i-360.mp3", "title": "Enterprise Risk Management: How to Engage Your Board of Directors", "pubdate": "20091027" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/electronic-healthcare-records-impact-on-your-organization-directLink-i-358.mp3", "title": "Electronic Healthcare Records: The Impact on Your Organization", "pubdate": "20091024" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-consensus-on-regulating-data-directLink-i-357.mp3", "title": "Getting a Consensus on Regulating Data", "pubdate": "20091020" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/strategic-cyber-warfare-shouldnt-be-military-priority-directLink-i-354.mp3", "title": "Why Strategic Cyber Warfare Shouldn\"t Be a Military Priority", "pubdate": "20091015" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safe-secure-online-new-outreach-program-from-isc2-directLink-i-353.mp3", "title": "Safe and Secure Online - New Outreach Program from (ISC)2", "pubdate": "20091014" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-assurance-community-colleges-erich-spengler-moraine-valley-community-college-directLink-i-351.mp3", "title": "Information Assurance and Community Colleges - Erich Spengler, Moraine Valley Community College", "pubdate": "20091008" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-biometrics-advantage-directLink-i-350.mp3", "title": "Authentication: The Biometrics Advantage", "pubdate": "20091003" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-security-much-more-than-guidance-directLink-i-348.mp3", "title": "NIST and IT Security: Much More Than Guidance", "pubdate": "20091001" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-spies-peter-earnest-international-spy-museum-directLink-i-347.mp3", "title": "Lessons from Spies -- Peter Earnest of the International Spy Museum", "pubdate": "20090929" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/biometrics-from-kabul-to-washington-directLink-i-343.mp3", "title": "Biometrics: From Kabul to Washington", "pubdate": "20090923" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/training-next-gen-army-brass-on-security-directLink-i-342.mp3", "title": "Training Next Gen Army Brass on IT Security", "pubdate": "20090922" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lockheed-martins-point-man-on-fed-cybersecurity-directLink-i-341.mp3", "title": "Lockheed Martin\"s Point Man on Fed Cybersecurity", "pubdate": "20090919" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-access-to-sensitive-data-insights-from-john-bordwine-public-sector-cto-symantec-directLink-i-339.mp3", "title": "Secure Access to Sensitive Data: Insights from John Bordwine, Public Sector CTO, Symantec", "pubdate": "20090918" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-cyber-risks-alan-paller-sans-institute-directLink-i-337.mp3", "title": "Top Cyber Risks: Alan Paller, SANS Institute", "pubdate": "20090915" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-law-alysa-hutnik-kelley-drye-directLink-i-336.mp3", "title": "Privacy and the Law: Alysa Hutnik of Kelley Drye", "pubdate": "20090912" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/h1n1-update-how-to-prepare-for-flu-season-regina-phelps-pandemic-expert-directLink-i-333.mp3", "title": "H1N1 Update: How to Prepare for Flu Season - Regina Phelps, Pandemic Expert", "pubdate": "20090908" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/city-defends-system-from-social-network-threats-directLink-i-332.mp3", "title": "City Defends IT System from Social Network Threats", "pubdate": "20090903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-forensics-great-need-new-careers-rob-lee-sans-institute-directLink-i-331.mp3", "title": "Digital Forensics: Great Need, New Careers - Rob Lee, SANS Institute", "pubdate": "20090903" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cooperate-regulate-on-cybersecurity-directLink-i-323.mp3", "title": "Cooperate, Not Regulate, on Cybersecurity", "pubdate": "20090826" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breach-trends-mary-monahan-javelin-strategy-research-directLink-i-322.mp3", "title": "Data Breach Trends - Mary Monahan, Javelin Strategy & Research", "pubdate": "20090825" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cae-at-10-interview-dickie-george-nsa-directLink-i-320.mp3", "title": "The CAE at 10: Interview with Dickie George of the NSA", "pubdate": "20090822" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fisma-misunderstood-law-directLink-i-319.mp3", "title": "FISMA: The Misunderstood Law", "pubdate": "20090820" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wounded-warriors-digital-forensics-training-for-veterans-directLink-i-318.mp3", "title": "Wounded Warriors: Digital Forensics Training for Veterans", "pubdate": "20090819" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hiring-trends-information-security-bucks-recession-david-foote-foote-partners-directLink-i-317.mp3", "title": "Hiring Trends: Information Security Bucks the Recession - David Foote, Foote Partners", "pubdate": "20090818" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-massive-decentralized-system-interview-california-ciso-mark-weatherford-directLink-i-315.mp3", "title": "Safeguarding a Massive, Decentralized IT System - Interview with California CISO Mark Weatherford", "pubdate": "20090813" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/feds-seen-regulating-industry-directLink-i-314.mp3", "title": "Feds Seen Regulating IT Industry", "pubdate": "20090812" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-infosec-occupational-categories-interview-california-ciso-mark-weatherford-directLink-i-313.mp3", "title": "Creating InfoSec Occupational Categories - Interview with California CISO Mark Weatherford", "pubdate": "20090806" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confront-security-challenge-interview-cybersecurity-sage-howard-schmidt-directLink-i-310.mp3", "title": "Confront the IT Security Challenge - Interview with Cybersecurity Sage Howard Schmidt", "pubdate": "20090805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-forensics-interview-keith-barger-kpmg-directLink-i-309.mp3", "title": "The Need for Forensics - Interview with Keith Barger of KPMG", "pubdate": "20090805" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-essentials-peter-allor-firstorg-directLink-i-307.mp3", "title": "Incident Response Essentials - Peter Allor, FIRST.org", "pubdate": "20090801" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-preparing-for-h1n1-beyond-directLink-i-306.mp3", "title": "Business Continuity: Preparing for H1N1 and Beyond", "pubdate": "20090731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unique-programs-information-assurance-at-capella-university-directLink-i-305.mp3", "title": "Unique Programs: Information Assurance at Capella University", "pubdate": "20090731" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/valuing-fisma-interview-immigration-customs-enforcement-ciso-gil-vega-directLink-i-304.mp3", "title": "Valuing FISMA: Interview with Immigration and Customs Enforcement CISO Gil Vega", "pubdate": "20090729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/we-want-to-be-recognized-as-leading-school-in-world-pradeep-khosla-carnegie-mellon-university-directLink-i-303.mp3", "title": "\\\"We Want to Be Recognized as the Leading ... School in the World\\\" - Pradeep Khosla, Carnegie Mellon University", "pubdate": "20090729" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-rhode-island-size-be-deceptive-interview-rhode-island-cio-jack-landers-ciso-ernie-quaglieri-directLink-i-302.mp3", "title": "In Rhode Island, Size Can be Deceptive - Interview with Rhode Island CIO Jack Landers and CISO Ernie Quaglieri", "pubdate": "20090727" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/criticality-credentialing-verifying-government-employee-identities-directLink-i-301.mp3", "title": "Criticality of Credentialing: Verifying Government Employee Identities", "pubdate": "20090724" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mastering-information-security-new-graduate-program-debuts-at-esu-directLink-i-299.mp3", "title": "Mastering Information Security - New Graduate Program Debuts at ESU", "pubdate": "20090722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-ciso-part-2-directLink-i-298.mp3", "title": "The CISOs CISO: Part 2", "pubdate": "20090722" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-ciso-directLink-i-297.mp3", "title": "The CISOs CISO", "pubdate": "20090721" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/collaboration-keeping-in-kansas-safe-interview-kansas-ciso-larry-kettlewell-directLink-i-296.mp3", "title": "Collaboration: Keeping IT in Kansas Safe - Interview with Kansas CISO Larry Kettlewell", "pubdate": "20090720" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-lures-higher-paid-security-pros-interview-minnesota-ciso-chris-buse-directLink-i-292.mp3", "title": "State Lures Higher-Paid IT Security Pros - Interview with Minnesota CISO Chris Buse", "pubdate": "20090717" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-scarce-money-no-excuses-directLink-i-289.mp3", "title": "IT Security: Scarce Money, No Excuses", "pubdate": "20090715" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-praise-fisma-directLink-i-287.mp3", "title": "In Praise of FISMA", "pubdate": "20090714" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-for-data-breaches-shane-sims-pricewaterhousecoopers-directLink-i-284.mp3", "title": "Incident Response for Data Breaches - Shane Sims, PricewaterhouseCoopers", "pubdate": "20090711" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-terrorism-exist-interview-jim-harper-cato-institute-directLink-i-283.mp3", "title": "Can Cyber Terrorism Exist? - Interview with Jim Harper of The Cato Institute", "pubdate": "20090711" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unique-programs-excellence-in-information-assurance-university-dallas-directLink-i-282.mp3", "title": "Unique Programs: Excellence in Information Assurance, University of Dallas", "pubdate": "20090710" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marrying-physical-virtual-security-interview-honolulu-cio-gordon-bruce-directLink-i-281.mp3", "title": "Marrying Physical, Virtual Security - Interview with Honolulu CIO Gordon Bruce", "pubdate": "20090708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-basics-rights-interview-jerry-davis-nasa-deputy-chief-information-officer-for-security-directLink-i-280.mp3", "title": "Getting the Basics Rights - Interview with Jerry Davis, NASA deputy chief information officer for IT security.", "pubdate": "20090708" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unique-programs-enterprise-risk-management-at-nc-state-directLink-i-278.mp3", "title": "Unique Programs: Enterprise Risk Management at NC State", "pubdate": "20090706" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/match-game-security-controls-reported-incidents-interview-john-streufert-state-department-deputy-cio-ciso-part-2-directLink-i-277.mp3", "title": "Match Game: Security Controls and Reported Incidents - Interview with John Streufert, State Department Deputy CIO and CISO, Part 2", "pubdate": "20090706" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-fisma-state-depts-next-gen-metric-interview-john-streufert-state-department-deputy-cio-ciso-directLink-i-276.mp3", "title": "Beyond FISMA: State Dept.\"s Next Gen Metric - Interview with John Streufert, State Department Deputy CIO and CISO", "pubdate": "20090702" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-key-areas-cybersecurity-rd-directLink-i-271.mp3", "title": "4 Key Areas of Cybersecurity R&D", "pubdate": "20090625" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audit-risk-trends-insights-from-david-melnick-deloitte-directLink-i-267.mp3", "title": "Audit, Risk Trends: Insights from David Melnick of Deloitte", "pubdate": "20090622" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/yearly-security-awareness-training-isnt-enough-interview-hord-tipton-isc2-directLink-i-266.mp3", "title": "Yearly Security Awareness Training Isn\"t Enough - Interview with Hord Tipton of (ISC)2", "pubdate": "20090618" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-pros-collaborate-on-privacy-act-rewrite-interview-ari-schwartz-center-for-democracy-technology-directLink-i-263.mp3", "title": "IT Security Pros Collaborate on Privacy Act Rewrite - Interview with Ari Schwartz of the Center for Democracy and Technology", "pubdate": "20090616" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-education-expanding-career-opportunities-through-advanced-education-at-regis-university-directLink-i-262.mp3", "title": "Information Security Education: Expanding Career Opportunities Through Advanced Education at Regis University", "pubdate": "20090616" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-silence-cybersecurity-action-interview-jim-flyzk-former-treasury-cio-directLink-i-261.mp3", "title": "In Silence, Cybersecurity Action - Interview with Jim Flyzk, former Treasury CIO", "pubdate": "20090613" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pandemic-update-regina-phelps-on-level-6-what-means-directLink-i-260.mp3", "title": "Pandemic Update: Regina Phelps on Level 6 and What it Means", "pubdate": "20090612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michigans-pass-fail-security-challenge-interview-michigan-cto-dan-lohrmann-directLink-i-257.mp3", "title": "Michigan\"s Pass-Fail IT Security Challenge - Interview with Michigan CTO Dan Lohrmann", "pubdate": "20090612" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/red-flags-privacy-ftc-insights-from-joel-winston-directLink-i-256.mp3", "title": "Red Flags and Privacy: FTC Insights from Joel Winston", "pubdate": "20090611" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/finding-cybersecurity-talent-interview-tom-stanton-johns-hopkins-university-directLink-i-254.mp3", "title": "Finding Cybersecurity Talent - Interview with Tom Stanton of Johns Hopkins University", "pubdate": "20090610" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obamas-cyber-plan-needs-more-oomph-interview-eugene-spafford-purdue-university-directLink-i-253.mp3", "title": "Obama\"s Cyber Plan Needs More Oomph - Interview with Eugene Spafford of Purdue University", "pubdate": "20090609" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/call-for-privacy-act-to-catch-up-interview-dan-chenok-directLink-i-250.mp3", "title": "Call for Privacy Act to Catch Up with IT - Interview with Dan Chenok", "pubdate": "20090605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-your-own-guidance-interview-charlotte-ciso-randy-moulton-directLink-i-249.mp3", "title": "Creating Your Own Guidance - Interview with Charlotte CISO Randy Moulton", "pubdate": "20090605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-lawmaker-high-rank-for-cyber-czar-interview-rep-james-langevin-directLink-i-247.mp3", "title": "Key Lawmaker: High Rank for Cyber Czar - Interview with Rep. James Langevin", "pubdate": "20090603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/so-you-want-to-work-in-cybersecurity-nadia-short-general-dynamics-directLink-i-246.mp3", "title": "\\\"So, You Want to Work in Cybersecurity?\\\" - Nadia Short of General Dynamics", "pubdate": "20090603" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/red-team-primer-directLink-i-244.mp3", "title": "A Red Team Primer", "pubdate": "20090529" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/if-i-were-starting-my-career-today-interview-steve-katz-directLink-i-241.mp3", "title": "\\\"If I Were Starting My Career Today...\\\" - Interview with Steve Katz", "pubdate": "20090523" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/from-audit-guidelines-to-red-team-attacks-interview-former-air-force-cio-john-gilligan-part-2-directLink-i-236.mp3", "title": "From Audit Guidelines to Red Team Attacks - Interview with Former Air Force CIO John Gilligan, Part 2", "pubdate": "20090519" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/embezzlement-find-liars-cheaters-thieves-directLink-i-235.mp3", "title": "Embezzlement: Find the Liars, Cheaters and Thieves", "pubdate": "20090516" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-off-the-shelf-it-directLink-i-234.mp3", "title": "Securing Off-The-Shelf IT", "pubdate": "20090515" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-security-culture-interview-vermont-ciso-kris-rowley-directLink-i-233.mp3", "title": "Creating an IT Security Culture - Interview with Vermont CISO Kris Rowley", "pubdate": "20090514" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-opportunities-in-information-security-interview-gerald-masson-director-johns-hopkins-university-information-security-institute-directLink-i-232.mp3", "title": "New Opportunities in Information Security - Interview with Gerald Masson, Director of Johns Hopkins University Information Security Institute", "pubdate": "20090514" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disas-cloud-computing-initiatives-directLink-i-229.mp3", "title": "DISA\"s Cloud Computing Initiatives", "pubdate": "20090430" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-you-dont-know-about-worlds-worst-breaches-dr-peter-tippett-on-2009-data-breach-investigations-report-directLink-i-228.mp3", "title": "What You Don\"t Know About the World\"s Worst Breaches - Dr. Peter Tippett on the 2009 Data Breach Investigations Report", "pubdate": "20090429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/swine-flu-this-could-be-our-next-pandemic-regina-phelps-emergency-management-expert-directLink-i-227.mp3", "title": "Swine Flu: \\\"This Could be Our Next Pandemic\\\" - Regina Phelps, Emergency Management Expert", "pubdate": "20090427" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-information-security-interview-john-rossi-national-defense-university-directLink-i-225.mp3", "title": "The Future of Information Security: Interview with John Rossi, National Defense University", "pubdate": "20090418" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-new-tech-navy-cio-robert-carey-directLink-i-224.mp3", "title": "Safeguarding New Tech: Navy CIO Robert Carey", "pubdate": "20090415" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/federal-security-alignment-navy-cio-robert-carey-directLink-i-223.mp3", "title": "Federal IT Security Alignment: Navy CIO Robert Carey", "pubdate": "20090415" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-are-you-doing-to-protect-my-information-sidney-pearl-unisys-on-consumer-security-concerns-directLink-i-222.mp3", "title": "\"What Are You Doing to Protect My Information?\" - Sidney Pearl of Unisys on Consumer Security Concerns", "pubdate": "20090404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-most-generous-scholarships-ive-ever-seen-victor-piotrowski-nsf-on-scholarship-for-service-program-directLink-i-221.mp3", "title": "\\\"One of the Most Generous Scholarships I\"ve Ever Seen\\\" - Victor Piotrowski of the NSF on the Scholarship for Service Program.", "pubdate": "20090404" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-issues-education-peter-kosmala-international-association-privacy-professionals-directLink-i-219.mp3", "title": "Privacy Issues and Education: Peter Kosmala, International Association of Privacy Professionals", "pubdate": "20090402" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-happening-at-nist-curtis-barker-directLink-i-218.mp3", "title": "What\"s Happening at NIST: Curtis Barker", "pubdate": "20090401" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-privacy-trends-randy-sabett-information-security-attorney-directLink-i-216.mp3", "title": "Data Privacy Trends: Randy Sabett, Information Security Attorney", "pubdate": "20090327" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-resources-management-college-director-robert-childs-directLink-i-207.mp3", "title": "Information Resources Management College: Director Robert Childs", "pubdate": "20090314" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defining-information-security-metrics-ron-ross-nist-directLink-i-205.mp3", "title": "Defining Information Security Metrics: Ron Ross of NIST", "pubdate": "20090311" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-priorities-joe-restoule-president-rims-directLink-i-204.mp3", "title": "Risk Management Priorities: Joe Restoule, President of RIMS", "pubdate": "20090310" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/invest-in-your-career-pat-myers-chair-isc2-directLink-i-203.mp3", "title": "Invest in Your Career: Pat Myers, Chair of (ISC)2", "pubdate": "20090307" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-education-lawrence-rogers-cert-directLink-i-201.mp3", "title": "Cybersecurity Education: Lawrence Rogers of CERT", "pubdate": "20090304" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fisma-author-on-reform-former-rep-tom-davis-directLink-i-200.mp3", "title": "FISMA Author on Reform: Former Rep. Tom Davis", "pubdate": "20090303" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-insider-threat-randy-trzeciak-carnegie-mellons-cert-directLink-i-197.mp3", "title": "Insights on the Insider Threat: Randy Trzeciak of Carnegie Mellon\"s CERT", "pubdate": "20090226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advising-obama-on-cybersecurity-part-2-ret-air-force-lt-gen-harry-raduege-directLink-i-196.mp3", "title": "Advising Obama on Cybersecurity Part 2: Ret. Air Force Lt. Gen. Harry Raduege", "pubdate": "20090226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advising-obama-on-cybersecurity-part-1-ret-air-force-lt-gen-harry-raduege-directLink-i-195.mp3", "title": "Advising Obama on Cybersecurity Part 1: Ret. Air Force Lt. Gen. Harry Raduege", "pubdate": "20090226" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/probing-federal-security-programs-gregory-wilshusen-gao-directLink-i-193.mp3", "title": "Probing Federal IT Security Programs: Gregory Wilshusen, GAO", "pubdate": "20090224" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-accountability-paul-kurtz-cyber-security-advisor-directLink-i-192.mp3", "title": "Security & Accountability: Paul Kurtz, Cyber Security Advisor", "pubdate": "20090220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-earn-masters-in-business-continuity-john-orlando-norwich-university-directLink-i-191.mp3", "title": "How to Earn a Master\"s in Business Continuity: John Orlando, Norwich University", "pubdate": "20090220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-earn-masters-in-information-assurance-john-orlando-norwich-university-directLink-i-190.mp3", "title": "How to Earn a Master\"s in Information Assurance: John Orlando, Norwich University", "pubdate": "20090220" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anatomy-data-breach-investigation-alain-sheer-ftc-attorney-directLink-i-187.mp3", "title": "Anatomy of a Data Breach Investigation: Alain Sheer, FTC Attorney", "pubdate": "20090218" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fisma-reforms-outlined-senator-tom-carper-directLink-i-186.mp3", "title": "FISMA Reforms Outlined: Senator Tom Carper", "pubdate": "20090217" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2009-identity-fraud-report-james-van-dyke-javelin-strategy-research-directLink-i-180.mp3", "title": "2009 Identity Fraud Report: James Van Dyke, Javelin Strategy & Research", "pubdate": "20090209" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartland-breach-what-means-to-banking-institutions-james-van-dyke-javelin-strategy-research-directLink-i-175.mp3", "title": "Heartland Breach -- What it Means to Banking Institutions: James Van Dyke, Javelin Strategy & Research", "pubdate": "20090129" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-education-meeting-business-needs-dr-peter-stephenson-norwich-university-directLink-i-173.mp3", "title": "Security Education -- Meeting Business Needs: Dr. Peter Stephenson, Norwich University", "pubdate": "20090120" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-face-id-theft-linda-foley-identity-theft-resource-center-directLink-i-166.mp3", "title": "The New Face of ID Theft: Linda Foley, Identity Theft Resource Center", "pubdate": "20081210" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/carnegie-mellon-university-survey-insights-boards-directors-dont-get-it-directLink-i-165.mp3", "title": "Carnegie Mellon University Survey Insights: Why Boards of Directors Don\"t Get it", "pubdate": "20081206" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2009-career-trends-in-information-security-w-hord-tipton-isc-directLink-i-162.mp3", "title": "2009 Career Trends in Information Security: W. Hord Tipton, (ISC)²", "pubdate": "20081203" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-information-security-education-prof-eugene-spafford-directLink-i-132.mp3", "title": "The State of Information Security Education: Prof. Eugene Spafford", "pubdate": "20080823" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-learned-from-tjx-eric-fiterman-cyber-crime-expert-directLink-i-130.mp3", "title": "Lessons Learned from TJX: Eric Fiterman, Cyber Crime Expert", "pubdate": "20080814" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/growing-business-role-for-security-leaders-john-pironti-isaca-directLink-i-120.mp3", "title": "The Growing Business Role for Security Leaders: John Pironti, ISACA", "pubdate": "20080605" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/workplace-violence-what-you-need-to-know-kim-matlon-crisis-expert-directLink-i-113.mp3", "title": "Workplace Violence -- What You Need to Know: Kim Matlon, Crisis Expert", "pubdate": "20080429" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-mobile-malware-hydra-directLink-9-i-3052.mp3", "title": "Fighting the Mobile Malware Hydra", "pubdate": "19700101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-privileged-id-management-directLink-9-i-2716.mp3", "title": "The Case for Privileged ID Management", "pubdate": "19700101" }, { "file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brent-williams-directLink-i-1381.mp3", "title": "Brent Williams", "pubdate": "19700101" } ], "created_at": "2012-02-24 12:53:35", "category": { "name": "교양", "id": 1029 }, "is_adult_only": false, "title": "Government Information Security Podcast", "thumbnail": "http://img.podbbang.com/img/pb_m/thumb/x150/1780.png?time=202002171501" }