{
"description": "Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders",
"id": "1780",
"category": {
"id": 1029,
"name": "교양"
},
"subscribes": 9,
"is_adult_only": false,
"episodes": [
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-latest-ransomware-trends-directLink-5-i-4834.mp3",
"title": "Analysis: The Persistent Ransomware Threat",
"pubdate": "20210205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-emotet-netwalker-takedowns-directLink-9-i-4832.mp3",
"title": "Analysis: Emotet and Netwalker Takedowns",
"pubdate": "20210129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-on-securing-endpoints-ensuring-compliance-directLink-7-i-4826.mp3",
"title": "Tips on Securing Endpoints, Ensuring Compliance",
"pubdate": "20210127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-how-will-biden-address-cybersecurity-challenges-directLink-8-i-4829.mp3",
"title": "Analysis: How Will Biden Address Cybersecurity Challenges?",
"pubdate": "20210122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/a-us-national-privacy-law-on-horizon-directLink-1-i-4824.mp3",
"title": "Is a US National Privacy Law on the Horizon?",
"pubdate": "20210119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solarwinds-supply-chain-hack-investigation-update-directLink-3-i-4823.mp3",
"title": "SolarWinds Supply Chain Hack: Investigation Update",
"pubdate": "20210115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-new-branch-office-directLink-2-i-4819.mp3",
"title": "Securing the New 'Branch Office'",
"pubdate": "20210111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-latest-solarwinds-hack-developments-directLink-4-i-4822.mp3",
"title": "Analysis: The Latest SolarWinds Hack Developments",
"pubdate": "20210108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facebooks-diem-payments-network-may-struggle-directLink-7-i-4818.mp3",
"title": "Why Facebook's Diem is 'a Shadow of Libra'",
"pubdate": "20210101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rita-bowen-directLink-10-i-4810.mp3",
"title": "Providing Patients With Records Access: Overcoming Challenges",
"pubdate": "20201231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-cybersecurity-leadership-directLink-5-i-4816.mp3",
"title": "Cybersecurity Leaders Talk Tactics, Techniques, Challenges",
"pubdate": "20201231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shaping-future-payments-identity-directLink-1-i-4817.mp3",
"title": "Shaping the Future of Payments and Identity",
"pubdate": "20201231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mari-savickis-cassie-leonard-directLink-1-i-4811.mp3",
"title": "COVID-19: Evolving Regulatory Issues",
"pubdate": "20201228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-supply-chain-management-after-solarwinds-hack-directLink-6-i-4814.mp3",
"title": "Analysis: Supply Chain Management After SolarWinds Hack",
"pubdate": "20201225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-key-steps-to-building-resilient-digital-infrastructure-directLink-1-i-4813.mp3",
"title": "5 Key Steps to Building a Resilient Digital Infrastructure",
"pubdate": "20201222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-solarwinds-hack-directLink-1-i-4812.mp3",
"title": "Analysis: The Impact of SolarWinds Hack",
"pubdate": "20201218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critical-factors-to-consider-before-paying-ransom-directLink-9-i-4807.mp3",
"title": "Critical Factors to Consider Before Paying a Ransom",
"pubdate": "20201212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-fireeye-breach-nothing-safe-directLink-2-i-4806.mp3",
"title": "Analysis of FireEye Breach: Is Nothing Safe?",
"pubdate": "20201211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-apple-ios-zero-click-exploit-directLink-9-i-4805.mp3",
"title": "Analysis: Apple iOS 'Zero-Click Exploit'",
"pubdate": "20201204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hot-cybercrime-trend-enterprise-scale-ransomware-hits-directLink-6-i-4804.mp3",
"title": "Hot Cybercrime Trend: Enterprise-Scale Ransomware Hits",
"pubdate": "20201127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisas-christopher-krebs-describes-accomplishments-directLink-4-i-4799.mp3",
"title": "Christopher Krebs Describes Accomplishments",
"pubdate": "20201120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-intrinsic-security-approach-to-secure-workloads-cloud-directLink-4-i-4797.mp3",
"title": "Using an 'Intrinsic Security' Approach",
"pubdate": "20201119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gadgilgaudet-directLink-4-i-4798.mp3",
"title": "Healthcare Supply Chain Security: Updated Guidance",
"pubdate": "20201117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-on-cloud-security-directLink-10-i-4795.mp3",
"title": "Banking on Cloud Security",
"pubdate": "20201114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-new-presidents-impact-on-cybersecurity-directLink-8-i-4796.mp3",
"title": "Analysis: Cybersecurity Challenges Facing New President",
"pubdate": "20201113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-threat-landscape-report-directLink-1-i-4794.mp3",
"title": "Analysis: Threat Landscape Report",
"pubdate": "20201112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-are-marriott-bas-gdpr-fines-big-enough-directLink-7-i-4791.mp3",
"title": "Analysis: Are Marriott and BA's GDPR Fines Big Enough?",
"pubdate": "20201106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-medical-device-vulnerability-scoring-directLink-7-i-4789.mp3",
"title": "Improving Medical Device Vulnerability Scoring",
"pubdate": "20201103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-election-cyber-disruptions-what-to-expect-directLink-5-i-4786.mp3",
"title": "Post-Election Cyber Disruptions: What to Expect",
"pubdate": "20201030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-significance-russian-hackers-indictment-directLink-1-i-4784.mp3",
"title": "Analysis: The Significance of Russian Hackers' Indictment",
"pubdate": "20201023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irs-takes-on-cryptocurrency-funded-terrorists-directLink-8-i-4783.mp3",
"title": "The IRS Takes on Cryptocurrency-Funded Terrorists",
"pubdate": "20201022"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-top-cybercrime-threats-directLink-10-i-4781.mp3",
"title": "Analysis: Ransomware Dominates the Cybercrime Landscape",
"pubdate": "20201016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-regulators-got-tough-hm-directLink-9-i-4779.mp3",
"title": "Analysis: Why Regulators Got Tough With H&M",
"pubdate": "20201009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roger-severino-lead-hipaa-enforcer-on-fighting-hackers-directLink-2-i-4777.mp3",
"title": "Roger Severino, Lead HIPAA Enforcer, on Fighting Hackers",
"pubdate": "20201006"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-mcafees-planned-ipo-directLink-8-i-4775.mp3",
"title": "Analysis: McAfee's Planned IPO",
"pubdate": "20201002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compliance-2-new-health-data-regs-avoiding-pitfalls-directLink-5-i-4772.mp3",
"title": "Compliance With 2 New Health Data Regs: Avoiding Pitfalls",
"pubdate": "20200930"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-are-darknet-markets-here-to-stay-directLink-3-i-4769.mp3",
"title": "Analysis: Are Darknet Markets Here to Stay?",
"pubdate": "20200925"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-chinese-database-exposure-cause-for-concern-directLink-2-i-4768.mp3",
"title": "Analysis: Is Chinese Database Exposure a Cause for Concern?",
"pubdate": "20200918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-gangs-find-fresh-ways-to-make-victims-pay-directLink-1-i-4766.mp3",
"title": "Ransomware Gangs Find Fresh Ways to Make Victims Pay",
"pubdate": "20200911"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fed-studies-development-digital-dollar-directLink-10-i-4764.mp3",
"title": "Fed Studies Development of Digital Dollar",
"pubdate": "20200911"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-organizations-leverage-sase-directLink-2-i-4757.mp3",
"title": "How Organizations Can Leverage SASE",
"pubdate": "20200909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-framework-proposed-to-address-hipaa-gaps-directLink-3-i-4761.mp3",
"title": "Privacy Framework Proposed to Address HIPAA Gaps",
"pubdate": "20200908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-considerations-for-privileged-access-management-directLink-7-i-4759.mp3",
"title": "Key Considerations for Privileged Access Management",
"pubdate": "20200908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risks-posed-by-mobile-health-apps-directLink-5-i-4760.mp3",
"title": "The Risks Posed by Mobile Health Apps",
"pubdate": "20200904"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equifax-breach-ciso-describes-lessons-learned-directLink-9-i-4758.mp3",
"title": "Equifax Breach: CISO Describes Lessons Learned",
"pubdate": "20200904"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-privacy-centered-contract-tracing-apps-directLink-7-i-4756.mp3",
"title": "Building Privacy-Centered Contact-Tracing Apps",
"pubdate": "20200902"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/third-party-risk-management-how-to-grow-mature-program-directLink-6-i-4636.mp3",
"title": "Third-Party Risk Management: How to Grow a Mature Program",
"pubdate": "20200902"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-detection-medicare-fraud-directLink-5-i-4755.mp3",
"title": "Improving the Detection of Medicare Fraud",
"pubdate": "20200828"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-unusual-case-against-former-uber-cso-directLink-3-i-4754.mp3",
"title": "Analysis: The Unusual Case Against Former Uber CSO",
"pubdate": "20200828"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-ransomware-gangs-getting-bigger-payoffs-directLink-1-i-4752.mp3",
"title": "Analysis: Why Ransomware Gangs Getting Bigger Payoffs",
"pubdate": "20200821"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-fraudsters-are-circumventing-ai-base-prevention-efforts-directLink-2-i-4751.mp3",
"title": "How Fraudsters Are Circumventing AI-Based Prevention Efforts",
"pubdate": "20200820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/biometric-technology-assessing-risks-directLink-9-i-4750.mp3",
"title": "Biometric Technology: Assessing the Risks",
"pubdate": "20200820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-remote-access-risk-based-authentication-directLink-2-i-4748.mp3",
"title": "Securing Remote Access With Risk-Based Authentication",
"pubdate": "20200819"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-rep-directLink-3-i-4743.mp3",
"title": "Analysis: Did Barclays Go Too Far in Monitoring Employees?",
"pubdate": "20200814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/derek-manky-fortiguard-labs-on-shift-to-proactive-defense-directLink-7-i-4742.mp3",
"title": "Derek Manky of FortiGuard Labs on the Shift to Proactive Defense",
"pubdate": "20200812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/foster-directLink-8-i-4741.mp3",
"title": "Congressman Makes Case for National Patient ID",
"pubdate": "20200812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-hijacking-twitter-hackers-virtual-hearing-directLink-3-i-4740.mp3",
"title": "Analysis: Hijacking of Twitter Hacker's Virtual Hearing",
"pubdate": "20200807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-biometrics-avoiding-mistakes-directLink-8-i-4738.mp3",
"title": "Behavioral Biometrics: Avoiding Mistakes",
"pubdate": "20200805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secret-service-agent-offers-cybercrime-fighting-insights-directLink-9-i-4737.mp3",
"title": "Secret Service Agent Offers Cybercrime-Fighting Insights",
"pubdate": "20200804"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-sec-rep-directLink-6-i-4736.mp3",
"title": "Analysis: The Hacking of Mobile Banking App Dave",
"pubdate": "20200731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-brand-impersonation-fraud-directLink-4-i-4735.mp3",
"title": "Mitigating Brand Impersonation Fraud",
"pubdate": "20200728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/detecting-payroll-fraud-data-analytics-directLink-6-i-4734.mp3",
"title": "Detecting Payroll Fraud With Data Analytics",
"pubdate": "20200727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/celebrity-twitter-hack-what-happened-directLink-5-i-4732.mp3",
"title": "The Celebrity Twitter Hack: What Happened?",
"pubdate": "20200724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-contact-tracing-app-privacy-concerns-directLink-7-i-4731.mp3",
"title": "COVID-19 Contact-Tracing Apps: The Privacy Issues",
"pubdate": "20200718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-analysis-us-outmaneuvers-uk-on-huawei-question-directLink-10-i-4730.mp3",
"title": "Security Analysis: US Outmaneuvers UK on 'Huawei Question'",
"pubdate": "20200717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coordinating-disclosures-medical-device-vulnerabilities-directLink-4-i-4728.mp3",
"title": "Coordinating Disclosures of Medical Device Vulnerabilities",
"pubdate": "20200711"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-monitoring-risks-posed-by-remote-workers-directLink-7-i-4727.mp3",
"title": "Analysis: Monitoring the Risks Posed by Remote Workers",
"pubdate": "20200710"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-ids-progress-report-directLink-2-i-4722.mp3",
"title": "Digital IDs: A Progress Report",
"pubdate": "20200703"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/guarding-against-covid-19-fraud-schemes-directLink-2-i-4720.mp3",
"title": "Guarding Against COVID-19 Fraud Schemes",
"pubdate": "20200702"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-keeping-iot-devices-secure-directLink-1-i-4716.mp3",
"title": "Analysis: Keeping IoT Devices Secure",
"pubdate": "20200626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-mitigating-risks-in-multicloud-environments-directLink-10-i-4714.mp3",
"title": "Analysis: Mitigating Risks in Multicloud Environments",
"pubdate": "20200619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransom-demands-what-happens-if-victims-pay-or-dont-pay-directLink-8-i-4712.mp3",
"title": "Ransom Demands: What Happens If Victims Pay or Don't Pay?",
"pubdate": "20200618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-privacy-security-concerns-as-businesses-reopen-directLink-5-i-4710.mp3",
"title": "COVID-19: Privacy, Security Concerns as Businesses Reopen",
"pubdate": "20200613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/europols-latest-anti-financial-crime-center-directLink-6-i-4709.mp3",
"title": "Inside Europol's Latest Anti-Financial Crime Center",
"pubdate": "20200612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-risk-prevention-reconsidered-directLink-9-i-4692.mp3",
"title": "Cybersecurity Risk Prevention Reconsidered",
"pubdate": "20200612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-payments-fraud-in-pandemic-directLink-7-i-4708.mp3",
"title": "The State of Payments Fraud in a Pandemic",
"pubdate": "20200611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-voting-be-secure-directLink-7-i-4707.mp3",
"title": "Can Mobile Voting Be Secure?",
"pubdate": "20200610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-collective-defense-directLink-5-i-4705.mp3",
"title": "Building a Collective Defense",
"pubdate": "20200610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-role-digital-identity-management-directLink-7-i-4704.mp3",
"title": "Analyzing the Role of Digital Identity Management",
"pubdate": "20200610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-identity-management-still-challenge-directLink-1-i-4700.mp3",
"title": "Analysis: Why Identity Management Is Still a Challenge",
"pubdate": "20200605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confidential-computing-use-cases-directLink-4-i-4682.mp3",
"title": "Confidential Computing: The Use Cases",
"pubdate": "20200604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confidential-computing-beyond-hype-directLink-4-i-4681.mp3",
"title": "Confidential Computing: Beyond the Hype",
"pubdate": "20200604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fresh-look-at-api-security-directLink-8-i-4691.mp3",
"title": "A Fresh Look at API Security",
"pubdate": "20200602"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/podcast-verizon-2020-dbir-analysis-ashish-thapar-directLink-8-i-4697.mp3",
"title": "Analysis: Verizon's Latest Data Breach Investigation Report",
"pubdate": "20200601"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/neuman-directLink-6-i-4696.mp3",
"title": "Identity Verification in Healthcare: Revamping a Framework",
"pubdate": "20200529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-surge-in-attacks-against-banks-directLink-2-i-4694.mp3",
"title": "Analysis: Surge in Attacks Against Banks",
"pubdate": "20200529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/koste-directLink-1-i-4693.mp3",
"title": "Safeguarding COVID-19 Research, Other Intellectual Property",
"pubdate": "20200529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ama-outlines-privacy-principles-for-health-data-directLink-2-i-4690.mp3",
"title": "AMA Outlines Privacy Principles for Health Data",
"pubdate": "20200527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-avoid-unnecessary-breach-reporting-directLink-1-i-4688.mp3",
"title": "How to Avoid Unnecessary Breach Reporting",
"pubdate": "20200526"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-long-term-implications-remote-workforce-directLink-6-i-4686.mp3",
"title": "Analysis: The Long-Term Implications of 'Work From Home'",
"pubdate": "20200522"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/e-workforce-security-long-game-directLink-7-i-4684.mp3",
"title": "Remote Workforce Security - the Long Game",
"pubdate": "20200521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/remote-workforce-security-role-zero-trust-directLink-1-i-4670.mp3",
"title": "Remote Workforce Security: The Role of 'Zero Trust'",
"pubdate": "20200521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberthreats-tied-to-covid-19-could-hit-diverse-targets-directLink-9-i-4683.mp3",
"title": "Why Cyberthreats Tied to COVID-19 Could Hit Diverse Targets",
"pubdate": "20200519"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ast-as-key-to-devsecops-maturity-directLink-7-i-4676.mp3",
"title": "AST as the Key to DevSecOps Maturity",
"pubdate": "20200516"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-securing-rdp-to-prevent-ransomware-attacks-directLink-2-i-4680.mp3",
"title": "Analysis: Securing RDP to Prevent Ransomware Attacks",
"pubdate": "20200515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/death-office-directLink-8-i-4671.mp3",
"title": "The 'Death' of the Office",
"pubdate": "20200509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/testing-medical-device-security-during-covid-19-crisis-directLink-8-i-4675.mp3",
"title": "Testing Medical Device Security During COVID-19 Crisis",
"pubdate": "20200508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-contact-tracing-conundrum-directLink-4-i-4674.mp3",
"title": "Analysis: The Contact-Tracing Conundrum",
"pubdate": "20200508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-ransomwares-costly-impact-directLink-2-i-4668.mp3",
"title": "Analysis: Ransomware's Costly Impact",
"pubdate": "20200501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zero-trust-remote-worker-directLink-2-i-4667.mp3",
"title": "'Zero Trust' and the Remote Worker",
"pubdate": "20200428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-security-transformation-enabling-your-digital-business-directLink-7-i-4664.mp3",
"title": "Network and Security Transformation - Enabling your Digital Business",
"pubdate": "20200427"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-covid-19-contact-tracing-privacy-issues-directLink-7-i-4661.mp3",
"title": "Analysis: COVID-19 Contact-Tracing Privacy Issues",
"pubdate": "20200424"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enabling-secure-access-in-complex-environments-directLink-9-i-4663.mp3",
"title": "Enabling Secure Access in Complex Environments",
"pubdate": "20200424"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-insider-threats-posed-by-remote-workforce-directLink-3-i-4657.mp3",
"title": "Analysis: Insider Threats Posed by Remote Workforce",
"pubdate": "20200417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/third-party-security-risk-considerations-during-covid-19-directLink-9-i-4656.mp3",
"title": "Third-Party Risk Considerations During COVID-19 Crisis",
"pubdate": "20200417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-recovery-in-new-normal-directLink-7-i-4658.mp3",
"title": "Ransomware Recovery in the 'New Normal'",
"pubdate": "20200416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-cybercrime-during-covid-19-crisis-directLink-2-i-4655.mp3",
"title": "Battling Cybercrime During the COVID-19 Crisis",
"pubdate": "20200415"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-phi-during-covid-19-crisis-emerging-challenges-directLink-1-i-4653.mp3",
"title": "Safeguarding PHI During COVID-19 Crisis: Emerging Challenges",
"pubdate": "20200411"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-remote-workplace-security-challenges-directLink-8-i-4652.mp3",
"title": "Analysis: Remote Workplace Security Challenges",
"pubdate": "20200410"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-cisos-take-on-more-security-privacy-challenges-directLink-1-i-4648.mp3",
"title": "COVID-19: CISOs Take on More Security, Privacy Challenges",
"pubdate": "20200408"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-risks-posed-by-ai-meeting-assistants-directLink-4-i-4647.mp3",
"title": "Mitigating the Risks Posed by AI Meeting Assistants",
"pubdate": "20200407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-passwordless-authentication-directLink-1-i-4635.mp3",
"title": "The Future of Passwordless Authentication",
"pubdate": "20200407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-specialist-offers-telework-security-insights-directLink-7-i-4646.mp3",
"title": "NIST Specialist Offers Telework Security Insights",
"pubdate": "20200407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-deception-in-new-normal-directLink-10-i-4641.mp3",
"title": "Role of Deception in the 'New Normal'",
"pubdate": "20200406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-went-wrong-at-equifax-unusually-we-have-answers-directLink-9-i-4642.mp3",
"title": "What Went Wrong at Equifax? We Have Good Answers",
"pubdate": "20200404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-path-back-to-business-as-usual-after-covid-19-directLink-4-i-4643.mp3",
"title": "Analysis: The Path Back to Business as Usual After COVID-19",
"pubdate": "20200403"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-campaign-security-revisited-directLink-7-i-4640.mp3",
"title": "Election Campaign Security Revisited",
"pubdate": "20200401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/api-security-making-sense-market-directLink-5-i-4629.mp3",
"title": "API Security: Making Sense of the Market",
"pubdate": "20200331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-russias-covid-19-disinformation-campaign-directLink-10-i-4633.mp3",
"title": "Analysis: Russia's COVID-19 Disinformation Campaign",
"pubdate": "20200327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ecommerce-surge-guarding-against-fraud-directLink-6-i-4632.mp3",
"title": "The Ecommerce Surge: Guarding Against Fraud",
"pubdate": "20200327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-hhs-hipaa-moves-for-covid-19-crisis-directLink-2-i-4631.mp3",
"title": "Analysis: Impact of HHS' HIPAA Moves for COVID-19 Crisis",
"pubdate": "20200327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-integrity-in-covid-19-era-directLink-7-i-4628.mp3",
"title": "Election Integrity in COVID-19 Era",
"pubdate": "20200324"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-security-risks-as-manufacturers-shift-gears-directLink-8-i-4626.mp3",
"title": "COVID-19: Security Risks As Manufacturers Shift Gears",
"pubdate": "20200324"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-financial-market-we-are-living-in-unprecedented-times-directLink-8-i-4624.mp3",
"title": "COVID-19 and Financial Markets: 'Unprecedented Times'",
"pubdate": "20200320"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-covid-19-as-cybercrime-opportunity-directLink-1-i-4623.mp3",
"title": "Analysis: COVID-19 as a Cybercrime Opportunity",
"pubdate": "20200320"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/teleworking-by-healthcare-employees-security-challenges-directLink-5-i-4622.mp3",
"title": "Teleworking by Healthcare Employees: Security Challenges",
"pubdate": "20200320"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/living-working-amidst-covid-19-directLink-10-i-4621.mp3",
"title": "Living and Working Amid COVID-19 Crisis",
"pubdate": "20200319"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-response-5-tips-for-securing-remote-workplace-directLink-2-i-4619.mp3",
"title": "COVID-19 Response: 5 Tips for Securing Remote Workplace",
"pubdate": "20200318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-how-to-adjust-business-continuity-plans-directLink-4-i-4618.mp3",
"title": "COVID-19: How to Adjust Business Continuity Plans",
"pubdate": "20200318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/not-mfa-directLink-4-i-4617.mp3",
"title": "Why Not MFA?",
"pubdate": "20200317"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ndr-in-cloud-directLink-5-i-4610.mp3",
"title": "NDR in the Cloud",
"pubdate": "20200314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-secrep-directLink-8-i-4616.mp3",
"title": "Analysis: Coronavirus Cybersecurity and Privacy Issues",
"pubdate": "20200313"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sharing-cloud-security-responsibilities-directLink-6-i-4615.mp3",
"title": "Sharing Cloud Security Responsibilities",
"pubdate": "20200313"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-public-health-cybersecurity-issues-directLink-7-i-4613.mp3",
"title": "Coronavirus: The Public Health Cybersecurity Issues",
"pubdate": "20200311"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobility-government-challenge-directLink-5-i-4601.mp3",
"title": "Mobility and the Government Challenge",
"pubdate": "20200310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-insider-risk-when-creativity-goes-bad-directLink-3-i-4611.mp3",
"title": "The New Insider Risk: When Creativity Goes Bad",
"pubdate": "20200306"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-spread-preparing-for-the-long-haul-directLink-5-i-4609.mp3",
"title": "Coronavirus Spread: Preparing for 'The Long Haul'",
"pubdate": "20200304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-eu-vs-us-approaches-directLink-5-i-4608.mp3",
"title": "Medical Device Cybersecurity: EU vs. U.S. Approaches",
"pubdate": "20200229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2020-roundup-key-themes-directLink-8-i-4607.mp3",
"title": "RSA 2020: Roundup of Key Themes",
"pubdate": "20200228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/modified-draft-ccpa-regulations-how-they-impact-businesses-directLink-3-i-4604.mp3",
"title": "Modified Draft CCPA Regulations: How They Impact Businesses",
"pubdate": "20200226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-by-design-implementation-tips-directLink-1-i-4603.mp3",
"title": "\"Privacy by Design\" Implementation Tips",
"pubdate": "20200224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-to-look-for-at-rsa-2020-conference-directLink-1-i-4602.mp3",
"title": "What to Look for at RSA 2020 Conference",
"pubdate": "20200221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-update-tips-for-travel-directLink-10-i-4600.mp3",
"title": "Coronavirus Update: Tips for Travel",
"pubdate": "20200219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-2020-preview-directLink-6-i-4598.mp3",
"title": "RSA Conference 2020 Preview",
"pubdate": "20200219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-indictments-in-equifax-hack-directLink-2-i-4595.mp3",
"title": "Analysis: Indictments in Equifax Hack",
"pubdate": "20200214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-privacy-framework-implementation-challenges-directLink-4-i-4594.mp3",
"title": "NIST Privacy Framework: The Implementation Challenges",
"pubdate": "20200211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-iowa-election-app-missteps-directLink-1-i-4592.mp3",
"title": "Analysis: Iowa Election App Missteps",
"pubdate": "20200207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-how-to-plan-protect-directLink-6-i-4590.mp3",
"title": "Coronavirus: How to Plan and Protect",
"pubdate": "20200207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-advocate-tackles-issue-patient-consent-rights-directLink-2-i-4589.mp3",
"title": "Privacy Advocate Tackles Issue of Patient Consent Rights",
"pubdate": "20200201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-government-policies-on-huaweis-5g-role-directLink-1-i-4588.mp3",
"title": "Analysis: Government Policies on Huawei\"s 5G Role",
"pubdate": "20200131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dave-dewalt-on-securing-business-critical-applications-directLink-5-i-4584.mp3",
"title": "Dave DeWalt on Securing Business-Critical Applications",
"pubdate": "20200127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-new-details-on-hacking-jeff-bezos-iphone-directLink-4-i-4585.mp3",
"title": "Analysis: New Details on the Hacking of Jeff Bezos\" iPhone",
"pubdate": "20200124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-satellites-in-quantum-key-distribution-directLink-3-i-4580.mp3",
"title": "The Role of Satellites in Quantum Key Distribution",
"pubdate": "20200121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sizing-up-todays-deception-technology-directLink-5-i-4581.mp3",
"title": "Sizing Up Today\"s Deception Technology",
"pubdate": "20200121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-huawei-5g-dilemma-directLink-9-i-4577.mp3",
"title": "Analysis: Huawei 5G Dilemma",
"pubdate": "20200117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-overcoming-roadblocks-directLink-5-i-4574.mp3",
"title": "Cloud Security: Overcoming Roadblocks",
"pubdate": "20200117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wartime-mentality-revisited-directLink-10-i-4575.mp3",
"title": "\"Wartime\" Security Mentality Revisited",
"pubdate": "20200115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/class-action-breach-lawsuits-impact-data-for-sale-directLink-5-i-4572.mp3",
"title": "Class Action Breach Lawsuits: The Impact of Data for Sale",
"pubdate": "20200114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reality-check-how-vulnerable-power-grid-directLink-3-i-4569.mp3",
"title": "Reality Check: How Vulnerable Is the Power Grid?",
"pubdate": "20200111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-sec-rep-directLink-8-i-4570.mp3",
"title": "Analysis: \"Orwellian\" Surveillance in 2020",
"pubdate": "20200110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/quantum-proof-cryptography-how-would-work-directLink-2-i-4571.mp3",
"title": "Quantum-Proof Cryptography: How It Would Work",
"pubdate": "20200110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ccpa-who-in-healthcare-must-comply-directLink-5-i-4537.mp3",
"title": "CCPA: Who in Healthcare Must Comply?",
"pubdate": "20200110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-from-vulnerability-management-to-response-directLink-6-i-4560.mp3",
"title": "Moving from Vulnerability Management to Response",
"pubdate": "20200108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/caleb-barlow-directLink-4-i-4566.mp3",
"title": "Preparing for Potential Iranian \"Wiper\" Attacks",
"pubdate": "20200108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iam-zero-trust-maturity-directLink-7-i-4549.mp3",
"title": "Assessing The Maturity of Zero Trust Across Organizations",
"pubdate": "20200107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-cyber-alliance-president-on-iranian-cyber-threat-directLink-3-i-4564.mp3",
"title": "Global Cyber Alliance President on Iranian Cyber Threat",
"pubdate": "20200107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irans-cyber-response-theyre-going-to-unleash-hounds-directLink-10-i-4563.mp3",
"title": "Iran\"s Cyber Response: \"They\"re Going to Unleash the Hounds\"",
"pubdate": "20200107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/countering-cyber-axis-evil-in-2020-directLink-9-i-4561.mp3",
"title": "Analysis: Countering Nation-State Attacks in 2020",
"pubdate": "20200103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-credential-stuffing-be-thwarted-directLink-3-i-4551.mp3",
"title": "How Can Credential Stuffing Be Thwarted?",
"pubdate": "20191231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-christian-directLink-3-i-4553.mp3",
"title": "Health Data Security: Federal, State Trends for 2020",
"pubdate": "20191231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2020-year-zero-trust-directLink-7-i-4557.mp3",
"title": "2020: The Year of Zero Trust?",
"pubdate": "20191231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenge-soc-triage-directLink-1-i-4547.mp3",
"title": "The Challenge of SOC Triage",
"pubdate": "20191231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eric-johnson-podcast-directLink-1-i-4552.mp3",
"title": "Do Breach Remediation Efforts Affect Patient Outcomes?",
"pubdate": "20191230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbis-elvis-chan-on-securing-2020-election-directLink-5-i-4545.mp3",
"title": "FBI\"s Elvis Chan on Securing the 2020 Election",
"pubdate": "20191230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-2020-cybersecurity-issues-directLink-4-i-4556.mp3",
"title": "Analysis: 2020 Cybersecurity Issues",
"pubdate": "20191227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-on-misinformation-in-age-cyber-warfare-directLink-10-i-4544.mp3",
"title": "Art Coviello on Misinformation in the Age of Cyber Warfare",
"pubdate": "20191226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-offers-insights-on-managing-vendor-security-risks-directLink-3-i-4536.mp3",
"title": "A CISO Offers Insights on Managing Vendor Security Risks",
"pubdate": "20191226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tom-kellermann-on-axis-evil-escalation-destructive-attacks-directLink-8-i-4554.mp3",
"title": "The \"Axis of Evil\" and Escalation of Destructive Attacks",
"pubdate": "20191224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-20-cybercrime-gangs-apply-apt-style-tactics-directLink-10-i-4543.mp3",
"title": "Ransomware 2.0: Cybercrime Gangs Apply APT-Style Tactics",
"pubdate": "20191224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-avivah-litan-on-rise-fake-everything-directLink-6-i-4542.mp3",
"title": "Gartner\"s Avivah Litan on the Rise of \"Fake Everything\"",
"pubdate": "20191223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-top-health-data-regulatory-issues-to-watch-in-2020-directLink-9-i-4550.mp3",
"title": "5 Top Health Data Regulatory Issues to Watch in 2020",
"pubdate": "20191220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-cities-targeted-by-ransomware-directLink-8-i-4548.mp3",
"title": "Analysis: The Latest Ransomware Targets",
"pubdate": "20191220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-medical-devices-so-challenging-directLink-9-i-4541.mp3",
"title": "Why Securing Medical Devices Is So Challenging",
"pubdate": "20191218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-better-approach-to-cyber-defense-directLink-7-i-4539.mp3",
"title": "Analysis: A Better Approach to Cyber Defense",
"pubdate": "20191213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reflections-on-cloud-strategies-security-directLink-2-i-4519.mp3",
"title": "Reflections on Cloud Strategies & Security",
"pubdate": "20191212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-confidence-matters-directLink-8-i-4518.mp3",
"title": "Cyber Confidence: Why it Matters",
"pubdate": "20191212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/quantum-proof-cryptography-what-role-will-play-directLink-2-i-4534.mp3",
"title": "Quantum-Proof Cryptography: What Role Will It Play?",
"pubdate": "20191211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ai-machine-learning-robotics-privacy-security-issues-directLink-8-i-4533.mp3",
"title": "AI, Machine Learning and Robotics: Privacy, Security Issues",
"pubdate": "20191207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-adversarial-mindset-making-cybersecurity-better-directLink-1-i-4532.mp3",
"title": "How the Adversarial Mindset Is Making Cybersecurity Better",
"pubdate": "20191207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-smart-tv-risks-directLink-5-i-4531.mp3",
"title": "Analysis: Smart TV Risks",
"pubdate": "20191206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/john-halamka-on-privacy-security-mayo-clinic-platform-directLink-9-i-4530.mp3",
"title": "John Halamka on Privacy, Security of Mayo Clinic Platform",
"pubdate": "20191206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/psd2-compliance-enforcement-update-directLink-9-i-4526.mp3",
"title": "PSD2: The Compliance and Enforcement Update",
"pubdate": "20191205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-transformation-privileged-access-imperative-directLink-9-i-4527.mp3",
"title": "Digital Transformation: The Privileged Access Imperative",
"pubdate": "20191204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-on-mobile-security-directLink-8-i-4522.mp3",
"title": "Banking on Mobile Security",
"pubdate": "20191204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-vendor-contract-changes-under-ccpa-directLink-5-i-4529.mp3",
"title": "Analysis: Vendor Contract Changes Under CCPA",
"pubdate": "20191203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-ransomware-doxing-directLink-5-i-4528.mp3",
"title": "The Threat of Ransomware and Doxing",
"pubdate": "20191129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-team-approach-directLink-1-i-4525.mp3",
"title": "Medical Device Cybersecurity: A Team Approach",
"pubdate": "20191127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-hacking-what-you-need-to-know-directLink-6-i-4524.mp3",
"title": "Election Hacking: What You Need to Know",
"pubdate": "20191125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-latest-ransomware-trends-directLink-4-i-4521.mp3",
"title": "Analysis: The Latest Ransomware Trends",
"pubdate": "20191122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/close-look-at-hhs-cyber-donation-safe-harbor-proposals-directLink-9-i-4520.mp3",
"title": "A Close Look at HHS\" Cyber Donation \"Safe Harbor\" Proposals",
"pubdate": "20191122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-advantage-emv-3ds-directLink-4-i-4514.mp3",
"title": "Taking Advantage of EMV 3DS",
"pubdate": "20191120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iot-security-20-years-behind-enterprise-computing-directLink-8-i-4516.mp3",
"title": "IoT Security: 20 Years Behind Enterprise Computing",
"pubdate": "20191119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-impact-digital-transformation-directLink-7-i-4512.mp3",
"title": "The Security Impact of Digital Transformation",
"pubdate": "20191119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multifactor-authentication-2020-faster-more-effective-directLink-3-i-4515.mp3",
"title": "Multifactor Authentication 2020: Faster and More Effective",
"pubdate": "20191118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-sec-rep-directLink-3-i-4513.mp3",
"title": "Analysis: Instagram\"s Major Problem With Minors\" Data",
"pubdate": "20191115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-so-challenging-directLink-3-i-4511.mp3",
"title": "Why Medical Device Security Is So Challenging",
"pubdate": "20191115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dark-webs-automobile-hacking-forms-directLink-7-i-4510.mp3",
"title": "The Dark Web\"s Automobile Hacking Forums",
"pubdate": "20191114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/googles-push-into-health-sector-emerging-privacy-issues-directLink-6-i-4509.mp3",
"title": "Google\"s Push Into Health Sector: Emerging Privacy Issues",
"pubdate": "20191114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-capital-ones-breach-teach-about-best-practices-directLink-5-i-4507.mp3",
"title": "What Mega Breaches Can Teach about Best Practices",
"pubdate": "20191113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ccpa-compliance-identify-verification-challenges-directLink-1-i-4505.mp3",
"title": "CCPA Compliance: Identity Verification Challenges",
"pubdate": "20191112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-fraud-account-origination-directLink-10-i-4504.mp3",
"title": "Identity Fraud: Account Origination",
"pubdate": "20191111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-data-in-sprawling-computing-environments-directLink-4-i-4502.mp3",
"title": "Protecting Data in Sprawling Computing Environments",
"pubdate": "20191108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-using-twitter-for-espionage-directLink-8-i-4501.mp3",
"title": "Analysis: Using Twitter for Espionage",
"pubdate": "20191108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/is-third-party-security-risk-manage-directLink-10-i-4500.mp3",
"title": "Why Is Third-Party Risk Management So Complex?",
"pubdate": "20191108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-ready-for-nist-privacy-framework-directLink-1-i-4497.mp3",
"title": "Getting Ready for the NIST Privacy Framework",
"pubdate": "20191107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-sophos-2020-threat-report-directLink-6-i-4499.mp3",
"title": "Inside the Sophos 2020 Threat Report",
"pubdate": "20191106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-preventing-data-exposure-in-cloud-directLink-9-i-4494.mp3",
"title": "Analysis: Preventing Data Exposure in the Cloud",
"pubdate": "20191101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-devices-protecting-critical-data-directLink-9-i-4493.mp3",
"title": "Mobile Devices: Protecting Critical Data",
"pubdate": "20191031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-think-like-attacker-directLink-1-i-4492.mp3",
"title": "How to Think Like an Attacker",
"pubdate": "20191029"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-manage-supply-chain-risks-directLink-8-i-4490.mp3",
"title": "How to Manage Supply Chain Risks",
"pubdate": "20191028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-hunting-elasticsearch-for-big-data-analytics-directLink-2-i-4488.mp3",
"title": "Cloud Security: \"Big Data\" Leak Prevention Essentials",
"pubdate": "20191028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-standards-to-bolster-medical-device-cybersecurity-directLink-3-i-4489.mp3",
"title": "Using Standards to Bolster Medical Device Cybersecurity",
"pubdate": "20191026"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-russian-hackers-hijack-iranian-hacking-tools-directLink-2-i-4487.mp3",
"title": "Analysis: Russian Hackers Hijack Iranian Hacking Tools",
"pubdate": "20191025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/helping-consumers-respond-to-data-breaches-directLink-10-i-4486.mp3",
"title": "Helping Consumers Respond to Data Breaches",
"pubdate": "20191023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-draft-cppa-regulations-fail-to-clarify-ambiguities-directLink-1-i-4485.mp3",
"title": "Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities",
"pubdate": "20191023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-tool-sprawl-directLink-5-i-4482.mp3",
"title": "Managing Tool Sprawl",
"pubdate": "20191021"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/darknet-markets-as-police-crack-down-cybercriminals-adapt-directLink-9-i-4481.mp3",
"title": "Darknet Markets: As Police Crack Down, Cybercriminals Adapt",
"pubdate": "20191018"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zero-trust-securing-access-to-applications-directLink-10-i-4479.mp3",
"title": "How \"Zero Trust\" Better Secures Applications and Access",
"pubdate": "20191018"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/robotic-process-automation-security-issues-directLink-3-i-4480.mp3",
"title": "Robotic Process Automation: Security Essentials",
"pubdate": "20191017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-continuous-compromise-assessment-directLink-5-i-4475.mp3",
"title": "The Ultimate Missing Link in Cyber: Continuous Compromise Assessment",
"pubdate": "20191017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iot-in-vehicles-tyranny-too-much-code-directLink-1-i-4472.mp3",
"title": "IoT in Vehicles: The Trouble With Too Much Code",
"pubdate": "20191016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-source-vulnerabilities-cut-across-sectors-directLink-3-i-4474.mp3",
"title": "Open Source Vulnerabilities Cut Across Sectors",
"pubdate": "20191016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-has-ftc-data-security-enforcement-changed-directLink-2-i-4478.mp3",
"title": "How Has FTC Data Security Enforcement Changed?",
"pubdate": "20191016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-new-iso-privacy-standard-directLink-8-i-4476.mp3",
"title": "Analysis: New ISO Privacy Standard",
"pubdate": "20191015"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stung-by-takedowns-criminals-tap-distributed-dark-markets-directLink-10-i-4477.mp3",
"title": "Stung by Takedowns, Criminals Tap Distributed Dark Markets",
"pubdate": "20191015"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-national-unique-patient-ids-directLink-9-i-4473.mp3",
"title": "Making the Case for National Unique Patient ID",
"pubdate": "20191012"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-twitters-phone-number-repurposing-mistake-directLink-6-i-4471.mp3",
"title": "Analysis: Twitter\"s Phone Number Repurposing \"Mistake\"",
"pubdate": "20191011"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-how-technology-outpacing-regulation-directLink-10-i-4469.mp3",
"title": "Privacy: How Technology Is Outpacing Regulation",
"pubdate": "20191010"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/complying-new-yorks-shield-act-directLink-5-i-4470.mp3",
"title": "Complying With New York\"s SHIELD Act",
"pubdate": "20191010"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasonable-response-to-cyber-incidents-directLink-1-i-4465.mp3",
"title": "A \\\"Reasonable\\\" Response to Cyber Incidents",
"pubdate": "20191010"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unspoken-insider-threat-directLink-8-i-4468.mp3",
"title": "The Unspoken Insider Threat",
"pubdate": "20191009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-open-source-components-matter-directLink-6-i-4463.mp3",
"title": "Application Security: Why Open Source Components Matter",
"pubdate": "20191009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-offense-vs-defense-directLink-8-i-4460.mp3",
"title": "Application Security: Offense Vs. Defense",
"pubdate": "20191009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-ransomware-attacks-critical-steps-directLink-10-i-4467.mp3",
"title": "Responding to Ransomware Attacks: Critical Steps",
"pubdate": "20191008"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/urgent11-vulnerabilities-taking-action-directLink-7-i-4466.mp3",
"title": "URGENT/11 Vulnerabilities: Taking Action",
"pubdate": "20191005"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-huaweis-us-trust-problem-directLink-8-i-4462.mp3",
"title": "Analysis: Huawei\"s US Trust Problem",
"pubdate": "20191004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-ranking-re-evaluated-directLink-4-i-4451.mp3",
"title": "Risk Ranking Re-Evaluated",
"pubdate": "20191004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/remote-desktop-protocol-securing-remote-access-directLink-1-i-4461.mp3",
"title": "Remote Desktop Protocol: Securing Access",
"pubdate": "20191003"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-8-i-4456.mp3",
"title": "Sophos Launches Managed Threat Response",
"pubdate": "20191001"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-study-how-iu-health-manages-vendor-security-risk-directLink-5-i-4457.mp3",
"title": "Case Study: How IU Health Manages Vendor Security Risk",
"pubdate": "20191001"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-president-trump-the-server-directLink-2-i-4454.mp3",
"title": "Analysis: President Trump and \"The Server\"",
"pubdate": "20190927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-cybersecurity-info-sharing-resource-unveiled-directLink-8-i-4453.mp3",
"title": "Healthcare Cybersecurity Info Sharing Resource Unveiled",
"pubdate": "20190926"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-by-design-building-better-apps-services-directLink-6-i-4452.mp3",
"title": "\"Privacy by Design\": Building Better Apps",
"pubdate": "20190925"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-update-email-account-takeover-risks-directLink-1-i-4450.mp3",
"title": "Spear Phishing Update: Email Account Takeover Risks",
"pubdate": "20190920"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-fallout-from-snowden-memoir-directLink-6-i-4449.mp3",
"title": "Analysis: Fallout From the Snowden Memoir",
"pubdate": "20190920"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deception-technology-making-case-directLink-2-i-4448.mp3",
"title": "Deception Technology: Making the Case",
"pubdate": "20190919"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-artificial-intelligence-to-combat-card-fraud-directLink-8-i-4447.mp3",
"title": "Using Artificial Intelligence to Combat Card Fraud",
"pubdate": "20190917"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mainframe-security-challenges-encroaching-perimeter-directLink-7-i-4444.mp3",
"title": "Mainframe Security Challenges: An Encroaching Perimeter",
"pubdate": "20190917"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-gangs-practice-customer-relationship-management-directLink-9-i-4441.mp3",
"title": "Ransomware Gangs Practice Customer Relationship Management",
"pubdate": "20190914"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/for-sale-admin-access-credentials-to-healthcare-systems-directLink-2-i-4442.mp3",
"title": "For Sale: Admin Access Credentials to Healthcare Systems",
"pubdate": "20190913"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-business-email-compromise-attacks-directLink-2-i-4439.mp3",
"title": "Analysis: The Impact of Business Email Compromise Attacks",
"pubdate": "20190913"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/countering-insider-threat-risks-directLink-5-i-4440.mp3",
"title": "Tips on Countering Insider Threat Risks",
"pubdate": "20190913"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/remote-desktop-protocol-security-risks-directLink-6-i-4436.mp3",
"title": "Remote Desktop Protocol: The Security Risks",
"pubdate": "20190911"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-report-on-china-attacking-mobile-devices-directLink-3-i-4434.mp3",
"title": "Analysis: Report on China Attacking Mobile Devices",
"pubdate": "20190906"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dallas-discusses-indicators-behavior-directLink-9-i-4433.mp3",
"title": "Dallas Discusses Indicators of Behavior",
"pubdate": "20190906"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-iot-risks-reinventing-security-directLink-3-i-4432.mp3",
"title": "Managing IoT Risks: Reinventing Security",
"pubdate": "20190903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securitys-role-in-digital-transformation-directLink-3-i-4424.mp3",
"title": "Security\"s Role in Digital Transformation",
"pubdate": "20190903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-how-police-disrupted-cryptomining-malware-gang-directLink-8-i-4430.mp3",
"title": "Analysis: How Police Disrupted a Cryptomining Malware Gang",
"pubdate": "20190830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/judicious-use-ai-ml-directLink-6-i-4431.mp3",
"title": "The \"Judicious\" Use of AI and ML",
"pubdate": "20190830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-texas-ransomware-mess-directLink-2-i-4428.mp3",
"title": "Analysis: The Texas Ransomware Mess",
"pubdate": "20190823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-stages-defense-directLink-10-i-4427.mp3",
"title": "Account Takeover: The Stages of Defense",
"pubdate": "20190822"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-study-improving-id-access-management-directLink-8-i-4421.mp3",
"title": "Case Study: Improving ID and Access Management",
"pubdate": "20190820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-cyberdome-poised-to-protect-2020-elections-directLink-2-i-4420.mp3",
"title": "US CyberDome Poised to Protect 2020 Elections",
"pubdate": "20190816"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/renaissance-deception-technology-directLink-5-i-4418.mp3",
"title": "The Renaissance of Deception Technology",
"pubdate": "20190816"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-credential-for-healthcare-security-leaders-directLink-5-i-4415.mp3",
"title": "A New Credential for Healthcare Security Leaders",
"pubdate": "20190813"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-leadership-next-generation-directLink-8-i-4411.mp3",
"title": "Cybersecurity Leadership: The Next Generation",
"pubdate": "20190809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-7-i-4412.mp3",
"title": "New Playbooks for Cyber Defense",
"pubdate": "20190809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ex-secret-service-agent-tackles-banking-cybercrime-directLink-4-i-4410.mp3",
"title": "Ex-Secret Service Agent Tackles Banking Cybercrime",
"pubdate": "20190808"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reaching-out-to-create-diverse-cybersecurity-workforce-directLink-7-i-4409.mp3",
"title": "Reaching Out to Create a Diverse Cybersecurity Workforce",
"pubdate": "20190807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/standard-would-enable-instant-messaging-among-ehr-platforms-directLink-5-i-4408.mp3",
"title": "Standard Would Enable Instant Messaging Among EHR Platforms",
"pubdate": "20190803"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-capital-one-breach-directLink-1-i-4406.mp3",
"title": "Analysis: The Capital One Breach",
"pubdate": "20190802"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spotlight-on-zero-trust-network-access-directLink-7-i-4395.mp3",
"title": "Spotlight on Zero Trust Network Access",
"pubdate": "20190731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ceo-to-ceo-breach-response-advice-for-capital-one-directLink-6-i-4405.mp3",
"title": "CEO to CEO: Breach Response Advice for Capital One",
"pubdate": "20190731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prolonged-cost-data-breach-directLink-3-i-4403.mp3",
"title": "The Prolonged Cost of a Data Breach",
"pubdate": "20190729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blind-spots-in-threat-landscape-directLink-2-i-4404.mp3",
"title": "Blind Spots in the Threat Landscape",
"pubdate": "20190729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/akamai-sponsored-podcast-directLink-8-i-4398.mp3",
"title": "Evolving to a Zero-Trust Architecture",
"pubdate": "20190726"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/encryption-backdoor-debate-continues-directLink-2-i-4401.mp3",
"title": "The Encryption \"Backdoor\" Debate Continues",
"pubdate": "20190726"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-as-catalyst-for-digital-transformation-directLink-2-i-4388.mp3",
"title": "Security as a Catalyst for Digital Transformation",
"pubdate": "20190725"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-security-skills-crisis-directLink-4-i-4370.mp3",
"title": "Mitigating the Security Skills Crisis",
"pubdate": "20190725"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-thinking-supply-chain-security-directLink-9-i-4383.mp3",
"title": "Rethinking Supply Chain Security",
"pubdate": "20190724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-iam-integration-issues-directLink-7-i-4393.mp3",
"title": "Cloud IAM: Integration Issues",
"pubdate": "20190723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/23-billion-files-exposed-online-root-causes-directLink-3-i-4391.mp3",
"title": "2.3 Billion Files Exposed Online: The Root Causes",
"pubdate": "20190723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-does-api-management-complement-iam-directLink-10-i-4325.mp3",
"title": "How does API Management Complement IAM?",
"pubdate": "20190721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vision-for-omnichannel-authentication-directLink-1-i-4313.mp3",
"title": "The Vision for Omnichannel Authentication",
"pubdate": "20190721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tesla-vulnerability-bounty-hunters-tale-directLink-2-i-4389.mp3",
"title": "Tesla Vulnerability: A Bounty Hunter\"s Tale",
"pubdate": "20190719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proactive-mobile-threat-defense-directLink-4-i-4385.mp3",
"title": "Proactive Mobile Threat Defense",
"pubdate": "20190717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-deception-technology-evolving-directLink-5-i-4387.mp3",
"title": "How Deception Technology Is Evolving",
"pubdate": "20190717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-cyberattacks-lead-to-prolonged-conflicts-directLink-1-i-4386.mp3",
"title": "Will Cyberattacks Lead to Prolonged Conflicts?",
"pubdate": "20190717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/john-halamka-mitigating-medical-device-security-risks-directLink-4-i-4384.mp3",
"title": "John Halamka: Mitigating Medical Device Security Risks",
"pubdate": "20190716"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-thinking-supply-chain-security-directLink-9-i-4383.mp3",
"title": "Re-Thinking Supply Chain Security",
"pubdate": "20190714"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-significance-gdpr-fines-directLink-8-i-4379.mp3",
"title": "Analysis: The Significance of GDPR Fines",
"pubdate": "20190712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-soc-harmonizing-detection-response-directLink-5-i-4380.mp3",
"title": "The Future SOC: Harmonizing Detection and Response",
"pubdate": "20190712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-implications-amca-data-breach-directLink-8-i-4378.mp3",
"title": "Legal Implications of the AMCA Data Breach",
"pubdate": "20190712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/put-those-cloud-security-objections-to-rest-directLink-5-i-4374.mp3",
"title": "Put Those Cloud Security Objections to Rest",
"pubdate": "20190711"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-sharing-hard-directLink-9-i-4376.mp3",
"title": "Threat Intelligence: Why Sharing Is Difficult",
"pubdate": "20190709"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-your-best-cyber-defense-directLink-8-i-4363.mp3",
"title": "Why Application Security Is Your Best Cyber Defense",
"pubdate": "20190709"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/life-beyond-passwords-rise-advanced-biometrics-directLink-4-i-4373.mp3",
"title": "Life Beyond Passwords: The Rise of Advanced Biometrics",
"pubdate": "20190705"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-strong-vs-weak-encryption-directLink-8-i-4375.mp3",
"title": "Analysis: Strong vs. Weak Encryption",
"pubdate": "20190705"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-threat-intelligence-directLink-10-i-4372.mp3",
"title": "The New Threat Intelligence",
"pubdate": "20190702"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/put-those-cloud-security-objections-to-rest-directLink-5-i-4374.mp3",
"title": "Put Those Cloud Security Objections to Rest",
"pubdate": "20190701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mastercard-on-evolution-authentication-directLink-2-i-4364.mp3",
"title": "Mastercard on the Evolution of Authentication",
"pubdate": "20190629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dan-boweden-directLink-1-i-4369.mp3",
"title": "Case Study: Moving to DevSecOps",
"pubdate": "20190629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/third-party-risk-management-asking-right-questions-directLink-4-i-4368.mp3",
"title": "Third-Party Risk Management: Asking the Right Questions",
"pubdate": "20190628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloudflare-calls-internet-outage-small-heart-attack-directLink-6-i-4367.mp3",
"title": "Cloudflare Calls Internet Outage \"Small Heart Attack\"",
"pubdate": "20190628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zscalers-global-ciso-stan-lowe-on-security-as-catalyst-for-digital-transformation-directLink-6-i-4366.mp3",
"title": "Zscaler\"s Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation",
"pubdate": "20190628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-blended-threats-directLink-2-i-4365.mp3",
"title": "The Evolution of Automated, Active Attacks",
"pubdate": "20190627"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-as-game-changing-breach-defense-directLink-9-i-4352.mp3",
"title": "Identity as a Game-Changing Breach Defense",
"pubdate": "20190626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-iam-in-cloud-directLink-6-i-4362.mp3",
"title": "The Evolution of IAM in the Cloud",
"pubdate": "20190625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-resilience-finding-right-balance-directLink-1-i-4361.mp3",
"title": "Risk and Resilience: Finding the Right Balance",
"pubdate": "20190625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/developing-robust-third-party-risk-management-program-directLink-6-i-4360.mp3",
"title": "Developing a Robust Third-Party Risk Management Program",
"pubdate": "20190624"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-top-challenges-directLink-5-i-4359.mp3",
"title": "Medical Device Cybersecurity: The Top Challenges",
"pubdate": "20190624"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/migrating-to-cloud-top-security-lessons-directLink-9-i-4358.mp3",
"title": "Migrating to the Cloud: Top Security Lessons",
"pubdate": "20190622"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facebooks-cryptocurrency-plan-scrutinized-directLink-7-i-4357.mp3",
"title": "Facebook\"s Cryptocurrency Plan Scrutinized",
"pubdate": "20190621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/extreme-but-plausible-cyberthreats-directLink-9-i-4355.mp3",
"title": "\"Extreme But Plausible\" Cyberthreats",
"pubdate": "20190619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reinventing-security-awareness-training-directLink-9-i-4353.mp3",
"title": "Reinventing Security Awareness Training",
"pubdate": "20190619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-insights-on-breach-detection-directLink-10-i-4356.mp3",
"title": "A CISO\"s Insights on Breach Detection",
"pubdate": "20190618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/charlotte-leaders-focus-on-third-party-risk-directLink-7-i-4354.mp3",
"title": "Charlotte Leaders Focus on Third-Party Risk",
"pubdate": "20190617"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-cybersecurity-risks-major-corporations-face-directLink-6-i-4350.mp3",
"title": "Analysis: The Cybersecurity Risks Major Corporations Face",
"pubdate": "20190614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberattack-risk-scans-find-big-businesses-exposed-directLink-4-i-4349.mp3",
"title": "Cyberattack Risk: Scans Find Big Businesses Exposed",
"pubdate": "20190613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-stands-out-in-proposed-premera-lawsuit-settlement-directLink-2-i-4348.mp3",
"title": "What Stands Out in Proposed Premera Lawsuit Settlement?",
"pubdate": "20190612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-apples-new-single-sign-on-feature-directLink-1-i-4345.mp3",
"title": "Analysis: Apple\"s New Single Sign-On Feature",
"pubdate": "20190607"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zero-trust-secure-access-in-complex-environments-directLink-5-i-4341.mp3",
"title": "Zero Trust: Secure Access in Complex Environments",
"pubdate": "20190605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/closing-cybersecurity-skills-gap-directLink-5-i-4324.mp3",
"title": "Closing the Cybersecurity Skills Gap",
"pubdate": "20190605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fingerpointing-over-baltimores-ransomware-attack-directLink-10-i-4344.mp3",
"title": "Fingerpointing Over Baltimore\"s Ransomware Attack",
"pubdate": "20190531"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-source-security-how-to-defend-at-speed-attack-directLink-9-i-4343.mp3",
"title": "Open Source Security - How to Defend at the Speed of Attack",
"pubdate": "20190530"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vision-for-omnichannel-authentication-directLink-1-i-4313.mp3",
"title": "The Vision for Omnichannel Authentication",
"pubdate": "20190530"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-roundtable-recap-securing-digital-enterprise-directLink-5-i-4339.mp3",
"title": "Executive Roundtable Recap: Securing the Digital Enterprise",
"pubdate": "20190524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcares-unique-digital-transformation-directLink-8-i-4340.mp3",
"title": "Healthcare\"s Unique Digital Transformation",
"pubdate": "20190524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wannacry-still-causing-tears-two-years-on-directLink-6-i-4335.mp3",
"title": "WannaCry Still Causing Tears 2 Years On",
"pubdate": "20190524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-roundtable-recap-confessions-healthcare-ciso-directLink-7-i-4333.mp3",
"title": "Executive Roundtable Recap: Confessions of a Healthcare CISO",
"pubdate": "20190524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-dbir-c-level-executives-in-crosshairs-directLink-2-i-4334.mp3",
"title": "Verizon DBIR: C-Level Executives in the Crosshairs",
"pubdate": "20190523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lack-secure-coding-called-national-security-threat-directLink-9-i-4332.mp3",
"title": "Lack of Secure Coding Called a National Security Threat",
"pubdate": "20190521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whatsapps-spyware-problem-directLink-6-i-4329.mp3",
"title": "WhatsApp\"s Spyware Problem",
"pubdate": "20190517"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whatsapp-exploit-reveals-legalized-hacking-at-work-directLink-9-i-4326.mp3",
"title": "WhatsApp Exploit Reveals \"Legalized Hacking\" at Work",
"pubdate": "20190515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emergence-unified-endpoint-management-directLink-6-i-4317.mp3",
"title": "Capturing ROI on Your Unified Endpoint Management Investment",
"pubdate": "20190515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-does-api-management-complement-iam-directLink-10-i-4325.mp3",
"title": "How does API Management Complement IAM?",
"pubdate": "20190513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-digital-onboarding-directLink-6-i-4323.mp3",
"title": "The Future of Digital Onboarding",
"pubdate": "20190510"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-security-driven-networking-directLink-8-i-4320.mp3",
"title": "The Rise of Security-Driven Networking",
"pubdate": "20190510"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deepdotweb-goes-dark-directLink-8-i-4319.mp3",
"title": "DeepDotWeb Goes Dark",
"pubdate": "20190510"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-blended-cyberattacks-directLink-4-i-4318.mp3",
"title": "Responding to Blended Cyberattacks",
"pubdate": "20190509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-roundtable-recap-confessions-healthcare-ciso-directLink-7-i-4333.mp3",
"title": "Executive Roundtable Recap: \\\"Confessions of a Healthcare CISO\\\"",
"pubdate": "20190508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-healthcare-apps-critical-steps-directLink-10-i-4316.mp3",
"title": "Safeguarding PHI in Healthcare Apps: Critical Steps",
"pubdate": "20190508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cultural-challenges-digital-transformation-directLink-1-i-4321.mp3",
"title": "Cultural Challenges and Digital Transformation",
"pubdate": "20190506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vision-for-omnichannel-authentication-directLink-1-i-4313.mp3",
"title": "The Vision for Omnichannel Authentication",
"pubdate": "20190504"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/five-eyes-intelligence-agencies-discuss-strategies-directLink-3-i-4314.mp3",
"title": "\"Five Eyes\" Intelligence Agencies Discuss Strategies",
"pubdate": "20190503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-cyber-threat-landscape-directLink-1-i-4285.mp3",
"title": "Assessing the Cyber Threat Landscape",
"pubdate": "20190503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-in-hhs-latest-plan-for-nationwide-health-data-exchange-directLink-4-i-4312.mp3",
"title": "What\"s in HHS\" New Plan for Nationwide Health Data Exchange?",
"pubdate": "20190502"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malware-evolution-exploits-defenses-directLink-2-i-4310.mp3",
"title": "Malware: The Evolution of Exploits and Defenses",
"pubdate": "20190430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-management-finding-common-ground-directLink-5-i-4309.mp3",
"title": "Identity Management: Finding Common Ground",
"pubdate": "20190429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vendor-risk-management-better-approach-directLink-8-i-4307.mp3",
"title": "Vendor Risk Management: A Better Approach",
"pubdate": "20190427"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-peril-facebooks-marketplace-flaw-directLink-6-i-4306.mp3",
"title": "Privacy Peril: Facebook\"s Marketplace Flaw",
"pubdate": "20190426"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hsbc-whistleblower-fraud-crackdown-still-has-long-way-to-go-directLink-9-i-4305.mp3",
"title": "HSBC Whistleblower: Fraud Fight Still Has Long Way to Go",
"pubdate": "20190424"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dangers-unsecured-medical-devices-directLink-5-i-4298.mp3",
"title": "The Dangers of Unsecured Medical Devices",
"pubdate": "20190420"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/so-smart-child-tech-has-hackable-flaws-directLink-3-i-4296.mp3",
"title": "Not So \"Smart\" - Child Tech Has Hackable Flaws",
"pubdate": "20190419"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-authorised-push-payment-fraud-directLink-10-i-4270.mp3",
"title": "Defending Against Authorized Push Payment Fraud",
"pubdate": "20190417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/alexa-are-you-hipaa-compliant-directLink-10-i-4293.mp3",
"title": "\"Alexa, Are You HIPAA Compliant?\"",
"pubdate": "20190417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/raising-bar-on-browser-security-directLink-10-i-4294.mp3",
"title": "Raising the Bar on Browser Security",
"pubdate": "20190416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-security-finding-balance-directLink-8-i-4292.mp3",
"title": "Privacy and Security: Finding the Balance",
"pubdate": "20190415"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/another-scathing-equifax-post-breach-report-directLink-8-i-4291.mp3",
"title": "Another Scathing Equifax Post-Breach Report",
"pubdate": "20190412"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/women-in-cybersecurity-progress-report-directLink-1-i-4288.mp3",
"title": "Women in Cybersecurity: A Progress Report",
"pubdate": "20190410"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-evolving-ransomware-threat-directLink-8-i-4286.mp3",
"title": "Analysis: The Evolving Ransomware Threat",
"pubdate": "20190405"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-75-million-ucla-health-data-breach-settlement-directLink-1-i-4282.mp3",
"title": "Analyzing the $7.5 Million UCLA Health Data Breach Settlement",
"pubdate": "20190330"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-policy-protect-2020-elections-directLink-9-i-4280.mp3",
"title": "Can Cyber Policy Protect the 2020 Elections?",
"pubdate": "20190329"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-security-strategies-for-2019-directLink-5-i-4243.mp3",
"title": "Network Security Strategies for 2019",
"pubdate": "20190322"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-5-i-4277.mp3",
"title": "Norsk Hydro\"s Ransomware Headache",
"pubdate": "20190322"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zscalers-stan-lowe-on-digital-transformation-directLink-10-i-4267.mp3",
"title": "Zscaler\"s Stan Lowe on Digital Transformation",
"pubdate": "20190316"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roundtable-review-digital-transformation-in-seattle-directLink-5-i-4263.mp3",
"title": "Roundtable Review: Digital Transformation in Seattle",
"pubdate": "20190316"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-prosilience-in-iot-security-directLink-9-i-4273.mp3",
"title": "The Role of \"Prosilience\" in IoT Security",
"pubdate": "20190315"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-machine-learning-for-fraud-prevention-directLink-1-i-4269.mp3",
"title": "Using Machine Learning for Fraud Prevention",
"pubdate": "20190314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/highlights-rsa-conference-2019-directLink-3-i-4266.mp3",
"title": "Highlights of RSA Conference",
"pubdate": "20190308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenges-implementing-next-generation-iam-directLink-8-i-4262.mp3",
"title": "The Challenges of Implementing Next-Generation IAM",
"pubdate": "20190304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bridging-cybersecurity-skills-gap-directLink-4-i-4265.mp3",
"title": "Bridging the Cybersecurity Skills Gap",
"pubdate": "20190301"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/greg-touhill-pre-rsa-directLink-3-i-4261.mp3",
"title": "Filling Vacant Cybersecurity Jobs: The Role of \"Reskilling\"",
"pubdate": "20190227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-blocking-rules-what-they-would-mean-for-cisos-directLink-10-i-4260.mp3",
"title": "Information Blocking Rules: What They Would Mean for CISOs",
"pubdate": "20190223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/password-manager-weaknesses-revealed-directLink-7-i-4259.mp3",
"title": "Password Manager Weaknesses Revealed",
"pubdate": "20190222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-security-considerations-for-ai-robotics-directLink-2-i-4258.mp3",
"title": "Key Security Considerations for AI and Robotics",
"pubdate": "20190219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-cryptocurrency-in-era-deep-fakes-directLink-7-i-4256.mp3",
"title": "Protecting Cryptocurrency in the Era of \"Deep Fakes\"",
"pubdate": "20190215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/parker-on-blockchain-directLink-6-i-4255.mp3",
"title": "Blockchain in Healthcare: The Potential Benefits, Risks",
"pubdate": "20190215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/onc-directLink-5-i-4254.mp3",
"title": "Deciphering HHS\" Proposed Information Blocking Rules",
"pubdate": "20190214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-gravity-will-weigh-down-cloud-security-directLink-9-i-4253.mp3",
"title": "Data Gravity: Will It Weigh Down Cloud Security?",
"pubdate": "20190214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/orchestrating-ssl-visibility-directLink-9-i-4237.mp3",
"title": "Orchestrating SSL Visibility",
"pubdate": "20190214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heesters-at-himss-directLink-8-i-4250.mp3",
"title": "HIPAA Enforcement Update: Areas of Focus",
"pubdate": "20190213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keeping-incident-response-plans-current-directLink-4-i-4249.mp3",
"title": "Keeping Incident Response Plans Current",
"pubdate": "20190213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cyber-risk-enterprise-problem-directLink-7-i-4245.mp3",
"title": "Medical Device Cyber Risk: An Enterprise Problem",
"pubdate": "20190213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-preview-directLink-9-i-4251.mp3",
"title": "RSA Conference 2019: A Preview",
"pubdate": "20190212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zscalers-bil-harmer-on-digital-transformation-directLink-4-i-4238.mp3",
"title": "Zscaler\"s Bil Harmer on Digital Transformation",
"pubdate": "20190212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mehring-wirth-at-himss-directLink-2-i-4247.mp3",
"title": "Health Data Security: The Most Promising Technologies",
"pubdate": "20190212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-iot-risks-in-healthcare-environments-directLink-2-i-4246.mp3",
"title": "Assessing IoT Risks in Healthcare Environments",
"pubdate": "20190211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-us-vulnerability-to-nation-state-cyberattack-directLink-4-i-4244.mp3",
"title": "Assessing US Vulnerability to a Nation-State Cyberattack",
"pubdate": "20190208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bolstering-cybersecurity-medical-devices-directLink-1-i-4241.mp3",
"title": "Bolstering the Cybersecurity of Medical Devices",
"pubdate": "20190207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-digital-enterprise-directLink-6-i-4240.mp3",
"title": "Fortinet\"s Sonia Arista on Securing the Digital Enterprise",
"pubdate": "20190206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-faces-fraud-survey-analysis-directLink-7-i-4193.mp3",
"title": "New Faces of Fraud: Survey Analysis",
"pubdate": "20190206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/persistent-threat-nation-state-cyberattacks-directLink-3-i-4236.mp3",
"title": "The Persistent Threat of Nation-State Cyberattacks",
"pubdate": "20190201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-integration-orchestration-help-in-battling-cyberthreats-directLink-4-i-4231.mp3",
"title": "How Integration, Orchestration Help in Battling Cyberthreats",
"pubdate": "20190131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-on-value-endpoint-detection-response-directLink-10-i-4234.mp3",
"title": "A CISO on the Value of Endpoint Detection and Response",
"pubdate": "20190131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptocurrency-money-laundering-alarming-new-trends-directLink-1-i-4235.mp3",
"title": "Cryptocurrency Money Laundering: Alarming New Trends",
"pubdate": "20190131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-matrix-emotet-how-they-work-how-to-defend-directLink-7-i-4232.mp3",
"title": "Inside Matrix and Emotet: How They Work, and How to Defend",
"pubdate": "20190130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/government-spending-on-cybersecurity-analysis-directLink-7-i-4233.mp3",
"title": "Government Spending on Cybersecurity: An Analysis",
"pubdate": "20190130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-case-study-identity-access-management-directLink-6-i-4230.mp3",
"title": "Healthcare Case Study: Identity and Access Management",
"pubdate": "20190126"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasons-behind-googles-gdpr-fine-directLink-1-i-4229.mp3",
"title": "The Reasons Behind Google\"s GDPR Fine",
"pubdate": "20190125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-studies-global-impact-gdpr-directLink-6-i-4228.mp3",
"title": "Cisco Studies Global Impact of GDPR",
"pubdate": "20190124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mergers-acquisitions-privacy-security-considerations-directLink-1-i-4227.mp3",
"title": "Mergers & Acquisitions: Privacy and Security Considerations",
"pubdate": "20190123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/life-under-gdpr-waiting-for-data-breach-precedents-directLink-10-i-4226.mp3",
"title": "Life Under GDPR: Data Breach Cost Unknown",
"pubdate": "20190123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-smarter-about-threat-intelligence-directLink-5-i-4220.mp3",
"title": "Getting Smarter About Threat Intelligence",
"pubdate": "20190122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legacy-medical-devices-tackling-cybersecurity-challenges-directLink-1-i-4225.mp3",
"title": "Legacy Medical Devices: Tackling Cybersecurity Challenges",
"pubdate": "20190119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chris-ahern-interview-to-come-directLink-8-i-4223.mp3",
"title": "Venture Capital Pours Into Cybersecurity",
"pubdate": "20190118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-pervasive-evolving-threat-directLink-10-i-4224.mp3",
"title": "Ransomware: A Pervasive, Evolving Threat",
"pubdate": "20190118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avoiding-critical-security-risk-analysis-mistakes-directLink-8-i-4221.mp3",
"title": "Avoiding Critical Security Risk Analysis Mistakes",
"pubdate": "20190116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/quantum-computing-sizing-up-risks-to-security-directLink-7-i-4222.mp3",
"title": "Quantum Computing: Sizing Up the Risks to Security",
"pubdate": "20190116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/card-not-present-fraud-costs-mount-directLink-2-i-4218.mp3",
"title": "Card-Not-Present Fraud Costs Mount",
"pubdate": "20190111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/card-not-present-fraud-growth-no-end-in-sight-directLink-6-i-4217.mp3",
"title": "Card-Not-Present Fraud Growth: No End in Sight?",
"pubdate": "20190108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-to-next-generation-soc-critical-factors-directLink-5-i-4216.mp3",
"title": "Moving to a Next-Generation SOC: Critical Factors",
"pubdate": "20190107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchains-biggest-potential-in-healthcare-directLink-9-i-4215.mp3",
"title": "Blockchain\"s Biggest Potential in Healthcare",
"pubdate": "20190105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-zero-trust-security-directLink-7-i-4214.mp3",
"title": "Making the Case for Zero-Trust Security",
"pubdate": "20190104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ongoing-battle-to-secure-card-payments-directLink-8-i-4211.mp3",
"title": "The Ongoing Battle to Secure Card Payments",
"pubdate": "20190103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/microsofts-top-3-cybersecurity-targets-for-2019-directLink-5-i-4212.mp3",
"title": "Microsoft\"s Top 3 Cybersecurity Concerns for 2019",
"pubdate": "20190103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-detection-omnichannel-approach-directLink-7-i-4213.mp3",
"title": "Fraud Detection: An Omnichannel Approach",
"pubdate": "20190103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-2019-be-turning-point-for-self-sovereign-identity-directLink-8-i-4199.mp3",
"title": "Will 2019 Be a Turning Point for \"Self-Sovereign Identity\"?",
"pubdate": "20190102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nahra-directLink-3-i-4200.mp3",
"title": "What\"s Next for HIPAA?",
"pubdate": "20181231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mastercard-podcast-directLink-3-i-4207.mp3",
"title": "Why Mastercard Launched a \"Fusion Center\" for Security",
"pubdate": "20181231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/plans-predictions-for-cybersecurity-in-2019-directLink-2-i-4209.mp3",
"title": "Plans and Predictions for Cybersecurity in 2019",
"pubdate": "20181228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/john-houston-directLink-5-i-4189.mp3",
"title": "Why Cybersecurity Remains a Top C-Suite Concern",
"pubdate": "20181226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/promising-security-technologies-in-year-ahead-directLink-1-i-4194.mp3",
"title": "Promising Security Technologies in the Year Ahead",
"pubdate": "20181224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-robotic-process-automation-directLink-1-i-4205.mp3",
"title": "Fighting Fraud With Robotic Process Automation",
"pubdate": "20181222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fine-tuning-security-operations-center-directLink-9-i-4203.mp3",
"title": "Fine-Tuning the Security Operations Center",
"pubdate": "20181222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-responding-to-new-wave-directLink-2-i-4202.mp3",
"title": "Account Takeover: Responding to the New Wave",
"pubdate": "20181222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-behavioral-analytics-to-protect-against-threats-directLink-2-i-4204.mp3",
"title": "Using Behavioral Analytics to Protect Against Threats",
"pubdate": "20181221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-care-act-viable-gdpr-equivalent-directLink-8-i-4201.mp3",
"title": "The Data Care Act: A Viable GDPR Equivalent?",
"pubdate": "20181221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2019-iot-security-outlook-directLink-1-i-4198.mp3",
"title": "2019 IoT Security Outlook",
"pubdate": "20181218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/did-china-hack-marriott-or-this-fake-news-directLink-6-i-4196.mp3",
"title": "Did China Hack Marriott, Or Is This Fake News?",
"pubdate": "20181214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/akamai-sponsored-podcast-part-ii-directLink-4-i-4190.mp3",
"title": "Fighting Credential Stuffing Attacks",
"pubdate": "20181210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gop-hacking-incident-what-happened-directLink-1-i-4188.mp3",
"title": "GOP Hacking Incident: What Happened?",
"pubdate": "20181207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/applying-secure-multiparty-computation-technology-directLink-9-i-4187.mp3",
"title": "Applying Secure Multiparty Computation Technology",
"pubdate": "20181206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/federal-prosecutors-discuss-samsam-indictments-directLink-10-i-4185.mp3",
"title": "Federal Prosecutors Discuss SamSam Indictments",
"pubdate": "20181130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malware-analysis-for-blue-teams-directLink-9-i-4157.mp3",
"title": "Malware Analysis for Blue Teams",
"pubdate": "20181129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-cloud-insecurity-directLink-3-i-4172.mp3",
"title": "The State of Cloud (In)Security",
"pubdate": "20181128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-risks-posed-by-automotive-smartphone-apps-directLink-7-i-4184.mp3",
"title": "Managing the Risks Posed by Automotive Smartphone Apps",
"pubdate": "20181128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacking-your-ride-risks-posed-by-automotive-smartphone-apps-directLink-5-i-4181.mp3",
"title": "Hacking Your Ride: Risks Posed by Automotive Smartphone Apps",
"pubdate": "20181123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hhs-deputy-secretary-eric-hargan-describes-cyber-initiative-directLink-4-i-4178.mp3",
"title": "HHS Deputy Secretary Eric Hargan Describes Cyber Initiative",
"pubdate": "20181120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/china-hack-attacks-economic-espionage-campaign-directLink-2-i-4175.mp3",
"title": "China\"s Hack Attacks: An Economic Espionage Campaign",
"pubdate": "20181116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-jonathan-care-gartner-directLink-5-i-4171.mp3",
"title": "Using Unsupervised Machine Learning: The Challenges",
"pubdate": "20181114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-fdas-reworked-premarket-medical-device-guidance-directLink-1-i-4168.mp3",
"title": "Analysis: FDA\"s Reworked Premarket Medical Device Guidance",
"pubdate": "20181113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-getting-most-from-mssp-directLink-8-i-4167.mp3",
"title": "Tips for Getting the Most From an MSSP",
"pubdate": "20181112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cracking-down-on-criminals-use-encrypted-communications-directLink-3-i-4170.mp3",
"title": "Cracking Down on Criminals\" Use of Encrypted Communications",
"pubdate": "20181109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-authentication-landscape-directLink-8-i-4165.mp3",
"title": "State of the Authentication Landscape",
"pubdate": "20181107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-third-party-risk-in-age-ransomware-directLink-1-i-4166.mp3",
"title": "Managing Third-Party Risk in the Age of Ransomware",
"pubdate": "20181107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inteview-felix-gaetghens-gartner-directLink-1-i-4163.mp3",
"title": "How IAM is Evolving in the Blockchain Era",
"pubdate": "20181105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-aseem-ahmed-akamai-customised-podcast-part-i-directLink-8-i-4162.mp3",
"title": "Bots and Botnets: Addressing the Evolving Security Challenges",
"pubdate": "20181103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/escalating-problem-protecting-connected-devices-directLink-5-i-4164.mp3",
"title": "The Escalating Problem of Protecting Connected Devices",
"pubdate": "20181102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nick-legal-summit-podcast-directLink-2-i-4161.mp3",
"title": "Managing Cyber Risks: A New Tool for Banks",
"pubdate": "20181101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mayo-clinic-expert-on-medical-device-security-best-practices-directLink-3-i-4159.mp3",
"title": "Medical Device Security Best Practices From Mayo Clinic",
"pubdate": "20181031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vendor-risk-management-conquering-challenges-directLink-5-i-4152.mp3",
"title": "Healthcare Security Summit Speaker on Vendor Risk Management",
"pubdate": "20181030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/connolly-directLink-1-i-4156.mp3",
"title": "How to Use FDA\"s Medical Device Cybersecurity \"Playbook\"",
"pubdate": "20181027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-facebook-fine-just-beginning-directLink-7-i-4155.mp3",
"title": "UK Facebook Fine: Just the Beginning?",
"pubdate": "20181026"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-vmware-coo-raghu-raghuram-directLink-4-i-4151.mp3",
"title": "Securing \"East-West\" Traffic in the Cloud",
"pubdate": "20181022"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-real-time-risk-management-directLink-6-i-4153.mp3",
"title": "The Need for Real-Time Risk Management",
"pubdate": "20181022"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-cyberattack-investigations-analysis-directLink-7-i-4150.mp3",
"title": "UK Cyberattack Investigations: An Analysis",
"pubdate": "20181019"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-gartner-sid-deshpande-directLink-4-i-4146.mp3",
"title": "Completely Outsourced Security: A Bad Idea",
"pubdate": "20181018"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/finserv-in-2019-cloudy-chance-uncertainty-directLink-4-i-4149.mp3",
"title": "FinServ Cybersecurity: Risk in an Era of Enterprise IoT and OT",
"pubdate": "20181017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/update-nist-preparing-privacy-framework-directLink-1-i-4148.mp3",
"title": "Update: NIST Preparing Privacy Framework",
"pubdate": "20181016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-president-on-case-for-risk-based-security-model-directLink-7-i-4147.mp3",
"title": "RSA President on the Case for a Risk-Based Security Model",
"pubdate": "20181015"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-lawrence-orans-gartner-directLink-4-i-4141.mp3",
"title": "Network vs. Endpoint Security: Striking the Right Balance",
"pubdate": "20181013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-critical-infrastructure-from-cyberattacks-directLink-1-i-4145.mp3",
"title": "Safeguarding Critical Infrastructure From Cyberattacks",
"pubdate": "20181013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessment-googles-data-leak-directLink-5-i-4143.mp3",
"title": "An Assessment of Google\"s Data Leak",
"pubdate": "20181012"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-business-email-compromise-attacks-directLink-3-i-4142.mp3",
"title": "Defending Against Business Email Compromise Attacks",
"pubdate": "20181010"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-biometrics-key-challenges-directLink-6-i-4140.mp3",
"title": "Behavioral Biometrics: Key Challenges",
"pubdate": "20181009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preventing-doomsday-healthcare-cyber-event-directLink-7-i-4139.mp3",
"title": "Preventing a \"Doomsday\" Healthcare Cyber Event",
"pubdate": "20181009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-opioid-legislation-stripped-privacy-provision-directLink-1-i-4138.mp3",
"title": "Analysis: Opioid Legislation Stripped of Privacy Provision",
"pubdate": "20181008"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-facebook-breachs-impact-directLink-7-i-4137.mp3",
"title": "Analysis: Facebook Breach\"s Impact",
"pubdate": "20181005"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-security-building-public-confidence-directLink-7-i-4136.mp3",
"title": "Election Security: Building Public Confidence",
"pubdate": "20181004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-insider-threat-what-works-directLink-7-i-4133.mp3",
"title": "Battling the Insider Threat: What Works?",
"pubdate": "20181003"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-works-on-security-for-new-payment-options-directLink-2-i-4132.mp3",
"title": "PCI SSC Works on Security for New Payment Options",
"pubdate": "20181002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-threats-myths-realities-directLink-7-i-4115.mp3",
"title": "Mobile Threats: Myths and Realities",
"pubdate": "20181002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-kelly-kavanaugh-gartner-directLink-7-i-4131.mp3",
"title": "SOC Analytics: Building the Right Toolset",
"pubdate": "20181001"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-jim-barkdoll-ceo-titus-directLink-7-i-4129.mp3",
"title": "How Machine Learning Enhances Data Classification",
"pubdate": "20181001"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lucci-directLink-3-i-4130.mp3",
"title": "Preventing Business Associate Health Data Breaches",
"pubdate": "20180929"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reaction-to-new-white-house-cybersecurity-strategy-directLink-9-i-4128.mp3",
"title": "The Reaction to New White House Cybersecurity Strategy",
"pubdate": "20180928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reputational-risk-third-party-validation-directLink-2-i-4126.mp3",
"title": "Reputational Risk and Third-Party Validation",
"pubdate": "20180927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breach-class-action-lawsuits-come-to-europe-directLink-8-i-4125.mp3",
"title": "GDPR: Data Breach Class Action Lawsuits Come to Europe",
"pubdate": "20180926"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/midterm-election-security-patching-critical-issue-directLink-6-i-4127.mp3",
"title": "Midterm Election Security: Why Patching Is a Critical Issue",
"pubdate": "20180926"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-ddos-detection-defense-directLink-2-i-4124.mp3",
"title": "Advanced DDoS Detection and Defense",
"pubdate": "20180925"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-will-gdpr-show-its-teeth-directLink-3-i-4122.mp3",
"title": "When Will GDPR Show Its Teeth?",
"pubdate": "20180921"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-on-secure-automation-jeffery-kok-cyberark-directLink-1-i-4123.mp3",
"title": "Securing Software Automation, Orchestration",
"pubdate": "20180921"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fresh-look-at-outsourcing-directLink-6-i-4121.mp3",
"title": "A Fresh Look at Outsourcing",
"pubdate": "20180920"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-compliance-common-misconceptions-directLink-7-i-4120.mp3",
"title": "GDPR Compliance: Common Misconceptions",
"pubdate": "20180920"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-for-pipeda-directLink-6-i-4106.mp3",
"title": "Preparing for PIPEDA",
"pubdate": "20180918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-information-exchange-missing-links-directLink-3-i-4117.mp3",
"title": "Health Information Exchange: The Missing Links",
"pubdate": "20180918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equifax-breach-key-lessons-learned-directLink-6-i-4114.mp3",
"title": "Equifax Breach: Key Lessons Learned",
"pubdate": "20180914"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-rapid7-ceo-corey-thomas-directLink-7-i-4113.mp3",
"title": "Operationalizing Security: A Targeted Approach to \"SecOps\"",
"pubdate": "20180912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-vendor-security-risk-management-directLink-1-i-4112.mp3",
"title": "Simplifying Vendor Security Risk Management",
"pubdate": "20180912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-matthew-moynahan-ceo-forcepoint-directLink-7-i-4109.mp3",
"title": "Going Beyond a \"Walled-Garden\" Approach",
"pubdate": "20180910"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-payments-security-lessons-from-canada-directLink-8-i-4108.mp3",
"title": "Digital Payments Security: Lessons From Canada",
"pubdate": "20180908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managed-threat-hunting-directLink-2-i-4103.mp3",
"title": "Why Managed Threat Hunting?",
"pubdate": "20180908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/computer-voting-national-disgrace-directLink-7-i-4107.mp3",
"title": "Computer Voting: A \"National Disgrace\"",
"pubdate": "20180907"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-dale-gardner-gartner-appsec-directLink-4-i-4104.mp3",
"title": "Demystifying DevSecOps and Its Role in App Security",
"pubdate": "20180907"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-midterm-elections-are-hackable-directLink-3-i-4105.mp3",
"title": "Why the Midterm Elections Are Hackable",
"pubdate": "20180906"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fresh-look-at-security-analytics-directLink-7-i-4098.mp3",
"title": "A Fresh Look at Security Analytics",
"pubdate": "20180905"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fintech-apps-consumer-privacy-concerns-remain-high-directLink-2-i-4101.mp3",
"title": "Fintech Apps: Consumer Privacy Concerns Remain High",
"pubdate": "20180905"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-russian-misinformation-campaign-directLink-1-i-4099.mp3",
"title": "Analysis: Russian Misinformation Campaign",
"pubdate": "20180831"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-iot-feasible-directLink-8-i-4097.mp3",
"title": "Securing IoT: Is It Feasible?",
"pubdate": "20180830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wheres-i-in-your-idaas-directLink-3-i-4085.mp3",
"title": "Where\"s the \\\"I\\\" in Your IDaaS?",
"pubdate": "20180830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/regulations-create-pressure-to-take-privacy-more-seriously-directLink-5-i-4096.mp3",
"title": "Regulations Create Pressure to Take Privacy More Seriously",
"pubdate": "20180829"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/paying-ransoms-more-cons-than-pros-directLink-6-i-4089.mp3",
"title": "Paying Ransoms: More Cons Than Pros",
"pubdate": "20180827"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-james-heinzman-thetaray-directLink-8-i-4080.mp3",
"title": "Unsupervised Machine Learning: Fighting Cross-Channel Fraud",
"pubdate": "20180825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/has-ship-sailed-on-securing-midterm-elections-directLink-2-i-4086.mp3",
"title": "Has the Ship Sailed on Securing Midterm Elections?",
"pubdate": "20180824"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/directtrusts-kibbe-on-future-health-info-exchange-directLink-5-i-4084.mp3",
"title": "DirectTrust\"s Kibbe on the Future of Health Info Exchange",
"pubdate": "20180824"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/modern-identity-access-management-how-to-build-trust-without-sacrificing-security-directLink-10-i-4079.mp3",
"title": "Modern Identity and Access Management: How to Build Trust without Sacrificing Security",
"pubdate": "20180823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-anthem-data-breach-settlement-directLink-3-i-4083.mp3",
"title": "Analysis: Anthem Data Breach Settlement",
"pubdate": "20180823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-malware-targets-mexico-will-spread-directLink-5-i-4082.mp3",
"title": "Banking Malware Targets Mexico; Will It Spread?",
"pubdate": "20180823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/road-to-business-driven-security-directLink-8-i-4111.mp3",
"title": "The Road to Business-Driven Security",
"pubdate": "20180822"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/widespread-phishing-campaign-targets-financial-institutions-directLink-6-i-4078.mp3",
"title": "Widespread Phishing Campaign Targets Financial Institutions",
"pubdate": "20180818"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/industrial-internet-things-emerging-risks-directLink-4-i-4075.mp3",
"title": "The Industrial Internet of Things: Emerging Risks",
"pubdate": "20180817"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-ai-ml-make-security-cheaper-directLink-9-i-4072.mp3",
"title": "Will AI and ML Make Security Cheaper?",
"pubdate": "20180815"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobileweb-app-security-how-do-you-know-its-working-directLink-10-i-4095.mp3",
"title": "Mobile/Web App Security: How Do You Know it\"s Working?",
"pubdate": "20180814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-many-legacy-medical-device-security-flaws-going-unfixed-directLink-4-i-4074.mp3",
"title": "Are Legacy Medical Device Security Flaws Going Unfixed?",
"pubdate": "20180814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tracking-manufacturing-cybersecurity-threats-directLink-7-i-4073.mp3",
"title": "Tracking Cybersecurity Threats in Manufacturing",
"pubdate": "20180814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managed-detection-response-for-mid-market-directLink-10-i-4069.mp3",
"title": "Managed Detection & Response for Financial Services",
"pubdate": "20180811"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-security-rule-turns-20-its-time-for-facelift-directLink-3-i-4071.mp3",
"title": "HIPAA Security Rule Turns 20: It\"s Time for a Facelift",
"pubdate": "20180810"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-privacy-issues-for-amazon-directLink-2-i-4070.mp3",
"title": "New Privacy Issues for Amazon",
"pubdate": "20180810"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-state-online-digital-trust-directLink-8-i-4068.mp3",
"title": "The Global State of Online Digital Trust",
"pubdate": "20180810"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/training-to-improve-product-security-directLink-5-i-4063.mp3",
"title": "Training to Improve Support of Product Security",
"pubdate": "20180808"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/amazons-healthcare-expansion-analyzing-privacy-concerns-directLink-9-i-4067.mp3",
"title": "Amazon\"s Healthcare Expansion: Analyzing Privacy Concerns",
"pubdate": "20180807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/election-security-insights-from-former-federal-ciso-directLink-5-i-4066.mp3",
"title": "Election Security Insights From Former Federal CISO",
"pubdate": "20180806"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/timely-insights-on-keeping-elections-secure-directLink-1-i-4064.mp3",
"title": "How to Secure US Elections - Before It\"s Too Late",
"pubdate": "20180803"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-election-meddling-three-pronged-approach-directLink-9-i-4061.mp3",
"title": "Fighting Election Meddling: A Three-Pronged Approach",
"pubdate": "20180802"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trailblazing-ciso-stephen-katz-offers-cybersecurity-insights-directLink-5-i-4060.mp3",
"title": "Trailblazing CISO Stephen Katz Offers Cybersecurity Insights",
"pubdate": "20180801"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-soc-strategy-in-light-skills-shortage-directLink-7-i-4059.mp3",
"title": "A New SOC Strategy in Light of Skills Shortage",
"pubdate": "20180731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/routh-directLink-3-i-4057.mp3",
"title": "A More Dynamic Approach to Cybersecurity",
"pubdate": "20180730"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbi-update-on-fighting-against-russian-election-meddling-directLink-2-i-4056.mp3",
"title": "An FBI Update on Fighting Against Russian Election Meddling",
"pubdate": "20180727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/litan-directLink-1-i-3995.mp3",
"title": "Blockchain for Identity Management: Early Examples",
"pubdate": "20180725"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-hunting-how-to-evolve-your-incident-response-directLink-2-i-4110.mp3",
"title": "Threat Hunting: How to Evolve Your Incident Response",
"pubdate": "20180725"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/samsam-inside-one-worlds-top-forms-ransomware-directLink-3-i-4053.mp3",
"title": "SamSam: Inside One of the World\"s Top Forms of Ransomware",
"pubdate": "20180723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trumps-views-on-russian-election-meddling-history-directLink-8-i-4050.mp3",
"title": "Trump\"s Views on Russian Election Meddling: A History",
"pubdate": "20180720"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-effort-to-draft-medical-device-cybersecurity-guidance-directLink-8-i-4051.mp3",
"title": "A New Effort to Draft Medical Device Cybersecurity Guidance",
"pubdate": "20180720"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-blockchain-to-support-new-approach-to-id-management-directLink-5-i-4049.mp3",
"title": "Using Blockchain to Support a New Approach to ID Management",
"pubdate": "20180719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/server-security-need-for-deep-learning-anti-exploit-directLink-5-i-4044.mp3",
"title": "Server Security: The Need for Deep Learning and Anti-Exploit",
"pubdate": "20180717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russian-indictments-time-for-us-cyber-command-to-take-gloves-off-directLink-6-i-4046.mp3",
"title": "\"Time for US Cyber Command to Take the Gloves Off\"",
"pubdate": "20180714"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-californias-groundbreaking-privacy-law-directLink-5-i-4045.mp3",
"title": "Analysis: California\"s Groundbreaking Privacy Law",
"pubdate": "20180713"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bringing-vendor-risk-management-to-midmarket-directLink-2-i-4037.mp3",
"title": "Bringing Vendor Risk Management to the Midmarket",
"pubdate": "20180709"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kirk-nahra-directLink-8-i-4036.mp3",
"title": "Why California\"s New Privacy Law Is a \"Whole New Ballgame\"",
"pubdate": "20180709"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptocurrencies-skyrocketing-money-laundering-problem-directLink-7-i-4035.mp3",
"title": "Cryptocurrency\"s Skyrocketing Money Laundering Problem",
"pubdate": "20180706"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptocurrency-launderings-explosive-growth-directLink-10-i-4034.mp3",
"title": "Cryptocurrency Laundering\"s Explosive Growth",
"pubdate": "20180703"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-understanding-privacy-security-risks-directLink-9-i-4023.mp3",
"title": "Big Data: Understanding the Privacy, Security Risks",
"pubdate": "20180629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-healthcare-companies-ever-be-data-brokers-directLink-7-i-4030.mp3",
"title": "Should Healthcare Companies Ever be Data Brokers?",
"pubdate": "20180629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brian-lancaster-directLink-4-i-4020.mp3",
"title": "Case Study: Protecting Electronic Medical Records",
"pubdate": "20180628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cletis-earle-directLink-3-i-4025.mp3",
"title": "A CIO on Carrying the Burden of Medical Device Cybersecurity",
"pubdate": "20180627"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-analytics-insider-threat-directLink-2-i-4027.mp3",
"title": "Behavioral Analytics and the Insider Threat",
"pubdate": "20180627"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-protection-overcoming-hurdles-directLink-7-i-4028.mp3",
"title": "Identity Protection: Overcoming Hurdles",
"pubdate": "20180626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-hunting-how-to-evolve-your-incident-response-directLink-6-i-4091.mp3",
"title": "Threat Hunting: How to Evolve Your Incident Response",
"pubdate": "20180625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preview-ismgs-fraud-breach-summit-in-chicago-directLink-8-i-4026.mp3",
"title": "Preview: ISMG\"s Fraud and Breach Prevention Summit in Chicago",
"pubdate": "20180622"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-you-ready-for-next-gen-pki-directLink-6-i-3990.mp3",
"title": "Providing Strongly Authenticated Device Identity",
"pubdate": "20180622"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brett-johnson-directLink-3-i-4022.mp3",
"title": "Is Regulating Cryptocurrency Necessary and Feasible?",
"pubdate": "20180621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-insurance-how-underwriting-changing-directLink-10-i-4019.mp3",
"title": "Cybersecurity Insurance: How Underwriting Is Changing",
"pubdate": "20180619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-deception-tactics-used-in-banco-de-chile-hack-directLink-4-i-4016.mp3",
"title": "Analysis: Distraction Tactics Used in Banco de Chile Hack",
"pubdate": "20180615"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/people-factor-fight-back-against-phishing-directLink-4-i-4015.mp3",
"title": "The People Factor: Fight back Against Phishing",
"pubdate": "20180614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chip-no-signature-whats-behind-move-directLink-9-i-4013.mp3",
"title": "Chip and No Signature: What\"s Behind the Move?",
"pubdate": "20180611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-swiping-cryptocurrencies-through-back-door-directLink-7-i-4012.mp3",
"title": "Analysis: Swiping Cryptocurrencies Through a Back Door",
"pubdate": "20180608"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-framework-as-foundation-directLink-6-i-4001.mp3",
"title": "NIST Framework as a Foundation",
"pubdate": "20180608"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/artificial-intelligence-machine-learning-beyond-hype-directLink-4-i-4011.mp3",
"title": "Artificial Intelligence and Machine Learning: Beyond the Hype",
"pubdate": "20180607"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-data-breach-litigation-trends-directLink-6-i-4010.mp3",
"title": "Analysis: Data Breach Litigation Trends",
"pubdate": "20180606"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-compliant-yet-dont-panic-directLink-3-i-4007.mp3",
"title": "Not GDPR Compliant Yet? Don\"t Panic",
"pubdate": "20180602"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/women-in-security-assessing-progress-directLink-4-i-4006.mp3",
"title": "Women in Security: Assessing the Progress",
"pubdate": "20180530"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-enforcement-deadline-you-blew-it-so-what-next-directLink-4-i-4005.mp3",
"title": "GDPR Enforcement Deadline: If You Blew It, What\"s Next?",
"pubdate": "20180529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-banks-lack-appetite-to-become-identity-custodians-directLink-10-i-4002.mp3",
"title": "Do US Banks Lack the Appetite to Become Identity Custodians?",
"pubdate": "20180526"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-look-at-email-security-directLink-4-i-3997.mp3",
"title": "A New Look at Email Security",
"pubdate": "20180525"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransford-directLink-6-i-3998.mp3",
"title": "Medical Device Cybersecurity: A Progress Report",
"pubdate": "20180525"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leveraging-saas-to-fill-skills-gap-directLink-7-i-4003.mp3",
"title": "Leveraging SaaS to Fill the Skills Gap",
"pubdate": "20180525"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-enforcement-begins-impact-on-healthcare-banking-directLink-6-i-3999.mp3",
"title": "GDPR Enforcement Begins: Impact on Healthcare, Banking",
"pubdate": "20180525"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-digital-identity-directLink-8-i-3993.mp3",
"title": "The Future of Digital Identity",
"pubdate": "20180525"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/floridas-approach-to-training-cybersecurity-specialists-directLink-3-i-3996.mp3",
"title": "Florida\"s Approach to Training Cybersecurity Specialists",
"pubdate": "20180524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-australia-ready-directLink-2-i-3994.mp3",
"title": "GDPR: Is Australia Ready?",
"pubdate": "20180522"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-compliance-for-us-healthcare-what-you-need-to-know-directLink-5-i-3991.mp3",
"title": "GDPR Compliance for US Healthcare: What You Need to Know",
"pubdate": "20180522"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-looming-impact-on-us-banks-directLink-8-i-3988.mp3",
"title": "GDPR: The Looming Impact on US Banks",
"pubdate": "20180521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-deception-technology-in-ma-directLink-9-i-3989.mp3",
"title": "The Role of Deception Technology in M&A",
"pubdate": "20180518"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nonstop-breaches-fuel-spike-in-synthetic-identity-fraud-directLink-10-i-3986.mp3",
"title": "Nonstop Breaches Fuel Spike in Synthetic Identity Fraud",
"pubdate": "20180518"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/as-payments-speed-up-how-fraud-be-minimized-directLink-2-i-3983.mp3",
"title": "As Payments Speed Up, How Can Fraud Be Minimized?",
"pubdate": "20180517"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hidden-power-threat-intelligence-directLink-4-i-3984.mp3",
"title": "The Hidden Power of Threat Intelligence",
"pubdate": "20180517"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conroy-directLink-5-i-3982.mp3",
"title": "Sizing Up the Impact of Synthetic Identity Fraud",
"pubdate": "20180514"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/all-us-research-project-privacy-risks-directLink-8-i-3981.mp3",
"title": "\"All of Us\" Research Project: The Privacy Risks",
"pubdate": "20180512"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-time-payment-networks-face-off-against-fraudsters-directLink-6-i-3979.mp3",
"title": "Real-Time Payment Networks Face Off Against Fraudsters",
"pubdate": "20180511"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-way-to-handle-cyber-claims-directLink-3-i-3958.mp3",
"title": "A New Way to Handle Cyber Claims",
"pubdate": "20180511"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/texas-hospital-ceos-cybersecurity-no-1-worry-directLink-4-i-3971.mp3",
"title": "Texas Hospital CEOs: Cybersecurity Is No. 1 Worry",
"pubdate": "20180508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-gdpr-means-for-cybersecurity-directLink-2-i-3957.mp3",
"title": "What GDPR Means for Cybersecurity",
"pubdate": "20180505"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/no-surprise-cambridge-analytica-tries-to-exit-data-scandal-directLink-5-i-3970.mp3",
"title": "No Surprise: Cambridge Analytica Tries to Exit Data Scandal",
"pubdate": "20180504"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchain-in-healthcare-testing-id-app-directLink-8-i-3969.mp3",
"title": "Blockchain in Healthcare: Testing an ID App",
"pubdate": "20180504"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-banking-other-risk-challenges-for-banks-directLink-3-i-3967.mp3",
"title": "Open Banking and Other Risk Challenges for Banks",
"pubdate": "20180503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-wave-bec-ato-directLink-6-i-3963.mp3",
"title": "The New Wave of BEC and ATO",
"pubdate": "20180501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-data-protections-into-iot-devices-directLink-10-i-3966.mp3",
"title": "Building Data Protections Into IoT Devices",
"pubdate": "20180501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-understanding-complexities-directLink-3-i-3965.mp3",
"title": "GDPR: Understanding the Complexities",
"pubdate": "20180430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/countdown-to-gdpr-enforcement-deadline-looms-directLink-10-i-3964.mp3",
"title": "Countdown to GDPR Enforcement: Deadline Looms",
"pubdate": "20180427"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dimaggio-directLink-7-i-3961.mp3",
"title": "Analysis: \"Orangeworm\" Attacks Appear to Involve Espionage",
"pubdate": "20180425"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-deception-technology-to-stay-ahead-cyber-threats-directLink-1-i-3956.mp3",
"title": "Using Deception Technology to Stay Ahead of Cyber Threats",
"pubdate": "20180417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/artificial-intelligence-heres-solid-definition-directLink-9-i-3939.mp3",
"title": "What\"s Artificial Intelligence? Here\"s a Solid Definition",
"pubdate": "20180416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-banking-fighting-against-fraud-surge-directLink-6-i-3856.mp3",
"title": "Open Banking: Fighting Against Fraud Surge",
"pubdate": "20180414"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-verizons-breach-report-2018-directLink-2-i-3951.mp3",
"title": "Analysis: Verizon\"s Breach Report 2018",
"pubdate": "20180413"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-preview-more-video-interviews-in-2018-directLink-1-i-3952.mp3",
"title": "RSA Conference Preview: More Video Interviews in 2018",
"pubdate": "20180413"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deception-technology-expect-trickle-down-to-msps-directLink-1-i-3950.mp3",
"title": "Deception Technology: Expect a Trickle Down to MSSPs",
"pubdate": "20180412"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enhanced-fido-authentication-standard-expands-to-browser-directLink-8-i-3949.mp3",
"title": "Enhanced FIDO Authentication Standard Expands to the Browser",
"pubdate": "20180412"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-identity-in-financial-services-directLink-8-i-3942.mp3",
"title": "The Power of Identity in Financial Services",
"pubdate": "20180411"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/joan-pepin-directLink-10-i-3947.mp3",
"title": "Under Armour Mobile App Breach: Lessons to Learn",
"pubdate": "20180410"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adam-greene-directLink-1-i-3945.mp3",
"title": "The Impact of All 50 States Having Breach Notification Laws",
"pubdate": "20180409"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ibm-highlights-growth-in-cryptocurrency-based-cyberattacks-directLink-5-i-3943.mp3",
"title": "IBM Highlights Growth in Cryptocurrency-Based Cyberattacks",
"pubdate": "20180406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-for-smb-directLink-8-i-3946.mp3",
"title": "Cybersecurity for the SMB",
"pubdate": "20180406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ashish-thapar-verizon-directLink-4-i-3936.mp3",
"title": "The Road to Actionable Threat Intelligence",
"pubdate": "20180404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dos-donts-reporting-to-board-directLink-3-i-3937.mp3",
"title": "The Do\"s and Don\"ts of Reporting to the Board",
"pubdate": "20180404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verifying-vendors-security-programs-directLink-4-i-3940.mp3",
"title": "Verifying Vendors\" Security Programs",
"pubdate": "20180404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-steps-for-implementing-effective-cyber-soc-directLink-8-i-3938.mp3",
"title": "5 Steps for Implementing an Effective Cyber SOC",
"pubdate": "20180404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/open-banking-directLink-3-i-3931.mp3",
"title": "How Will Facebook Incident Affect Open Banking Movement?",
"pubdate": "20180402"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crypto-locking-malware-hits-atlanta-baltimore-boeing-directLink-1-i-3932.mp3",
"title": "Crypto-Locking Malware Hits Atlanta, Baltimore, Boeing",
"pubdate": "20180330"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unraveling-cyber-skills-gap-directLink-4-i-3927.mp3",
"title": "Unraveling the Cyber Skills Gap",
"pubdate": "20180328"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-vpn-fail-reveals-guccifer-20-fancy-bear-directLink-3-i-3930.mp3",
"title": "Analysis: VPN Fail Reveals \"Guccifer 2.0\" is \"Fancy Bear\"",
"pubdate": "20180327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/congress-tells-facebooks-zuckerberg-you-will-testify-directLink-10-i-3929.mp3",
"title": "Lawmakers Tell Facebook\"s Zuckerberg: You Will Testify",
"pubdate": "20180323"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-brian-mccann-netscoutarbor-directLink-6-i-3924.mp3",
"title": "The Growing Threat from Multi-Vector DDoS Attacks",
"pubdate": "20180323"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sizing-up-crypto-wallet-vulnerabilities-directLink-9-i-3925.mp3",
"title": "Sizing Up Crypto Wallet Vulnerabilities",
"pubdate": "20180321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/path-to-modern-iam-directLink-2-i-3918.mp3",
"title": "The Path to Modern IAM",
"pubdate": "20180320"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-ny-attorney-generals-anti-breach-actions-directLink-5-i-3920.mp3",
"title": "Analysis: NY Attorney General\"s Anti-Breach Actions",
"pubdate": "20180317"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-finally-sanctions-russians-for-election-interference-directLink-8-i-3919.mp3",
"title": "US Finally Sanctions Russians for Hacking",
"pubdate": "20180316"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-tight-budget-impede-ocrs-hipaa-mission-directLink-8-i-3916.mp3",
"title": "Will Tight Budget Impede OCR\"s HIPAA Mission?",
"pubdate": "20180314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-business-risks-in-cloud-directLink-5-i-3913.mp3",
"title": "Managing Business Risks in the Cloud",
"pubdate": "20180310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-general-us-election-meddling-response-unified-directLink-8-i-3912.mp3",
"title": "Top US General: Response to Russia Not Unified",
"pubdate": "20180309"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-sector-cybersecurity-finally-maturing-directLink-4-i-3909.mp3",
"title": "Is Healthcare Sector Cybersecurity Finally Maturing?",
"pubdate": "20180308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/onc-considering-tweaks-to-trusted-exchange-framework-directLink-1-i-3905.mp3",
"title": "ONC Considering Tweaks to Trusted Exchange Framework",
"pubdate": "20180308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-borderless-networks-directLink-3-i-3907.mp3",
"title": "Securing Borderless Networks",
"pubdate": "20180307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-cloud-security-right-directLink-10-i-3903.mp3",
"title": "Getting Cloud Security Right",
"pubdate": "20180307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mark-dill-directLink-3-i-3901.mp3",
"title": "HIMSS Speaker Dill on Underutilized Security Technologies",
"pubdate": "20180306"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-omnichannel-anti-fraud-strategy-directLink-2-i-3900.mp3",
"title": "Preparing an Omnichannel Anti-Fraud Strategy",
"pubdate": "20180305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitch-parker-directLink-8-i-3897.mp3",
"title": "Sizing Up the Role of Deception Technology in Healthcare",
"pubdate": "20180303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-election-interference-white-house-response-questioned-directLink-9-i-3896.mp3",
"title": "US Election Interference: White House Response Questioned",
"pubdate": "20180302"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trish-carreiro-directLink-7-i-3894.mp3",
"title": "What Comes Next in the CareFirst Data Breach Case?",
"pubdate": "20180301"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-advanced-attack-detection-directLink-8-i-3893.mp3",
"title": "Simplifying Advanced Attack Detection",
"pubdate": "20180228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deception-technology-worth-investment-directLink-9-i-3892.mp3",
"title": "Deception Technology: Worth the Investment?",
"pubdate": "20180228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/teppler-on-iot-directLink-1-i-3891.mp3",
"title": "IoT Devices: Reducing the Risks",
"pubdate": "20180228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-in-balance-security-vs-convenience-directLink-2-i-3878.mp3",
"title": "Banking in the Balance: Security Vs. Convenience",
"pubdate": "20180227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-recent-hipaa-settlements-directLink-8-i-3889.mp3",
"title": "Lessons From Recent HIPAA Settlements",
"pubdate": "20180224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/feds-versus-trolls-justice-department-indicts-russians-directLink-10-i-3888.mp3",
"title": "Out for Justice: Feds Battle Trolls",
"pubdate": "20180223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-making-security-technology-purchase-decisions-directLink-8-i-3883.mp3",
"title": "Tips for Making Security Technology Purchase Decisions",
"pubdate": "20180222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russian-indictments-its-about-time-directLink-10-i-3881.mp3",
"title": "Russian Indictments: \"It\"s About Time\"",
"pubdate": "20180217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/convergence-healthcare-innovation-compliance-directLink-8-i-3875.mp3",
"title": "The Convergence of Healthcare Innovation and Compliance",
"pubdate": "20180217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russias-election-meddling-cia-offensive-at-ready-directLink-10-i-3880.mp3",
"title": "Russia\"s Election Meddling: CIA Offensive at the Ready",
"pubdate": "20180216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pescatore-on-iot-directLink-5-i-3877.mp3",
"title": "How IoT Affects the CISO\"s Job",
"pubdate": "20180215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/panel-experts-describe-steps-to-secure-aadhaar-data-directLink-3-i-3876.mp3",
"title": "Panel of Experts Describes Steps to Secure Aadhaar Data",
"pubdate": "20180214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trey-maust-directLink-5-i-3872.mp3",
"title": "Sheltered Harbor: A New Approach to Account Backups",
"pubdate": "20180214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-extortion-attack-techniques-directLink-10-i-3873.mp3",
"title": "DDoS Extortion and Attack Techniques",
"pubdate": "20180212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lauri-love-uk-blocks-suspected-hackers-us-extradition-directLink-6-i-3874.mp3",
"title": "Lauri Love: UK Blocks Suspected Hacker\"s US Extradition",
"pubdate": "20180209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bridging-password-gap-directLink-1-i-3869.mp3",
"title": "Bridging the Password Gap",
"pubdate": "20180208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/faster-payments-dont-have-to-mean-faster-fraud-directLink-10-i-3865.mp3",
"title": "Faster Payments Don\"t Have to Mean Faster Fraud",
"pubdate": "20180207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ai-will-play-bigger-role-in-cybersecurity-directLink-4-i-3859.mp3",
"title": "Why AI Will Play a Bigger Role in Cybersecurity",
"pubdate": "20180207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sorry-state-endpoint-security-directLink-1-i-3855.mp3",
"title": "The Sorry State of Endpoint Security",
"pubdate": "20180206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rationalizing-security-stack-directLink-5-i-3863.mp3",
"title": "Rationalizing the Security Stack",
"pubdate": "20180203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/darknet-markets-for-cybercriminals-paranoia-reigns-directLink-2-i-3867.mp3",
"title": "Darknet Markets: For Cybercriminals, Paranoia Reigns",
"pubdate": "20180202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybercrime-services-plus-knowledge-equals-profit-directLink-2-i-3866.mp3",
"title": "Cybercrime as a Service: Tools + Knowledge = Profit",
"pubdate": "20180201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gary-warner-directLink-2-i-3852.mp3",
"title": "Effectively Marrying Big Data Analytics and SIEMs",
"pubdate": "20180201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kellermann-gets-back-on-field-directLink-3-i-3864.mp3",
"title": "Venture Captalist Kellermann Gets \"Back on the Field\"",
"pubdate": "20180201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/allscripts-lawsuit-what-makes-different-directLink-7-i-3861.mp3",
"title": "Allscripts Lawsuit: What Makes It Different?",
"pubdate": "20180131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iot-moving-to-security-by-design-directLink-10-i-3860.mp3",
"title": "IoT: Moving to Security by Design",
"pubdate": "20180131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchains-bid-to-rid-world-data-breaches-directLink-6-i-3858.mp3",
"title": "Blockchain\"s Bid to Rid the World of Data Breaches",
"pubdate": "20180127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchain-in-healthcare-potential-limitations-directLink-8-i-3853.mp3",
"title": "Blockchain in Healthcare: The Potential and Limitations",
"pubdate": "20180124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-tatas-avinash-prasad-on-meca-securitiy-directLink-7-i-3851.mp3",
"title": "The Evolving Cybersecurity Landscape in the MECA Region",
"pubdate": "20180124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-pitfalls-privileged-access-management-directLink-10-i-3807.mp3",
"title": "4 Pitfalls of Privileged Access Management",
"pubdate": "20180122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-some-victims-backups-still-pay-directLink-10-i-3850.mp3",
"title": "Ransomware: Why Some Victims With Backups Still Pay",
"pubdate": "20180119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/framework-aims-to-improve-patient-data-matching-directLink-2-i-3847.mp3",
"title": "Framework Aims to Improve Patient Data Matching",
"pubdate": "20180119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/venture-capitalists-2018-outlook-directLink-4-i-3846.mp3",
"title": "A Venture Capitalist\"s 2018 Outlook",
"pubdate": "20180118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-makes-oncs-trusted-exchange-framework-so-complex-directLink-5-i-3848.mp3",
"title": "What Makes ONC\"s \"Trusted Exchange Framework\" So Complex?",
"pubdate": "20180117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/machine-identity-crisis-directLink-1-i-3841.mp3",
"title": "The Machine Identity Crisis",
"pubdate": "20180116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-ready-to-comply-gdpr-directLink-7-i-3844.mp3",
"title": "Is Healthcare Ready to Comply With GDPR?",
"pubdate": "20180116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conversation-dave-dewalt-part-2-directLink-1-i-3839.mp3",
"title": "A Conversation With Dave DeWalt: Part 2",
"pubdate": "20180115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbi-directors-encryption-comments-prove-controversial-directLink-3-i-3843.mp3",
"title": "FBI Director\"s Encryption Comments Prove Controversial",
"pubdate": "20180112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-what-us-healthcare-entities-need-to-know-directLink-7-i-3840.mp3",
"title": "GDPR: What US Healthcare Entities Need to Know",
"pubdate": "20180110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-areas-ripe-for-exploitation-in-2018-directLink-6-i-3837.mp3",
"title": "New Areas Ripe for Exploitation in 2018",
"pubdate": "20180109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conversation-dave-dewalt-part-1-directLink-7-i-3838.mp3",
"title": "A Conversation With Dave DeWalt: Part 1",
"pubdate": "20180109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-attacks-will-be-more-devastating-widespread-directLink-6-i-3833.mp3",
"title": "Ransomware Attacks Will Be More Devastating and Widespread",
"pubdate": "20180105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-problem-that-wont-go-away-directLink-4-i-3812.mp3",
"title": "Ransomware: The Problem That Won\"t Go Away",
"pubdate": "20180104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-cyberattacks-impact-patient-safety-directLink-10-i-3799.mp3",
"title": "How Cyberattacks Can Impact Patient Safety",
"pubdate": "20180103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ed-amoroso-on-cisos-challenge-in-2018-directLink-8-i-3820.mp3",
"title": "Ed Amoroso on CISOs\" Challenges in 2018",
"pubdate": "20180103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-getting-security-right-this-time-directLink-2-i-3810.mp3",
"title": "Healthcare: Getting Security Right This Time",
"pubdate": "20180102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/recalling-9-years-cybersecurity-news-analysis-directLink-3-i-3824.mp3",
"title": "Recalling 9 Years of Cybersecurity News and Analysis",
"pubdate": "20180102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/integrity-data-medical-device-cybersecurity-concerns-directLink-8-i-3797.mp3",
"title": "Integrity of Data: Medical Device Cybersecurity Concerns",
"pubdate": "20171229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-trends-cybersecurity-practitioners-must-address-in-2018-directLink-10-i-3822.mp3",
"title": "5 Trends Cybersecurity Practitioners Must Address in 2018",
"pubdate": "20171229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forecast-2018-nation-states-test-offensive-waters-directLink-4-i-3813.mp3",
"title": "Forecast 2018: Nation-States Test Offensive Waters",
"pubdate": "20171228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gus-hunt-directLink-10-i-3818.mp3",
"title": "Why Healthcare Cybersecurity Spending Is Rising",
"pubdate": "20171228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/troy-hunt-discusses-his-data-breach-message-to-congress-directLink-8-i-3801.mp3",
"title": "Troy Hunt Discusses His Data Breach Message to Congress",
"pubdate": "20171227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-better-information-to-secure-swift-international-transfers-directLink-3-i-3802.mp3",
"title": "Using Better Information to Secure SWIFT International Transfers",
"pubdate": "20171226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/man-behind-cybersecurity-moonshot-directLink-3-i-3817.mp3",
"title": "The Man Behind the Cybersecurity \"Moonshot\"",
"pubdate": "20171226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/former-us-ciso-on-awareness-training-priority-1-directLink-3-i-3815.mp3",
"title": "Former US CISO on Why Awareness Training Is Priority Number 1",
"pubdate": "20171223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/north-korea-true-culprit-behind-wannacry-directLink-3-i-3814.mp3",
"title": "Is North Korea the True Culprit Behind WannaCry?",
"pubdate": "20171222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exploring-cybers-role-in-new-national-security-strategy-directLink-1-i-3809.mp3",
"title": "Exploring Cyber\"s Role in the New National Security Strategy",
"pubdate": "20171219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legislation-backing-hacking-back-good-idea-directLink-1-i-3798.mp3",
"title": "Is Legislation Backing \"Hacking Back\" a Good Idea?",
"pubdate": "20171218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-malware-known-as-triton-threatens-public-safety-directLink-10-i-3808.mp3",
"title": "How Malware Known as Triton Threatens Public Safety",
"pubdate": "20171215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-distinguishing-fact-from-fiction-directLink-9-i-3803.mp3",
"title": "GDPR: Distinguishing Fact From Fiction",
"pubdate": "20171215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critical-components-insider-threat-prevention-program-directLink-5-i-3806.mp3",
"title": "Critical Components of an Insider Threat Mitigation Program",
"pubdate": "20171212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/significant-changes-coming-to-nist-cybersecurity-framework-directLink-3-i-3805.mp3",
"title": "Significant Changes Coming to NIST Cybersecurity Framework",
"pubdate": "20171212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-devices-treat-them-like-untrusted-end-user-tools-directLink-2-i-3800.mp3",
"title": "Medical Devices: Treat Them Like Untrusted End-User Tools",
"pubdate": "20171208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/containing-cyber-exposure-directLink-9-i-3778.mp3",
"title": "Containing Cyber Exposure",
"pubdate": "20171207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-benefits-identity-as-service-directLink-8-i-3794.mp3",
"title": "The Business Benefits of Identity as a Service",
"pubdate": "20171206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/api-security-trends-for-2018-directLink-1-i-3788.mp3",
"title": "API and Security Trends for 2018",
"pubdate": "20171206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-sec-cyber-unit-eyes-initial-coin-offering-abuse-directLink-9-i-3796.mp3",
"title": "New SEC Cyber Unit Targets Initial Coin Offering Scam",
"pubdate": "20171205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-ethical-hacking-directLink-7-i-3793.mp3",
"title": "Making the Case for Ethical Hacking",
"pubdate": "20171205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-need-to-panic-little-or-lot-directLink-8-i-3783.mp3",
"title": "GDPR: \"Need to Panic a Little or a Lot?\"",
"pubdate": "20171204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-wares-require-slowing-down-development-process-directLink-2-i-3792.mp3",
"title": "Securing IT Requires Slowing Down the Development Process",
"pubdate": "20171201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-biometrics-in-multifactor-authentication-directLink-7-i-3786.mp3",
"title": "The Role of Biometrics in Multifactor Authentication",
"pubdate": "20171201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-targeted-attacks-directLink-8-i-3782.mp3",
"title": "Spear Phishing and Targeted Attacks",
"pubdate": "20171201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/endpoint-security-for-cloud-generation-directLink-3-i-3791.mp3",
"title": "Endpoint Security for the Cloud Generation",
"pubdate": "20171130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/on-eve-2018-campaign-candidates-get-security-advice-from-for-profits-directLink-8-i-3787.mp3",
"title": "As 2018 Campaign Gears Up, Candidates Get Security Advice",
"pubdate": "20171128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cso-offers-new-models-to-battle-phishing-attacks-directLink-9-i-3785.mp3",
"title": "CSO Offers New Models to Battle Phishing Attacks",
"pubdate": "20171124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-data-breaches-legal-issues-directLink-10-i-3784.mp3",
"title": "Health Data Breaches: The Legal Issues",
"pubdate": "20171123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stepping-up-fight-against-omnichannel-financial-fraud-directLink-4-i-3781.mp3",
"title": "Stepping up Fight Against Omnichannel Financial Fraud",
"pubdate": "20171122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/email-infiltration-dmarc-directLink-2-i-3776.mp3",
"title": "Email Infiltration and DMARC",
"pubdate": "20171122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/email-security-new-dhs-directive-directLink-8-i-3775.mp3",
"title": "Email Security and the New DHS Directive",
"pubdate": "20171122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-ismg-healthcare-security-summit-directLink-2-i-3779.mp3",
"title": "Assessing the ISMG Healthcare Security Summit",
"pubdate": "20171121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-unveils-new-rules-on-divulging-cybersecurity-flaws-directLink-4-i-3774.mp3",
"title": "White House Unveils New Rules on Divulging IT Security Flaws",
"pubdate": "20171117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-sizes-up-healthcare-security-threats-for-2018-directLink-7-i-3769.mp3",
"title": "A CISO Sizes Up Healthcare Security Threats for 2018",
"pubdate": "20171115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-council-developing-software-standards-directLink-4-i-3771.mp3",
"title": "PCI Council Developing Software Framework",
"pubdate": "20171114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-leader-tells-how-info-sharing-helped-curtail-wannacry-harm-in-us-directLink-10-i-3772.mp3",
"title": "How Information Sharing Helped Curtail WannaCry Harm",
"pubdate": "20171114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-hampered-by-misunderstandings-myths-directLink-3-i-3768.mp3",
"title": "FDA Official Dispels Medical Device Security Myths",
"pubdate": "20171113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-owns-your-pii-you-or-credit-reporting-agencies-directLink-5-i-3767.mp3",
"title": "Who Owns Your PII, You or Credit Reporting Agencies?",
"pubdate": "20171110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/skills-shortage-assessing-true-impact-directLink-9-i-3765.mp3",
"title": "Skills Shortage: Assessing the True Impact",
"pubdate": "20171109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-will-usher-in-big-changes-to-healthcare-security-directLink-6-i-3761.mp3",
"title": "Will GDPR Usher in Big Changes for Healthcare Security?",
"pubdate": "20171108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bargain-basement-prices-compromised-credentials-for-3-pop-directLink-6-i-3760.mp3",
"title": "Bargain Prices: Compromised Credentials for $3 a Pop",
"pubdate": "20171107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/six-months-to-go-getting-ready-for-gdpr-directLink-2-i-3758.mp3",
"title": "Six Months to Go: Getting Ready for GDPR",
"pubdate": "20171103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jennings-aske-on-getting-serious-medical-device-security-directLink-6-i-3756.mp3",
"title": "Jennings Aske on Getting Serious About Medical Device Security",
"pubdate": "20171101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wannacry-fresh-perspective-on-ransomware-attack-directLink-10-i-3753.mp3",
"title": "WannaCry: A Fresh Perspective on the Ransomware Attack",
"pubdate": "20171031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proactive-defense-against-phishing-directLink-5-i-3740.mp3",
"title": "Proactive Defense Against Phishing",
"pubdate": "20171031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-medical-device-vulnerability-compromise-privacy-directLink-2-i-3750.mp3",
"title": "How a Medical Device Vulnerability Can Compromise Privacy",
"pubdate": "20171028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-john-shier-sophos-directLink-4-i-3748.mp3",
"title": "Understanding the Malware-as-a-Service Commodity Market",
"pubdate": "20171027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equifax-data-breach-uk-perspective-directLink-8-i-3749.mp3",
"title": "The Equifax Data Breach: A UK Perspective",
"pubdate": "20171027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-what-really-works-directLink-10-i-3747.mp3",
"title": "Medical Device Security: What Really Works?",
"pubdate": "20171025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-transformation-security-disaster-directLink-7-i-3746.mp3",
"title": "Is Digital Transformation a Security \"Disaster\"?",
"pubdate": "20171025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warning-increased-attacks-on-energy-sector-directLink-3-i-3745.mp3",
"title": "Warning of Increased Attacks on the Energy Sector",
"pubdate": "20171024"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dmarc-close-look-at-email-validation-system-directLink-6-i-3744.mp3",
"title": "DMARC: A Close Look at the Email Validation System",
"pubdate": "20171020"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-insider-threat-long-term-battle-directLink-6-i-3743.mp3",
"title": "Fighting the Insider Threat: A Long-Term Battle",
"pubdate": "20171019"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/profiling-dhs-secretary-designate-kirstjen-nielsen-directLink-6-i-3742.mp3",
"title": "Profiling DHS Secretary-Designate Kirstjen Nielsen",
"pubdate": "20171017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-abu-dhabi-preview-directLink-1-i-3739.mp3",
"title": "RSA Conference Abu Dhabi: A Preview",
"pubdate": "20171017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/as-telehealth-grows-so-do-privacy-security-concerns-directLink-8-i-3738.mp3",
"title": "As Telehealth Grows, So Do Privacy, Security Concerns",
"pubdate": "20171014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conversation-cyber-gang-dark-overlord-directLink-1-i-3737.mp3",
"title": "A Conversation With the Cyber Gang \"The Dark Overlord\"",
"pubdate": "20171013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-how-to-secure-your-greatest-asset-directLink-1-i-3714.mp3",
"title": "Data: How to Secure Your Greatest Asset",
"pubdate": "20171012"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/redefining-role-hhs-ciso-directLink-2-i-3735.mp3",
"title": "Redefining the Role of HHS CISO",
"pubdate": "20171011"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-comply-new-yorks-cybersecurity-regulation-directLink-2-i-3733.mp3",
"title": "How to Comply With New York\"s Cybersecurity Regulation",
"pubdate": "20171010"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-security-numbers-days-numbered-as-identifier-directLink-9-i-3730.mp3",
"title": "Social Security: Days Numbered as an Identifier?",
"pubdate": "20171010"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-regulatory-impact-on-vendor-risk-directLink-1-i-3729.mp3",
"title": "GDPR and the Regulatory Impact on Vendor Risk",
"pubdate": "20171009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-user-behavior-could-replace-passwords-as-authenticator-directLink-6-i-3728.mp3",
"title": "User Behavior Could Replace Passwords as Authenticator",
"pubdate": "20171006"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/curing-detection-deficit-disorder-directLink-1-i-3724.mp3",
"title": "Curing \"Detection Deficit Disorder\"",
"pubdate": "20171004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-getting-ready-for-gdpr-directLink-5-i-3723.mp3",
"title": "Special Report: Getting Ready for GDPR",
"pubdate": "20171003"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-insights-from-us-army-medicine-ciso-directLink-9-i-3721.mp3",
"title": "Incident Response Insights from US Army Medicine CISO",
"pubdate": "20171002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-unveils-plan-to-get-c-suite-involvement-in-risk-management-directLink-7-i-3719.mp3",
"title": "NIST Unveils Plan to Get C-Suite Involved in Risk Management",
"pubdate": "20170929"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-get-most-cybersecurity-value-from-ai-directLink-8-i-3715.mp3",
"title": "Get the Most Cybersecurity Value from AI",
"pubdate": "20170929"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/find-secure-your-most-sensitive-data-directLink-9-i-3696.mp3",
"title": "Find and Secure Your Most Sensitive Data",
"pubdate": "20170928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ehr-certification-changes-risks-for-healthcare-providers-directLink-7-i-3717.mp3",
"title": "EHR Certification Changes: Risks for Healthcare Providers",
"pubdate": "20170928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-in-age-open-banking-directLink-4-i-3716.mp3",
"title": "Security in the Age of Open Banking",
"pubdate": "20170928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aetnas-new-approach-to-authentication-directLink-9-i-3713.mp3",
"title": "Aetna\"s New Approach to Authentication",
"pubdate": "20170927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/do-cisos-need-to-dumb-down-cybersecurity-for-boards-directLink-10-i-3711.mp3",
"title": "Do CISOs Need to \"Dumb Down\" Cybersecurity for Boards?",
"pubdate": "20170926"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preventing-attacks-from-spreading-directLink-1-i-3706.mp3",
"title": "Preventing Attacks from Spreading",
"pubdate": "20170925"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-changes-to-ehr-certification-practices-directLink-3-i-3709.mp3",
"title": "Analyzing Changes to EHR Certification Practices",
"pubdate": "20170923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/profiting-from-sec-breach-directLink-3-i-3708.mp3",
"title": "Profiting From the SEC Breach",
"pubdate": "20170922"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-time-incident-response-directLink-4-i-3710.mp3",
"title": "Real-Time Incident Response",
"pubdate": "20170922"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-api-caching-directLink-6-i-3707.mp3",
"title": "The Case for API Caching",
"pubdate": "20170921"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/episode-142-directLink-5-i-3705.mp3",
"title": "Do CISOs Need IT or InfoSec Academic Credentials?",
"pubdate": "20170919"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gauging-equifaxs-existential-future-in-wake-breach-directLink-4-i-3702.mp3",
"title": "Gauging Equifax\"s Future in Wake of Massive Breach",
"pubdate": "20170915"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-cybersecurity-simplify-compliance-avoid-breaches-directLink-2-i-3694.mp3",
"title": "Healthcare Cybersecurity: Simplify Compliance & Avoid Breaches",
"pubdate": "20170914"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/former-anthem-cybersecurity-exec-on-protecting-credentials-directLink-1-i-3698.mp3",
"title": "Former Anthem Cybersecurity Exec on Protecting Credentials",
"pubdate": "20170914"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-deep-dive-into-equifax-breach-directLink-7-i-3699.mp3",
"title": "Taking a Deep Dive Into the Equifax Breach",
"pubdate": "20170912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-time-transactions-real-time-security-directLink-3-i-3684.mp3",
"title": "Real-Time Transactions, Real-Time Security",
"pubdate": "20170912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-equifax-breach-so-significant-directLink-9-i-3697.mp3",
"title": "Analysis: Why Equifax Breach Is So Significant",
"pubdate": "20170909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-us-global-cybersecurity-leadership-in-jeopardy-directLink-10-i-3695.mp3",
"title": "Is US Global Cybersecurity Leadership in Jeopardy?",
"pubdate": "20170908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-protection-facts-about-secure-backup-directLink-6-i-3692.mp3",
"title": "Ransomware Protection: Facts About Secure Backup",
"pubdate": "20170908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-leader-on-filling-jobs-now-directLink-1-i-3693.mp3",
"title": "A Cybersecurity Leader on Filling Jobs Now",
"pubdate": "20170906"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-thought-leaders-speak-out-on-pressing-cybersecurity-issues-directLink-2-i-3690.mp3",
"title": "Thought Leaders Speak Out on Pressing Cybersecurity Issues",
"pubdate": "20170905"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-tools-set-to-secure-cashless-economy-directLink-4-i-3689.mp3",
"title": "Authentication Tools to Secure a Cashless Economy",
"pubdate": "20170901"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-bad-guys-to-fund-us-cyber-commands-growth-directLink-9-i-3687.mp3",
"title": "Getting the Bad Guys to Fund US Cyber Command\"s Growth",
"pubdate": "20170829"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/maximizing-malware-analysis-directLink-4-i-3683.mp3",
"title": "Maximizing Malware Analysis",
"pubdate": "20170828"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-7-months-in-office-hows-trump-doing-on-cybersecurity-directLink-10-i-3681.mp3",
"title": "After 7 Months in Office, How\"s Trump Doing on Cybersecurity?",
"pubdate": "20170825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-merits-medical-device-security-legislation-directLink-10-i-3680.mp3",
"title": "Analysis: The Merits of Medical Device Security Legislation",
"pubdate": "20170824"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/changes-coming-to-nists-catalogue-security-privacy-controls-directLink-4-i-3679.mp3",
"title": "Changes Coming to NIST\"s Catalog of Security Controls",
"pubdate": "20170822"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-exploit-kit-closer-look-directLink-9-i-3678.mp3",
"title": "New Exploit Kit: A Closer Look",
"pubdate": "20170818"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-legal-concerns-directLink-3-i-3668.mp3",
"title": "Medical Device Cybersecurity: Legal Concerns",
"pubdate": "20170818"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/regulations-threats-adapting-to-landscape-directLink-9-i-3670.mp3",
"title": "Regulations and Threats: Adapting to the Landscape",
"pubdate": "20170817"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-questions-successful-security-leaders-should-ask-directLink-9-i-3676.mp3",
"title": "3 Questions Successful Security Leaders Should Ask",
"pubdate": "20170817"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-cybersecurity-iot-medical-devices-directLink-9-i-3665.mp3",
"title": "Improving the Cybersecurity of IoT, Medical Devices",
"pubdate": "20170815"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-another-medical-device-security-issue-directLink-2-i-3672.mp3",
"title": "Analysis: Another Medical Device Security Issue",
"pubdate": "20170815"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anthem-breach-lesson-granular-access-control-matters-directLink-7-i-3666.mp3",
"title": "Anthem Breach Lesson: Why Granular Access Control Matters",
"pubdate": "20170814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gdpr-vendor-risk-management-directLink-4-i-3671.mp3",
"title": "GDPR and Vendor Risk Management",
"pubdate": "20170814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-cyber-battle-plan-to-thwart-those-seeking-to-sway-us-elections-directLink-3-i-3669.mp3",
"title": "Creating Cyber Plan to Thwart Those Seeking to Sway Elections",
"pubdate": "20170811"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/backstory-on-arrest-wannacry-accidental-hero-directLink-1-i-3664.mp3",
"title": "Backstory on Arrest of Marcus Hutchins",
"pubdate": "20170808"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurance-overcoming-resistance-directLink-9-i-3663.mp3",
"title": "Cyber Insurance: Overcoming Resistance",
"pubdate": "20170805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/effort-to-engage-hospitals-in-global-hunt-for-medical-device-security-flaws-directLink-3-i-3661.mp3",
"title": "Engaging Hospitals In Global Hunt for Medical Device Security Flaws",
"pubdate": "20170804"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-russian-hackers-in-us-courtrooms-directLink-9-i-3660.mp3",
"title": "Battling Russian Hackers in US Courtrooms",
"pubdate": "20170804"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-attribution-matters-directLink-3-i-3659.mp3",
"title": "Gartner\"s Litan on Why Attribution Matters",
"pubdate": "20170804"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analytics-aml-paradigm-shift-directLink-3-i-3651.mp3",
"title": "Analytics and the AML Paradigm Shift",
"pubdate": "20170802"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/human-face-malware-directLink-4-i-3656.mp3",
"title": "The Human Face of Malware",
"pubdate": "20170801"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-group-targeting-ukraines-power-grid-cool-directLink-4-i-3654.mp3",
"title": "Power Grid Malware: Don\"t Freak Out, But Do Prepare",
"pubdate": "20170728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exploring-lagging-small-business-cyber-insurance-marketplace-directLink-6-i-3655.mp3",
"title": "Understanding Small-Business Cyber-Insurance Marketplace",
"pubdate": "20170728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/6-steps-to-secure-remote-access-directLink-2-i-3648.mp3",
"title": "6 Steps to Secure Remote Access",
"pubdate": "20170726"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/would-talking-to-russians-on-cyber-reward-bad-behavior-directLink-10-i-3653.mp3",
"title": "Would Talking to Russians About Cyber Reward Bad Behavior?",
"pubdate": "20170726"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-would-us-russian-cyber-talks-be-appropriate-directLink-2-i-3652.mp3",
"title": "When Would US-Russian Cyber Talks Be Appropriate?",
"pubdate": "20170725"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-ransomware-as-a-service-directLink-1-i-3649.mp3",
"title": "The Rise of Ransomware-as-a-Service",
"pubdate": "20170724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-impact-alphabay-takedown-directLink-2-i-3650.mp3",
"title": "Special Report: Impact of the AlphaBay Takedown",
"pubdate": "20170721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shedding-light-on-darknet-marketplace-directLink-2-i-3646.mp3",
"title": "Shedding Light on the Darknet Marketplace",
"pubdate": "20170718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-onc-on-secure-data-exchange-directLink-2-i-3645.mp3",
"title": "Interview: ONC on Next Steps for Secure Data Exchange",
"pubdate": "20170718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-education-next-fbi-director-directLink-3-i-3644.mp3",
"title": "The Cybersecurity Education of the Next FBI Director",
"pubdate": "20170714"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-backed-away-from-joint-us-russia-cybersecurity-collaboration-directLink-4-i-3640.mp3",
"title": "Why Trump Backed Away from a US-Russian Cyber Framework",
"pubdate": "20170711"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-notpetya-malware-spread-directLink-5-i-3639.mp3",
"title": "How the NotPetya Malware Spread",
"pubdate": "20170707"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-anthem-breach-class-action-settlement-directLink-9-i-3636.mp3",
"title": "Analyzing the Anthem Breach Class Action Settlement",
"pubdate": "20170706"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/notpetya-wannacry-implications-justin-peters-sophos-directLink-10-i-3635.mp3",
"title": "The Ransomware Threat After WannaCry and NotPetya",
"pubdate": "20170705"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/artificial-intelligence-menace-or-protector-directLink-3-i-3634.mp3",
"title": "Artificial Intelligence: IT Menace or Protector?",
"pubdate": "20170630"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-long-way-to-go-directLink-10-i-3633.mp3",
"title": "Medical Device Cybersecurity: A Long Way to Go",
"pubdate": "20170630"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-reconsidered-directLink-10-i-3620.mp3",
"title": "Incident Response Reconsidered",
"pubdate": "20170629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-shift-to-human-centered-security-directLink-7-i-3632.mp3",
"title": "Making the Shift to Human-Centered Security",
"pubdate": "20170628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spying-on-citizens-malware-aimed-to-battle-criminals-directLink-4-i-3631.mp3",
"title": "Spying on Citizens with Malware Aimed to Battle Criminals",
"pubdate": "20170627"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-speed-attack-directLink-4-i-3630.mp3",
"title": "The True Cost of Phishing Attacks",
"pubdate": "20170626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-paypal-head-engineering-guru-bhat-directLink-6-i-3627.mp3",
"title": "How PayPal Protects Billions of Transactions",
"pubdate": "20170623"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/return-luddite-securing-critical-systems-directLink-7-i-3628.mp3",
"title": "The Return of the Luddite: Securing Critical Systems",
"pubdate": "20170623"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/drew-hamilton-directLink-4-i-3616.mp3",
"title": "Making Forensic Investigations More Fruitful",
"pubdate": "20170621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eulogizing-neutrino-exploit-kit-directLink-7-i-3625.mp3",
"title": "\"Eulogizing\" Neutrino Exploit Kit",
"pubdate": "20170620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kate-borten-directLink-8-i-3615.mp3",
"title": "Defending Against Health Data Breaches: What\"s Missing?",
"pubdate": "20170619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-strategic-cybersecurity-investments-study-directLink-9-i-3602.mp3",
"title": "Analysis: Strategic Cybersecurity Investments Study",
"pubdate": "20170619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hardening-workforce-developing-cyber-defenses-directLink-6-i-3623.mp3",
"title": "Hardening the Workforce: Developing Cyber Defenses",
"pubdate": "20170618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-wannacry-survives-directLink-5-i-3617.mp3",
"title": "How WannaCry Survives",
"pubdate": "20170616"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-neil-wu-becker-directLink-1-i-3612.mp3",
"title": "App Security: Breaking Bad Habits",
"pubdate": "20170614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/myth-secure-mainframe-directLink-4-i-3611.mp3",
"title": "The Myth of the Secure Mainframe",
"pubdate": "20170613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-pick-right-security-technology-directLink-7-i-3608.mp3",
"title": "The Confusing Marketplace of IT Security Wares",
"pubdate": "20170609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/amy-mchugh-cat-directLink-1-i-3606.mp3",
"title": "Analysis: FFIEC\"s Update to Cyber Assessment Tool",
"pubdate": "20170607"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/balancing-act-constant-battle-between-functionality-security-directLink-3-i-3604.mp3",
"title": "Balancing Act: Constant Battle Between Functionality, Security",
"pubdate": "20170606"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-evolving-russian-cyber-threats-directLink-4-i-3603.mp3",
"title": "Analysis: Evolving Russian Cyber Threats",
"pubdate": "20170602"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-cyber-isr-directLink-7-i-3595.mp3",
"title": "The Need for Cyber ISR",
"pubdate": "20170601"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/billy-rios-directLink-1-i-3601.mp3",
"title": "Medical Devices: Care Benefits vs. Cybersecurity Risks",
"pubdate": "20170601"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/21st-century-cures-act-will-revamp-health-data-exchange-directLink-4-i-3599.mp3",
"title": "21st Century Cures Act: Will It Revamp Health Data Exchange?",
"pubdate": "20170531"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-during-era-donald-trump-report-directLink-8-i-3598.mp3",
"title": "Cybersecurity During the Era of Donald Trump",
"pubdate": "20170530"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/homeland-security-secretary-john-kelly-on-battling-wannacry-directLink-2-i-3596.mp3",
"title": "Homeland Security Secretary John Kelly on Battling WannaCry",
"pubdate": "20170526"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-medical-devices-from-ransomware-critical-step-directLink-6-i-3594.mp3",
"title": "Protecting Medical Devices from Ransomware: A Critical Step",
"pubdate": "20170526"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-prepare-for-next-wannacry-directLink-4-i-3593.mp3",
"title": "How to Prepare for the Next WannaCry",
"pubdate": "20170524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stress-busting-through-vulnerability-risk-management-directLink-4-i-3584.mp3",
"title": "Stress-Busting Through Vulnerability Risk Management",
"pubdate": "20170524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-will-cappelli-gartner-on-machine-learning-directLink-9-i-3591.mp3",
"title": "Why Big Data, Machine Learning Are Critical to Security",
"pubdate": "20170524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hsbc-experiences-voice-biometrics-telephone-banking-fail-directLink-3-i-3592.mp3",
"title": "HSBC Experiences Voice Biometrics Telephone Banking Fail",
"pubdate": "20170523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-congress-picks-up-pace-on-cybersecurity-legislating-directLink-7-i-3588.mp3",
"title": "US Congress Picks Up Pace on Cybersecurity Legislating",
"pubdate": "20170519"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-patch-management-ransomware-mitigation-strategies-directLink-7-i-3590.mp3",
"title": "Beyond Patch Management: Ransomware Mitigation Strategies",
"pubdate": "20170519"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assistant-to-president-makes-bold-cybersecurity-declaration-directLink-3-i-3583.mp3",
"title": "Assistant to the President Makes Bold Cybersecurity Declaration",
"pubdate": "20170516"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reputational-risk-management-matters-directLink-8-i-3581.mp3",
"title": "Why Reputational Risk Management Matters",
"pubdate": "20170515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-wannacry-ransomware-outbreak-directLink-8-i-3580.mp3",
"title": "Responding to WannaCry Ransomware Outbreak",
"pubdate": "20170513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-ramping-up-digital-health-cybersecurity-efforts-directLink-8-i-3579.mp3",
"title": "FDA Ramping Up Digital Health Cybersecurity Efforts",
"pubdate": "20170513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reevaluating-infosec-awareness-place-in-security-arsenal-directLink-8-i-3578.mp3",
"title": "Re-evaluating InfoSec Awareness\" Place in Security Arsenal",
"pubdate": "20170512"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/maturation-cybercrime-directLink-8-i-3576.mp3",
"title": "The Maturation of Cybercrime",
"pubdate": "20170509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2-days-to-2-hours-automating-application-vulnerability-management-directLink-8-i-3559.mp3",
"title": "2 Days to 2 Hours: Automating Application Vulnerability Management",
"pubdate": "20170509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fbis-james-comey-on-insider-threat-other-cyber-challenges-directLink-10-i-3574.mp3",
"title": "FBI\"s James Comey on Insider Threat, Other Cyber Challenges",
"pubdate": "20170505"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-in-middle-managing-risk-across-enterprise-directLink-4-i-3558.mp3",
"title": "CISO in the Middle: Managing Risk Up and Down the Enterprise",
"pubdate": "20170503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hackers-target-small-firms-as-big-biz-toughens-cyberdefenses-directLink-10-i-3572.mp3",
"title": "Hackers Target Small Firms as Big Biz Toughens Cyber Defenses",
"pubdate": "20170502"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/saber-rattling-cybersecurity-connection-directLink-6-i-3565.mp3",
"title": "Saber-Rattling and Cybersecurity: The Connection",
"pubdate": "20170501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dbir-2017-interview-directLink-6-i-3569.mp3",
"title": "Verizon\"s New Data Breach Report: An Analysis",
"pubdate": "20170428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rethinking-cybersecurity-lessons-from-russian-hacks-directLink-3-i-3570.mp3",
"title": "Rethinking Cybersecurity: Lessons from Russian Hacks",
"pubdate": "20170428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-defense-dos-donts-directLink-6-i-3571.mp3",
"title": "Ransomware Defense: The Do\"s and Don\"ts",
"pubdate": "20170428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pending-trump-cybersecurity-executive-order-outlined-directLink-7-i-3566.mp3",
"title": "Pending Trump Cybersecurity Executive Order Outlined",
"pubdate": "20170425"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-kit-offered-at-bargain-basement-prices-directLink-8-i-3564.mp3",
"title": "Ransomware Kit Offered at Bargain-Basement Prices",
"pubdate": "20170421"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-threat-hunting-incident-response-directLink-7-i-3562.mp3",
"title": "Improving Threat-Hunting and Incident Response",
"pubdate": "20170419"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-gen-biometric-authentication-directLink-6-i-3533.mp3",
"title": "Next-Gen Biometric Authentication",
"pubdate": "20170419"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-challenge-privileged-access-management-directLink-1-i-3560.mp3",
"title": "Battling the Challenge of Privileged Access Management",
"pubdate": "20170418"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-depends-too-much-on-internet-directLink-10-i-3555.mp3",
"title": "Is the Internet Forever?",
"pubdate": "20170414"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gotcha-nabbing-criminal-skimmer-directLink-10-i-3556.mp3",
"title": "Gotcha! The Nabbing of a Criminal Skimmer",
"pubdate": "20170414"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vendors-collaborate-to-share-latest-cyberthreat-intelligence-directLink-10-i-3553.mp3",
"title": "Vendors Collaborate to Share Latest Cyberthreat Intelligence",
"pubdate": "20170411"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-drives-eastern-european-cybercriminals-directLink-1-i-3541.mp3",
"title": "What Drives Eastern European Cybercriminals?",
"pubdate": "20170410"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-ideas-to-attract-retain-cyber-talent-directLink-3-i-3552.mp3",
"title": "New Ideas to Attract, Retain Cyber Talent",
"pubdate": "20170407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-lesson-from-physical-world-directLink-10-i-3551.mp3",
"title": "Insider Threat: Lesson from the Physical World",
"pubdate": "20170404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-progress-gaps-directLink-2-i-3550.mp3",
"title": "Medical Device Cybersecurity: Progress and Gaps",
"pubdate": "20170404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-shifting-security-landscape-directLink-10-i-3549.mp3",
"title": "Banking and the Shifting Security Landscape",
"pubdate": "20170403"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/highlights-from-senate-hearing-on-russian-election-interference-directLink-7-i-3548.mp3",
"title": "Highlights from the Hearing on Russian Election Interference",
"pubdate": "20170331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-in-store-for-hipaa-under-new-ocr-leadership-directLink-10-i-3546.mp3",
"title": "What\"s in Store for HIPAA Under New OCR Leadership?",
"pubdate": "20170331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-secure-technology-alliance-directLink-3-i-3535.mp3",
"title": "Rise of the Secure Technology Alliance",
"pubdate": "20170330"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/britains-home-secretary-enters-encryption-debate-directLink-5-i-3544.mp3",
"title": "Britain\"s Home Secretary Enters the Encryption Debate",
"pubdate": "20170328"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blockchain-seen-as-secure-cyberthreat-information-sharing-tool-directLink-6-i-3543.mp3",
"title": "Blockchain Seen as a Secure Cyberthreat Info Sharing Tool",
"pubdate": "20170324"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-richard-bussiere-tenable-network-security-directLink-9-i-3542.mp3",
"title": "Why Continuous Vulnerability Assessment Is Essential",
"pubdate": "20170324"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-kartik-shahani-rsa-directLink-2-i-3536.mp3",
"title": "Moving From IT-Driven to Business-Driven Security",
"pubdate": "20170321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/comey-confirms-probe-possible-trump-campaign-russia-links-directLink-3-i-3539.mp3",
"title": "Comey Confirms Probe of Possible Trump-Russia Links",
"pubdate": "20170321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-thinking-iam-cybersecurity-directLink-8-i-3540.mp3",
"title": "Re-Thinking IAM and Cybersecurity",
"pubdate": "20170321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/study-some-mobile-devices-be-hacked-using-sound-waves-directLink-6-i-3538.mp3",
"title": "Study: Some Mobile Devices Can Be Hacked Using Sound Waves",
"pubdate": "20170321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-budget-15-billion-for-dhs-cybersecurity-directLink-8-i-3537.mp3",
"title": "Trump Budget: $1.5 Billion for DHS Cybersecurity",
"pubdate": "20170317"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-defenders-advantage-directLink-7-i-3529.mp3",
"title": "Ransomware: The Defender\"s Advantage",
"pubdate": "20170317"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rating-security-performance-fortune-1000-directLink-1-i-3534.mp3",
"title": "Rating the Security Performance of the Fortune 1000",
"pubdate": "20170314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-white-house-cybersec-adviser-words-nsas-rob-joyce-directLink-3-i-3532.mp3",
"title": "Will NSA\"s Rob Joyce Be Trump\"s Top Cybersecurity Adviser?",
"pubdate": "20170314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-we-learn-from-hipaa-settlements-directLink-9-i-3527.mp3",
"title": "What Can We Learn from HIPAA Settlements?",
"pubdate": "20170314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mirai-tools-up-for-advanced-ddos-attacks-directLink-6-i-3526.mp3",
"title": "Mirai Tools Up for Advanced DDoS Attacks",
"pubdate": "20170314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deep-dive-into-wikileaks-release-cia-hacking-files-directLink-4-i-3524.mp3",
"title": "What\"s Behind WikiLeaks\" Release of CIA Hacking Files",
"pubdate": "20170310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/showdown-prepping-enterprise-security-for-ddos-botnets-directLink-10-i-3521.mp3",
"title": "Showdown: Prepping Enterprise Security for DDoS Botnets",
"pubdate": "20170307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/now-you-see-it-now-you-dont-return-cryptolocker-ransomware-directLink-8-i-3520.mp3",
"title": "Now You See It, Now You Don\"t: The Return of Crypt0L0cker",
"pubdate": "20170307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solutions-integration-will-set-vendors-apart-directLink-7-i-3519.mp3",
"title": "Achieving \"Digital Resilience\"",
"pubdate": "20170304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/most-breaches-trace-to-phishing-social-engineering-attacks-directLink-7-i-3516.mp3",
"title": "Verizon: Most Breaches Trace to Phishing, Social Engineering",
"pubdate": "20170304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/baseline-user-behavior-to-focus-intrusion-detection-directLink-9-i-3517.mp3",
"title": "Study User Behavior to Focus Intrusion Detection",
"pubdate": "20170304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-europes-gdpr-impact-us-businesses-directLink-5-i-3518.mp3",
"title": "How Will Europe\"s GDPR Affect Businesses Worldwide?",
"pubdate": "20170303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/howard-schmidt-dies-creating-cybersecurity-framework-metrics-directLink-10-i-3514.mp3",
"title": "Howard Schmidt Dies; Creating CyberSec Framework Metrics",
"pubdate": "20170303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/use-cloud-to-make-enterprises-less-complex-directLink-1-i-3513.mp3",
"title": "Using the Cloud to Make Enterprises Less Complex",
"pubdate": "20170303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-dispelling-medical-device-cybersecurity-myths-directLink-3-i-3512.mp3",
"title": "FDA: Dispelling Medical Device Cybersecurity Myths",
"pubdate": "20170302"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-fraudsters-taste-their-own-medicine-directLink-10-i-3511.mp3",
"title": "Giving Fraudsters a Taste of Their Own Medicine",
"pubdate": "20170228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-hack-proof-system-directLink-4-i-3504.mp3",
"title": "Creating a Hack-Proof Computer",
"pubdate": "20170227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leakedsources-demise-troy-hunt-talks-lessons-learned-directLink-4-i-3509.mp3",
"title": "LeakedSource\"s Demise: Lessons Learned",
"pubdate": "20170225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/battling-mobile-banking-attacks-directLink-9-i-3508.mp3",
"title": "Battling Mobile Banking Attacks",
"pubdate": "20170225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-away-from-check-box-compliance-directLink-1-i-3507.mp3",
"title": "Moving Away from Checkbox Compliance",
"pubdate": "20170224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dark-web-5-things-to-know-directLink-2-i-3495.mp3",
"title": "Dark Web: 5 Things to Know",
"pubdate": "20170224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/comodo-phillip-hallam-baker-directLink-1-i-3493.mp3",
"title": "Securing Data Beyond \"The Walled Garden\"",
"pubdate": "20170224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/retrospection-backtracks-detection-unknown-intrusions-directLink-10-i-3506.mp3",
"title": "\"Retrospection\" Backtracks Detection of Intrusions",
"pubdate": "20170224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/posnack-at-himss-directLink-7-i-3505.mp3",
"title": "Investigating Blockchain\"s Role in Health Info Exchange",
"pubdate": "20170224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-vendor-risk-management-directLink-8-i-3487.mp3",
"title": "ROI of Vendor Risk Management",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ari-schwartz-directLink-7-i-3498.mp3",
"title": "What\"s Ahead for Trump on Cybersecurity Initiatives?",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/al-pascual-directLink-5-i-3476.mp3",
"title": "Javelin: Card-Not-Present Fraud Jumped 40% in 2016",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeting-faster-breach-detection-via-analytics-directLink-4-i-3501.mp3",
"title": "Faster Breach Detection via Analytics",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/abosulte-richard-henderson-directLink-1-i-3484.mp3",
"title": "The Growth of IoT Litigation, Regulation",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sean-feeney-defense-storm-directLink-7-i-3485.mp3",
"title": "Smaller Financial Institutions Struggle with Cyber Resilience",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lastline-directLink-7-i-3478.mp3",
"title": "The Case for Solutions Integration",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adam-greene-at-himss-directLink-10-i-3499.mp3",
"title": "Will a Pending OCR Rule Impact Breach Class-Action Suits?",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/streaming-malware-detection-shuts-polymorphic-strains-in-tracks-directLink-7-i-3502.mp3",
"title": "Stopping Phishing Attacks More Quickly",
"pubdate": "20170223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/carol-alexander-ca-technologies-directLink-5-i-3496.mp3",
"title": "The Role of Omnichannel Risk Analysis",
"pubdate": "20170222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/most-cybersecurity-startups-wont-survive-directLink-8-i-3494.mp3",
"title": "Trend Micro: Why Most Cybersecurity Startups Won\"t Survive",
"pubdate": "20170222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-business-case-for-user-behavior-monitoring-directLink-6-i-3492.mp3",
"title": "The Security Business Case for User Behavior Monitoring",
"pubdate": "20170222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-software-defined-secure-networks-directLink-7-i-3491.mp3",
"title": "The Rise of Software-Defined Secure Networks",
"pubdate": "20170222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lucia-savage-directLink-6-i-3481.mp3",
"title": "Former ONC Privacy Chief on Healthcare\"s Cyber Challenges",
"pubdate": "20170221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-integrity-in-era-fake-news-directLink-2-i-3489.mp3",
"title": "Data Integrity in the Era of Fake News",
"pubdate": "20170221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deven-mcgraw-directLink-6-i-3486.mp3",
"title": "HIPAA Compliance Audits: The Very Latest Details",
"pubdate": "20170221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dell-secureworks-directLink-9-i-3477.mp3",
"title": "Trapping Hackers Via BEC Attacks, Email Spoofing",
"pubdate": "20170221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nordenberg-at-himss-directLink-9-i-3483.mp3",
"title": "A New Way to Report Medical Device Vulnerabilities",
"pubdate": "20170221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2017-voices-security-thought-leaders-directLink-4-i-3479.mp3",
"title": "RSA 2017: Voices of InfoSec Thought Leaders",
"pubdate": "20170217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-rep-michael-mccaul-on-homeland-cybersecurity-directLink-2-i-3474.mp3",
"title": "US Rep. Michael McCaul on Homeland Cybersecurity",
"pubdate": "20170215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/epidemiology-immunology-genetics-processes-echo-in-security-directLink-6-i-3473.mp3",
"title": "Epidemiology, Immunology, Genetics Echo in InfoSecurity",
"pubdate": "20170214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-coding-rise-secdevops-directLink-5-i-3470.mp3",
"title": "Secure Coding: The Rise of SecDevOps",
"pubdate": "20170211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evaluating-impact-lawful-hacking-metadata-directLink-5-i-3472.mp3",
"title": "Evaluating Impact of Lawful Hacking, Metadata",
"pubdate": "20170210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-security-professionals-learn-from-epidemiologists-directLink-5-i-3471.mp3",
"title": "What Security Professionals Can Learn From Epidemiologists",
"pubdate": "20170210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/why-cant-we-solve-phishing-directLink-1-i-3468.mp3",
"title": "\\\"Why Can\"t We Solve Phishing?\\\"",
"pubdate": "20170208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-trump-administration-assure-healthcare-security-directLink-6-i-3467.mp3",
"title": "How Will Trump Administration Ensure Healthcare InfoSec?",
"pubdate": "20170207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expert-analysis-improving-medical-device-cybersecurity-directLink-10-i-3466.mp3",
"title": "Expert Analysis: Improving Medical Device Cybersecurity",
"pubdate": "20170207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-chelsea-manning-evolving-defense-against-malicious-insiders-directLink-7-i-3465.mp3",
"title": "Post-Manning: Malicious Insider Defenses Evolve",
"pubdate": "20170206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-dhs-against-insider-threat-directLink-1-i-3464.mp3",
"title": "Defending DHS Against the Insider Threat",
"pubdate": "20170203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-achieve-digital-trust-directLink-9-i-3455.mp3",
"title": "What It Takes to Achieve Digital Trust",
"pubdate": "20170203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shahram-ebadollahi-directLink-5-i-3463.mp3",
"title": "Could Blockchain Support Secure Health Data Exchange?",
"pubdate": "20170202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-didnt-hold-austrian-hotel-guests-hostage-directLink-8-i-3461.mp3",
"title": "Ransomware Didn\"t Hold Austrian Hotel Guests Hostage",
"pubdate": "20170131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/court-revived-breach-related-case-against-horizon-bcbs-directLink-4-i-3460.mp3",
"title": "Why Court Revived Breach-Related Case Against Horizon BCBS",
"pubdate": "20170128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-endpoint-detection-behavioral-analytics-directLink-9-i-3456.mp3",
"title": "Gartner\"s Litan on Endpoint Detection, Behavioral Analytics",
"pubdate": "20170127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-staffers-used-rnc-private-email-server-directLink-7-i-3457.mp3",
"title": "White House Staffers Used an RNC Private Email Server",
"pubdate": "20170127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-enforcement-under-trump-forecast-directLink-3-i-3458.mp3",
"title": "HIPAA Enforcement Under Trump: A Forecast",
"pubdate": "20170127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privileged-access-management-break-kill-chain-directLink-5-i-3454.mp3",
"title": "Privileged Access Management: Break the Kill Chain",
"pubdate": "20170125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-2017-preview-directLink-4-i-3453.mp3",
"title": "RSA Conference 2017: A Preview",
"pubdate": "20170125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trump-militarizing-civilian-cyber-defense-directLink-6-i-3452.mp3",
"title": "Is Trump Militarizing Civilian Cyber Defense?",
"pubdate": "20170124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hhs-deputy-ciso-spearheads-cybersecurity-effort-directLink-3-i-3451.mp3",
"title": "HHS Deputy CISO Spearheads Cybersecurity Effort",
"pubdate": "20170124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-president-obamas-cybersecurity-legacy-directLink-7-i-3450.mp3",
"title": "Assessing Obama\"s Cybersecurity Legacy",
"pubdate": "20170120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cynergistek-gets-new-owner-ceo-explains-deal-directLink-2-i-3448.mp3",
"title": "CynergisTek Gets New Owner: CEO Explains Deal",
"pubdate": "20170120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ftc-pushes-manufacturer-to-secure-iot-wares-directLink-2-i-3447.mp3",
"title": "FTC Pushes Manufacturer to Secure IoT Wares",
"pubdate": "20170117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-data-exchange-3-key-security-steps-directLink-4-i-3446.mp3",
"title": "Health Data Exchange: 3 Key Security Steps",
"pubdate": "20170117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/details-emerge-on-hack-ukraines-power-grid-directLink-5-i-3444.mp3",
"title": "Details Emerge on Ukraine Power Grid Hack",
"pubdate": "20170113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-chris-novak-ii-evolution-threat-landscape-in-last-decade-directLink-10-i-3441.mp3",
"title": "Memory-Resident Malware Creating Forensics Challenges",
"pubdate": "20170111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-deep-dive-into-intels-report-on-russian-dnc-hack-directLink-4-i-3442.mp3",
"title": "Deep Dive: US Intelligence Report Into Russian Hacking",
"pubdate": "20170110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-trump-vs-intelligence-community-directLink-8-i-3440.mp3",
"title": "Special Report: Trump vs. US Intelligence Community",
"pubdate": "20170106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ganesh-ramamoorthy-gartner-vp-on-iot-security-directLink-9-i-3439.mp3",
"title": "IoT: The Need to Expand the Scope of Security",
"pubdate": "20170105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-vulnerabilities-in-medical-devices-directLink-4-i-3427.mp3",
"title": "Addressing Vulnerabilities in Medical Devices",
"pubdate": "20170104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/talktalk-breach-investigation-lessons-learned-directLink-1-i-3426.mp3",
"title": "TalkTalk Breach Investigation: Top Cybersecurity Takeaways",
"pubdate": "20170103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shift-to-intelligent-hybrid-security-directLink-3-i-3438.mp3",
"title": "The Shift to Intelligent Hybrid Security",
"pubdate": "20170103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/doubts-raised-on-value-sanctions-against-russia-directLink-8-i-3437.mp3",
"title": "Doubts Raised on Value of Sanctions Against Russia",
"pubdate": "20170103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/transition-to-trump-administration-cyber-risks-directLink-3-i-3436.mp3",
"title": "Transition to Trump Administration: The Cyber Risks",
"pubdate": "20170102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-encryption-against-awesome-power-quantum-computing-directLink-9-i-3435.mp3",
"title": "Defending Encryption from Quantum Computers",
"pubdate": "20161230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-chris-novak-verizon-part-i-current-landscape-case-studies-directLink-10-i-3434.mp3",
"title": "Operational Technology: The Next Security Challenge",
"pubdate": "20161230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-ddos-attacks-mitigation-whats-in-store-directLink-7-i-3429.mp3",
"title": "How to Battle IoT Devices Infected with DDoS Malware",
"pubdate": "20161229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breaches-whats-in-store-for-year-ahead-directLink-8-i-3425.mp3",
"title": "2017: \"Year of the Breach\" Redux?",
"pubdate": "20161228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-threat-awareness-education-priority-for-2017-directLink-1-i-3424.mp3",
"title": "Cyber Threat Awareness Education: A Priority for 2017",
"pubdate": "20161228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-rob-van-der-ende-mandiant-apac-directLink-4-i-3433.mp3",
"title": "The Changing Face of Cyber Espionage",
"pubdate": "20161228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-difference-between-good-bad-directLink-9-i-3431.mp3",
"title": "Threat Intelligence: The Difference Between Good and Bad",
"pubdate": "20161227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-conversations-about-nation-state-cyber-adversaries-directLink-2-i-3432.mp3",
"title": "Special Report: Conversations About Nation-State Adversaries",
"pubdate": "20161227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2017-cybersecurity-predictions-aftermath-trump-election-directLink-10-i-3422.mp3",
"title": "2017 Cybersecurity Predictions: The Impact of Trump Election",
"pubdate": "20161226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/house-working-group-encryption-bypasses-bad-idea-directLink-6-i-3430.mp3",
"title": "House Working Group: Encryption Bypasses a Bad Idea",
"pubdate": "20161223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pierson-directLink-2-i-3428.mp3",
"title": "How Would Restructuring of CFPB Affect Banks?",
"pubdate": "20161223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-dr-hugh-thompson-directLink-2-i-3423.mp3",
"title": "The Urgent Need to Recruit More Cybersecurity Pros",
"pubdate": "20161222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/senators-call-for-select-committee-to-probe-hacks-said-to-sway-vote-directLink-10-i-3421.mp3",
"title": "Senators Call for Select Panel to Probe Hacks Said to Sway Vote",
"pubdate": "20161220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-key-elements-response-directLink-3-i-3419.mp3",
"title": "Ransomware: Key Elements of Response",
"pubdate": "20161219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/impact-21st-century-cures-act-on-privacy-security-directLink-9-i-3418.mp3",
"title": "21st Century Cures Act: Analysis of Impact",
"pubdate": "20161217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jeremy-king-directLink-7-i-3407.mp3",
"title": "Contactless Payments: Addressing the Security Issues",
"pubdate": "20161217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-hacktivists-launch-attacks-to-protest-trumps-presidency-directLink-4-i-3417.mp3",
"title": "Will Hacktivists Launch Attacks to Protest Trump\"s Presidency?",
"pubdate": "20161216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-attribution-hack-back-dont-waste-time-directLink-8-i-3414.mp3",
"title": "Breach Attribution and \"Hack Back\": Don\"t Waste Time",
"pubdate": "20161215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-healthcare-attract-cybersecurity-talent-directLink-9-i-3410.mp3",
"title": "How Can Healthcare Attract Cybersecurity Talent?",
"pubdate": "20161214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-year-new-threats-2017-security-predictions-from-malwarebytes-directLink-3-i-3415.mp3",
"title": "New Year, New Threats: 2017 Security Predictions from Malwarebytes",
"pubdate": "20161214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-scorecard-which-countrys-consumers-are-most-engaged-directLink-5-i-3412.mp3",
"title": "Security Scorecard: Where Are Consumers Most Engaged?",
"pubdate": "20161213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-law-modestly-extends-security-privacy-protections-directLink-2-i-3416.mp3",
"title": "New Law\"s Impact on IT Security and Privacy Protections",
"pubdate": "20161213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-new-technologies-help-hackers-wage-sophisticated-attacks-directLink-10-i-3413.mp3",
"title": "How New Technologies Help Hackers Wage Sophisticated Attacks",
"pubdate": "20161213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-offers-new-guidance-on-simplifying-network-segmentation-directLink-10-i-3411.mp3",
"title": "New PCI Guidance on Simplifying Network Segmentation",
"pubdate": "20161209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/searching-for-donald-trumps-cybersecurity-bona-fides-directLink-2-i-3409.mp3",
"title": "Sizing Up Donald Trump\"s Cybersecurity Acumen",
"pubdate": "20161209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malvertising-ransomware-evolution-cyber-threats-directLink-2-i-3398.mp3",
"title": "Malvertising, Ransomware and the Evolution of Cyber Threats",
"pubdate": "20161207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crime-as-service-top-cyber-threat-for-2017-directLink-4-i-3406.mp3",
"title": "\"Crime as a Service\" a Top Cyber Threat for 2017",
"pubdate": "20161207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-behavioral-biometrics-cognitive-fraud-detection-directLink-2-i-3405.mp3",
"title": "Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection",
"pubdate": "20161206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/commission-on-enhancing-national-cybersecurity-member-explains-reasoning-behind-recommendations-directLink-7-i-3404.mp3",
"title": "Cybersecurity Panelist on Recommendations to Trump",
"pubdate": "20161206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/would-you-re-hire-your-ips-today-directLink-3-i-3388.mp3",
"title": "Would You Re-Hire Your IPS Today?",
"pubdate": "20161206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/measure-security-its-impact-on-mission-directLink-3-i-3360.mp3",
"title": "Measure Security and Its Impact on the Mission",
"pubdate": "20161206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-congressional-barrier-on-cybersecurity-oversight-directLink-5-i-3403.mp3",
"title": "Overcoming Congressional Barriers on Cybersecurity Oversight",
"pubdate": "20161202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experian-cyberattacks-could-escalate-to-cyberwar-directLink-10-i-3401.mp3",
"title": "Experian: Why Cyberattacks Could Escalate to \"Cyberwar\"",
"pubdate": "20161202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-organized-cybercrime-new-approach-directLink-2-i-3400.mp3",
"title": "Fighting Organized Cybercrime: A New Approach",
"pubdate": "20161201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/san-francisco-battles-public-transport-ransomware-outbreak-directLink-1-i-3399.mp3",
"title": "San Francisco Battles Public Transport Ransomware Outbreak",
"pubdate": "20161130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-internet-things-addressing-gaps-directLink-7-i-3390.mp3",
"title": "HIPAA and the Internet of Things: Addressing Gaps",
"pubdate": "20161128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/soltra-edge-revived-new-owner-directLink-6-i-3397.mp3",
"title": "Soltra Edge Revived with New Owner",
"pubdate": "20161124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-nsfocus-protected-g20-summit-directLink-2-i-3396.mp3",
"title": "How NSFOCUS Protected the G20 Summit",
"pubdate": "20161123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2017-mobile-enterprise-security-challenges-directLink-10-i-3395.mp3",
"title": "The 2017 Mobile Enterprise: Security Challenges",
"pubdate": "20161123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-security-internet-things-be-regulated-directLink-2-i-3392.mp3",
"title": "Security Analysis: Regulating IoT; Protecting Obamacare Data",
"pubdate": "20161122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/merchants-object-to-visas-emv-debit-routing-rules-directLink-1-i-3393.mp3",
"title": "Why Merchants Object to Visa\"s EMV Debit Routing Rules",
"pubdate": "20161122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-way-to-build-secure-trustworthy-systems-directLink-7-i-3391.mp3",
"title": "New Way to Build Secure Trustworthy Systems",
"pubdate": "20161118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-when-will-trump-tackle-hipaa-reform-directLink-2-i-3389.mp3",
"title": "How and When Will Trump Tackle Healthcare IT Reforms?",
"pubdate": "20161115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/did-weak-security-sway-election-directLink-9-i-3387.mp3",
"title": "Did Weak InfoSec Sway Election?",
"pubdate": "20161111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leader-obamas-cybersecurity-review-chimes-in-on-assessment-trump-promises-to-make-directLink-1-i-3386.mp3",
"title": "Obama\"s Cyber Review Leader on What\"s Ahead for Trump",
"pubdate": "20161110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-tools-aim-to-close-cybersecurity-skills-gap-directLink-7-i-3385.mp3",
"title": "New Tools Aim to Close the Cybersecurity Skills Gap",
"pubdate": "20161109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kim-kardashian-security-awareness-wake-up-call-directLink-5-i-3383.mp3",
"title": "The Kim Kardashian Security Wake-Up Call",
"pubdate": "20161108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-fbi-quickly-reviewed-650k-emails-on-computer-clinton-aide-directLink-3-i-3384.mp3",
"title": "How FBI Quickly Reviewed 650K Emails on Clinton Aide\"s PC",
"pubdate": "20161108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenge-defending-domain-name-system-directLink-3-i-3381.mp3",
"title": "The Challenge of Defending the Domain Name System",
"pubdate": "20161108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-fbi-conducted-exam-computer-clintons-top-aide-directLink-8-i-3380.mp3",
"title": "Clinton Email Investigation: A Forensics Perspective",
"pubdate": "20161107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-cyberattacks-pose-threat-to-presidential-election-directLink-8-i-3379.mp3",
"title": "Cyberattacks Pose Threat to Presidential Election",
"pubdate": "20161104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-cerber-ransomware-as-a-service-operation-directLink-8-i-3376.mp3",
"title": "Inside the Cerber Ransomware-as-a-Service Operation",
"pubdate": "20161104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-lessons-for-modernization-echo-from-past-directLink-4-i-3375.mp3",
"title": "Echo from the Past: Security Lessons for IT Modernization",
"pubdate": "20161101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-taking-disaster-recovery-approach-directLink-5-i-3374.mp3",
"title": "Breach Response: Taking a \"Disaster Recovery\" Approach",
"pubdate": "20161101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-new-auto-cybersecurity-guidance-ibm-apologizes-for-ddos-attack-impact-directLink-8-i-3373.mp3",
"title": "Automotive CyberSec Guidance Assessed; IBM\"s DDoS Apology",
"pubdate": "20161028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/is-healthcare-sector-so-vulnerable-to-cyberattacks-directLink-8-i-3371.mp3",
"title": "Why Is Healthcare Sector So Vulnerable to Cyberattacks?",
"pubdate": "20161028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-hhs-cio-on-emerging-threats-top-priorities-directLink-2-i-3369.mp3",
"title": "New HHS CIO on Emerging Threats, Top Priorities",
"pubdate": "20161027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-sector-among-most-at-risk-from-social-engineering-directLink-7-i-3370.mp3",
"title": "Healthcare Sector Among Most at Risk from Social Engineering",
"pubdate": "20161027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/at-eye-defensestorm-directLink-9-i-3362.mp3",
"title": "At the Eye of the DefenseStorm",
"pubdate": "20161027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-user-new-perimeter-directLink-3-i-3368.mp3",
"title": "Cybersecurity: Redefining Visibility and Transparency",
"pubdate": "20161027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thwarting-massive-ddos-attacks-what-future-holds-directLink-10-i-3367.mp3",
"title": "Thwarting Massive DDoS Attacks: What the Future Holds",
"pubdate": "20161025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacking-us-presidential-election-evaluating-threats-directLink-10-i-3364.mp3",
"title": "Hacking the US Presidential Election: Evaluating the Threats",
"pubdate": "20161021"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-how-to-spot-risky-behavior-directLink-5-i-3363.mp3",
"title": "Insider Threat: How to Spot Risky Behavior",
"pubdate": "20161021"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/route-to-trusted-ids-directLink-6-i-3348.mp3",
"title": "The Route to Trusted IDs",
"pubdate": "20161020"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critics-assail-cyber-bank-regs-engaging-small-health-providers-in-info-sharing-directLink-4-i-3361.mp3",
"title": "Critics Assail NY Bank Regs; NH-ISAC Tackles Info Sharing",
"pubdate": "20161018"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-on-iot-security-landscape-directLink-10-i-3356.mp3",
"title": "IoT: How Standards Would Help Security",
"pubdate": "20161017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-assesses-impact-ai-on-cybersecurity-directLink-9-i-3358.mp3",
"title": "Obama Assesses Impact of AI on Cybersecurity",
"pubdate": "20161014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/engaging-smaller-healthcare-entities-in-threat-info-sharing-directLink-5-i-3357.mp3",
"title": "Engaging Smaller Healthcare Entities in Threat Info Sharing",
"pubdate": "20161014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/clinton-trump-go-head-to-head-over-purported-russian-hacks-directLink-7-i-3355.mp3",
"title": "Clinton, Trump: Head-to-Head Over Purported Russian Hacks",
"pubdate": "20161011"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thwarting-attempts-to-defeat-encryption-in-pos-devices-directLink-9-i-3352.mp3",
"title": "Thwarting Attempts to Defeat Encryption in POS Devices",
"pubdate": "20161007"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-associate-agreements-just-for-vendors-directLink-9-i-3353.mp3",
"title": "Business Associate Agreements: Not Just for Vendors",
"pubdate": "20161007"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-gartners-john-girard-on-mobile-security-trends-directLink-5-i-3347.mp3",
"title": "Mobile Data Security: Role of Rights Management",
"pubdate": "20161005"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-researcher-explains-insulin-pump-vulnerabilities-directLink-8-i-3351.mp3",
"title": "Inside Scoop: J&J Confirms Insulin Pump Security Flaws",
"pubdate": "20161005"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/donald-trump-unveils-his-cybersecurity-platform-directLink-10-i-3346.mp3",
"title": "Donald Trump Unveils His Cybersecurity Platform",
"pubdate": "20161004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-regulators-to-collaborate-regulated-businesses-on-cybersecurity-directLink-5-i-3344.mp3",
"title": "Getting Regulators and Regulated to Collaborate on Cybersecurity",
"pubdate": "20161003"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybercrime-on-rise-update-on-cyberthreat-info-sharing-directLink-3-i-3343.mp3",
"title": "Why Cybercrime Is On the Rise; Update on Threat Info Sharing",
"pubdate": "20160930"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-fraud-risks-for-same-day-ach-directLink-2-i-3342.mp3",
"title": "Mitigating Fraud Risks for Same-Day ACH",
"pubdate": "20160929"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/research-reveals-hacked-patient-records-are-so-valuable-directLink-3-i-3341.mp3",
"title": "Research Reveals Why Hacked Patient Records Are So Valuable",
"pubdate": "20160928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-steve-riley-directLink-6-i-3335.mp3",
"title": "Cloud Security Paradigm: Time for Change?",
"pubdate": "20160928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/organizations-dont-correctly-implement-hashed-passwords-directLink-7-i-3340.mp3",
"title": "Why Hashed Passwords Aren\"t Implemented Correctly",
"pubdate": "20160927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-john-dickson-directLink-3-i-3333.mp3",
"title": "Why CISOs Must Make Application Security a Priority",
"pubdate": "20160927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/achieving-resilient-cybersecurity-directLink-3-i-3330.mp3",
"title": "Achieving Resilient Cybersecurity",
"pubdate": "20160926"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/yahoo-breach-security-lessons-to-be-learned-directLink-2-i-3338.mp3",
"title": "Yahoo\"s Mega Breach: Security Takeaways",
"pubdate": "20160924"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/typical-data-breach-cost-7-million-or-200000-directLink-3-i-3337.mp3",
"title": "Typical Cost of a Data Breach: $200,000 or $7 Million?",
"pubdate": "20160923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-raimund-genes-ransomware-virus-total-issue-directLink-9-i-3328.mp3",
"title": "Why Is Ransomware So Successful?",
"pubdate": "20160921"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aligning-cyber-framework-organizations-strategy-goals-directLink-8-i-3334.mp3",
"title": "Aligning Cyber Framework with Organization\"s Strategy, Goals",
"pubdate": "20160920"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/panel-pd-directLink-3-i-3331.mp3",
"title": "Helping Police Solve Cybercrimes",
"pubdate": "20160919"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-summit-wrap-up-data-complexity-facilitates-cyber-risk-directLink-9-i-3329.mp3",
"title": "ISMG Summit Wrap Up: Data Complexity Facilitates Cyber Risk",
"pubdate": "20160916"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-sid-deshpande-directLink-4-i-3327.mp3",
"title": "Security Investments Shifting to Detection and Response",
"pubdate": "20160915"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sen-elizabeth-warren-seeks-probe-bank-over-privacy-violations-directLink-5-i-3326.mp3",
"title": "Senator Seeks Probe of Bank Over Privacy Violations",
"pubdate": "20160913"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-gartners-tom-scholtz-directLink-10-i-3325.mp3",
"title": "A CISO\"s First 100 Days",
"pubdate": "20160909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-donald-trump-understand-cybersecurity-directLink-1-i-3324.mp3",
"title": "Does Donald Trump Understand Cybersecurity?",
"pubdate": "20160909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-needs-to-standardize-threat-info-sharing-directLink-3-i-3323.mp3",
"title": "Why Healthcare Needs to Standardize Threat Info Sharing",
"pubdate": "20160909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-effective-network-defense-using-threat-intelligence-directLink-9-i-3321.mp3",
"title": "Building an Effective Network Defense Using Threat Intelligence",
"pubdate": "20160906"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-threat-intelligence-ecosystem-directLink-5-i-3272.mp3",
"title": "Understanding the Threat Intelligence Ecosystem",
"pubdate": "20160906"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opm-hack-partly-blamed-on-congressional-budgeting-method-directLink-2-i-3320.mp3",
"title": "Did Outdated Systems Pave Way to OPM Hack?",
"pubdate": "20160906"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-heads-up-to-manufacturers-on-harmful-medical-devices-flaws-directLink-10-i-3319.mp3",
"title": "Reporting Medical Device Security Issues the Right Way",
"pubdate": "20160902"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-do-medical-device-security-flaws-equal-clinical-risk-directLink-5-i-3318.mp3",
"title": "When Do Medical Device Security Flaws Equal Clinical Risk?",
"pubdate": "20160902"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-inside-outside-data-centers-directLink-3-i-3317.mp3",
"title": "Defending the Inside and Outside of Data Centers",
"pubdate": "20160901"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-cio-federal-funding-process-played-key-role-in-opm-hack-directLink-10-i-3316.mp3",
"title": "US CIO: Federal Funding Process Played Key Role in OPM Hack",
"pubdate": "20160901"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-cope-equation-group-revelations-directLink-4-i-3311.mp3",
"title": "How to Cope With Intelligence Agency Exploits",
"pubdate": "20160901"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vint-cerfs-optimistic-vision-internet-he-helped-create-directLink-4-i-3314.mp3",
"title": "Vint Cerf\"s Outlook for the Internet He Helped Create",
"pubdate": "20160831"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-best-way-to-handle-medical-device-security-concerns-directLink-8-i-3313.mp3",
"title": "What\"s the Best Way to Handle Medical Device Security Concerns?",
"pubdate": "20160831"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/states-warned-possible-attack-against-voter-systems-directLink-3-i-3312.mp3",
"title": "States Warned of Possible Attack Against Voter Systems",
"pubdate": "20160830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/just-in-case-saving-up-to-pay-off-ransomware-attacker-directLink-6-i-3309.mp3",
"title": "Just In Case: Saving Up to Pay Off Ransomware Attacker",
"pubdate": "20160826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patch-or-perish-fix-which-flaws-first-directLink-5-i-3308.mp3",
"title": "Patch or Perish: Fix Which Flaws First?",
"pubdate": "20160826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-maturing-mobile-threat-directLink-7-i-3302.mp3",
"title": "Mitigating the Maturing Mobile Threat",
"pubdate": "20160826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/time-solution-to-cybersecurity-skills-shortage-directLink-5-i-3306.mp3",
"title": "The Maturing of the InfoSec Workforce",
"pubdate": "20160825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/demystifying-dark-web-directLink-1-i-3305.mp3",
"title": "Demystifying the Dark Web",
"pubdate": "20160824"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-usb-great-again-directLink-3-i-3301.mp3",
"title": "Making USB Great Again",
"pubdate": "20160823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/details-behind-hhss-breach-investigation-ramp-up-directLink-10-i-3304.mp3",
"title": "The Details Behind HHS Breach Investigation Ramp-Up",
"pubdate": "20160823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/better-balancing-customer-experience-security-directLink-4-i-3300.mp3",
"title": "Providing Frictionless ID Management",
"pubdate": "20160823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-rising-cost-security-directLink-4-i-3299.mp3",
"title": "Tackling the Rising Cost of Security",
"pubdate": "20160822"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keeping-sensitive-federal-data-secure-on-non-government-computers-directLink-3-i-3296.mp3",
"title": "NIST Updating Guidance on Protecting Federal Information",
"pubdate": "20160820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nordenberg-part-2-directLink-2-i-3294.mp3",
"title": "Tackling Medical Device Security as a Public Health Issue",
"pubdate": "20160820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unraveling-mystery-behind-equation-group-directLink-8-i-3295.mp3",
"title": "Unraveling the Mystery Behind the Equation Group",
"pubdate": "20160819"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-sam-lodhi-directLink-4-i-3292.mp3",
"title": "Using Cybernetics to Tell the Security Story",
"pubdate": "20160818"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-ddos-attack-isnt-ddos-attack-directLink-1-i-3291.mp3",
"title": "When a DDoS Attack Isn\"t a DDoS Attack",
"pubdate": "20160816"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nordenberg-directLink-6-i-3290.mp3",
"title": "Medical Device Security: Creating an Inventory",
"pubdate": "20160816"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-those-initial-steps-to-create-isao-directLink-1-i-3289.mp3",
"title": "Taking Initial Steps to Create an ISAO",
"pubdate": "20160815"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-patient-consent-policies-affect-health-info-exchange-directLink-6-i-3281.mp3",
"title": "How Patient Consent Policies Affect Health Info Exchange",
"pubdate": "20160813"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russians-are-coming-russians-are-here-directLink-3-i-3288.mp3",
"title": "The Russians Are Coming, the Russians Are Here",
"pubdate": "20160812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-national-hie-privacy-security-obstacles-directLink-10-i-3280.mp3",
"title": "Overcoming National HIE Privacy, Security Obstacles",
"pubdate": "20160812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ex-fbi-agent-on-dnc-breach-investigation-directLink-7-i-3286.mp3",
"title": "Ex-FBI Agent on DNC Breach Investigation",
"pubdate": "20160811"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/comey-renews-debate-over-encryption-bypass-directLink-8-i-3284.mp3",
"title": "Comey Renews the Debate Over Encryption Bypass",
"pubdate": "20160809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-need-exist-for-us-department-cybersecurity-directLink-6-i-3283.mp3",
"title": "Does US Need a Department of Cybersecurity?",
"pubdate": "20160808"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/labeling-us-electoral-systems-as-critical-infrastructure-directLink-1-i-3282.mp3",
"title": "Labeling US Electoral Systems as Critical Infrastructure",
"pubdate": "20160805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-global-cybersecurity-skills-shortage-directLink-5-i-3279.mp3",
"title": "Analyzing the Global Cybersecurity Skills Shortage",
"pubdate": "20160804"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-plays-key-role-in-bank-fraud-directLink-2-i-3277.mp3",
"title": "Social Media Plays Key Role in Bank Fraud",
"pubdate": "20160803"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-risk-management-stuck-in-bronze-age-directLink-4-i-3275.mp3",
"title": "Why Cyber Risk Management Is Stuck in the \"Bronze Age\"",
"pubdate": "20160802"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vp-nominee-kaine-seeks-balance-between-security-privacy-directLink-3-i-3273.mp3",
"title": "VP Nominee Kaine Seeks to Balance Security, Privacy",
"pubdate": "20160729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-gang-claims-corporate-sabotage-sideline-directLink-1-i-3269.mp3",
"title": "Ransom Smackdown: Group Promises Decryption Tools",
"pubdate": "20160729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-phill-cracknell-founder-ciso-club-on-security-metrics-directLink-7-i-3268.mp3",
"title": "Metrics Project May Help CISOs Measure Effectiveness Better",
"pubdate": "20160728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solving-big-risk-problems-one-small-step-at-time-directLink-10-i-3271.mp3",
"title": "Solving Big Risk Problems One Small Step at a Time",
"pubdate": "20160728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/congress-considers-controversial-patient-id-matching-issue-directLink-1-i-3270.mp3",
"title": "Congress Considers Controversial Patient ID Matching Issue",
"pubdate": "20160728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-interview-david-dufour-webroot-directLink-3-i-3263.mp3",
"title": "Defining a Smart City\"s Security Architecture",
"pubdate": "20160727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-interview-zulfikar-ramzan-cto-rsa-directLink-6-i-3260.mp3",
"title": "Three Principles of an Effective Cybersecurity Strategy",
"pubdate": "20160727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-should-us-respond-if-russians-behind-hack-dnc-computers-directLink-8-i-3267.mp3",
"title": "How Should US Respond If Russians Hacked DNC System?",
"pubdate": "20160726"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-ransomware-directLink-3-i-3266.mp3",
"title": "The Evolution of Ransomware",
"pubdate": "20160726"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-interview-bruce-schneier-directLink-1-i-3261.mp3",
"title": "Securing the World-Sized Web",
"pubdate": "20160722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roadmap-for-integrating-cybersecurity-directLink-3-i-3256.mp3",
"title": "A Roadmap for Integrating Cybersecurity",
"pubdate": "20160722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gop-cyber-platform-being-aggressive-against-china-russia-touting-hack-back-directLink-5-i-3262.mp3",
"title": "A Look at GOP Cybersecurity Platform",
"pubdate": "20160722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-sony-breach-directLink-3-i-3247.mp3",
"title": "Inside the Sony Breach",
"pubdate": "20160722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ben-johnson-carbon-black-directLink-8-i-3258.mp3",
"title": "Upgrading Security: Setting the Right Priorities",
"pubdate": "20160721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-indicators-exposure-reveal-directLink-4-i-3237.mp3",
"title": "What \"Indicators of Exposure\" Reveal",
"pubdate": "20160721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-gaps-in-health-data-protection-identified-directLink-2-i-3259.mp3",
"title": "Big Gaps in Health Data Protection Identified",
"pubdate": "20160721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-cyber-expert-on-rethinking-approach-to-security-directLink-6-i-3255.mp3",
"title": "Top Cyber Expert on Rethinking Approach to IT Security",
"pubdate": "20160719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fireeye-on-extortion-to-pay-or-to-pay-directLink-7-i-3254.mp3",
"title": "FireEye on Extortion: To Pay or Not to Pay?",
"pubdate": "20160719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-prime-minister-theresa-mays-record-on-online-surveillance-cybersecurity-directLink-4-i-3252.mp3",
"title": "U.K. Prime Minister Theresa May\"s Record on Cybersecurity",
"pubdate": "20160715"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-voices-concerns-over-federal-government-security-directLink-1-i-3249.mp3",
"title": "Obama Sees Need to Improve Federal Government IT Security",
"pubdate": "20160712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-risks-shadow-it-directLink-3-i-3248.mp3",
"title": "Mitigating \"Shadow IT\" Risks",
"pubdate": "20160712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anti-virus-hullabaloo-real-story-behind-hillarys-email-server-use-directLink-10-i-3246.mp3",
"title": "Anti-Virus Ruckus; Real Impact Over Hillary\"s Email Server",
"pubdate": "20160708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/debating-hillarys-email-server-missing-element-directLink-7-i-3245.mp3",
"title": "Debating Hillary\"s Email Server: The Missing Element",
"pubdate": "20160707"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-security-risks-older-medical-devices-directLink-8-i-3244.mp3",
"title": "Addressing Security Risks of Older Medical Devices",
"pubdate": "20160707"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-framework-fosters-collaboration-to-build-secure-systems-directLink-7-i-3229.mp3",
"title": "How NIST Framework Fosters Collaboration",
"pubdate": "20160706"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartbleed-update-america-vulnerable-directLink-6-i-3242.mp3",
"title": "Heartbleed Update: America the Vulnerable",
"pubdate": "20160706"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ukraine-sees-bank-heist-organizations-crave-deception-directLink-8-i-3239.mp3",
"title": "Ukraine Sees Bank Heist, Organizations Crave Deception",
"pubdate": "20160705"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/orfei-directLink-1-i-3238.mp3",
"title": "PCI-DSS Compliance: Are CEOs Buying In?",
"pubdate": "20160705"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dark-overlord-deals-data-congress-tackles-crypto-directLink-9-i-3236.mp3",
"title": "\"Dark Overlord\" Deals Data, and Congress Tackles Crypto",
"pubdate": "20160701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fiserv-directLink-5-i-3233.mp3",
"title": "Improving Fraud Prevention After SWIFT-Related Heists",
"pubdate": "20160630"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roundup-brexit-shock-cybercrime-forum-sells-access-directLink-1-i-3231.mp3",
"title": "Brexit Shocker, and Cybercrime Forum Sells Server Access",
"pubdate": "20160628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-building-global-acceptance-directLink-1-i-3230.mp3",
"title": "PCI-DSS: Building Global Acceptance",
"pubdate": "20160628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roundup-fraud-crackdown-govt-sensitive-info-at-risk-directLink-3-i-3228.mp3",
"title": "Roundup: Fraud Crackdown; Gov\"t Sensitive Info at Risk",
"pubdate": "20160624"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/no-brainer-ransomware-defenses-directLink-8-i-3227.mp3",
"title": "No-Brainer Ransomware Defenses",
"pubdate": "20160623"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reimagining-api-creation-directLink-6-i-3140.mp3",
"title": "Reimagining API Creation",
"pubdate": "20160621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/problems-galore-java-script-fueled-ransomware-digital-currency-virtual-reality-privacy-directLink-3-i-3224.mp3",
"title": "Update: Ransomware, Digital Currency, Virtual Reality",
"pubdate": "20160621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/casb-challenge-apis-or-proxies-directLink-9-i-3225.mp3",
"title": "The CASB Challenge: APIs or Proxies?",
"pubdate": "20160621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/planning-for-aftermath-major-data-breach-directLink-7-i-3218.mp3",
"title": "Breach Aftermath Planning: Focus on Saving Your Business",
"pubdate": "20160621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-pci-dss-evolve-in-next-10-years-directLink-8-i-3223.mp3",
"title": "How Will PCI-DSS Evolve in Next 10 Years?",
"pubdate": "20160620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/watergate-dnc-breach-impact-two-types-break-ins-directLink-7-i-3222.mp3",
"title": "Watergate and DNC Breach: Impact of 2 Types of Break-Ins",
"pubdate": "20160617"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aba-retailers-should-meet-higher-cybersecurity-standards-directLink-10-i-3217.mp3",
"title": "ABA: Retailers Should Meet Higher Cybersecurity Standards",
"pubdate": "20160616"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/space-rogue-dj-vu-security-fail-directLink-8-i-3216.mp3",
"title": "\"Space Rogue\" on Déjà Vu Security Failures",
"pubdate": "20160616"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ibm-brings-watson-supercomputer-to-cybersecurity-fight-directLink-8-i-3213.mp3",
"title": "IBM Brings \"Watson\" Supercomputer to Cybersecurity Fight",
"pubdate": "20160615"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audio-report-deep-dive-into-symantec-blue-coat-merger-mobile-banking-flaws-directLink-10-i-3212.mp3",
"title": "Symantec\"s Latest Buy; Mobile App Woes",
"pubdate": "20160614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anatomy-ddos-attack-directLink-10-i-3214.mp3",
"title": "Anatomy of a DDoS Attack",
"pubdate": "20160614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adam-greene-directLink-2-i-3211.mp3",
"title": "Analysis: FTC\"s Privacy Settlement with EHR Vendor",
"pubdate": "20160614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rila-shell-for-interview-jensen-directLink-10-i-3204.mp3",
"title": "Retailers: Don\"t Require Us to Meet Bank Security Standards",
"pubdate": "20160613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/determining-if-ransomware-attack-reportable-breach-directLink-7-i-3208.mp3",
"title": "Determining If a Ransomware Attack Is a Reportable Breach",
"pubdate": "20160611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audio-report-updates-on-infosec-europe-nist-framework-directLink-1-i-3202.mp3",
"title": "Audio Report: Updates on Infosec Europe, NIST Framework",
"pubdate": "20160610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-dc-security-skills-crisis-directLink-6-i-3203.mp3",
"title": "Tackling the D.C. Security Skills Crisis",
"pubdate": "20160610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/great-now-more-phishing-packs-ransomware-directLink-2-i-3201.mp3",
"title": "Report: Most Phishing Emails Pack Ransomware",
"pubdate": "20160608"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/outdated-protocols-leave-organizations-at-risk-directLink-4-i-3200.mp3",
"title": "Simple Security: How Organizations Fumble the Basics",
"pubdate": "20160608"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-mulls-updating-cybersecurity-framework-directLink-8-i-3199.mp3",
"title": "NIST Plans Cybersecurity Framework Update",
"pubdate": "20160608"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/backstory-behind-swift-related-theft-directLink-8-i-3198.mp3",
"title": "The Backstory Behind the SWIFT-Related Thefts",
"pubdate": "20160607"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-report-special-edition-obamas-cybersecurity-legacy-directLink-7-i-3196.mp3",
"title": "Analyzing the Cybersecurity Framework\"s Value",
"pubdate": "20160603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/recruiting-cisos-skills-now-in-demand-directLink-2-i-3194.mp3",
"title": "Recruiting CISOs: The Skills Now in Demand",
"pubdate": "20160602"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-secure-systems-trustable-directLink-5-i-3193.mp3",
"title": "Making Information Systems \"Trustable\"",
"pubdate": "20160601"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-security-report-examining-national-data-breach-notification-directLink-2-i-3192.mp3",
"title": "ISMG Security Report: Examining Global Breach Notification",
"pubdate": "20160531"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-eu-countdown-begins-directLink-2-i-3185.mp3",
"title": "Mandatory Breach Notifications: Europe\"s Countdown Begins",
"pubdate": "20160527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-security-report-to-whom-should-ciso-report-directLink-4-i-3187.mp3",
"title": "ISMG Security Report: To Whom Should CISO Report?",
"pubdate": "20160527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-educated-response-directLink-6-i-3190.mp3",
"title": "Ransomware - an Educated Response",
"pubdate": "20160527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-could-congress-help-bolster-healthcare-cybersecurity-directLink-8-i-3188.mp3",
"title": "How Could Congress Help Bolster Healthcare Cybersecurity?",
"pubdate": "20160527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-management-as-business-enabler-directLink-10-i-3186.mp3",
"title": "Identity Management as a Business Enabler",
"pubdate": "20160526"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-security-report-unusual-twist-in-ransomware-directLink-6-i-3183.mp3",
"title": "ISMG Security Report: Unusual Twist in Ransomware",
"pubdate": "20160525"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-protection-value-masking-directLink-5-i-3184.mp3",
"title": "Data Protection: The Value of Masking",
"pubdate": "20160524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-walmarts-emv-lawsuit-against-visa-directLink-7-i-3182.mp3",
"title": "Analysis: Walmart\"s EMV Lawsuit Against Visa",
"pubdate": "20160524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-protect-wearable-device-data-directLink-4-i-3181.mp3",
"title": "How to Protect Wearable Device Data",
"pubdate": "20160523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-government-monitor-mobile-security-directLink-7-i-3180.mp3",
"title": "Why Should Government Monitor Mobile Security?",
"pubdate": "20160520"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ocrs-deven-mcgraw-on-hipaa-audit-preparation-directLink-3-i-3178.mp3",
"title": "OCR\"s Deven McGraw on HIPAA Audit Preparation",
"pubdate": "20160519"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/swift-hacks-how-banks-must-react-directLink-1-i-3177.mp3",
"title": "Blocking Hack Attacks: SWIFT Must Do More",
"pubdate": "20160518"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-re-evaluating-our-defenses-directLink-7-i-3175.mp3",
"title": "Ransomware: Re-Evaluating Our Defenses",
"pubdate": "20160513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-breach-what-if-your-defenses-fail-directLink-9-i-3172.mp3",
"title": "Cyber Breach - What If Your Defenses Fail?",
"pubdate": "20160512"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steve-durbin-directLink-4-i-3171.mp3",
"title": "Information Security Forum\"s Durbin on Emerging Threats",
"pubdate": "20160510"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-vulnerability-management-directLink-3-i-3169.mp3",
"title": "Beyond Vulnerability Management",
"pubdate": "20160509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internet-things-would-new-regulations-help-or-hurt-directLink-4-i-3167.mp3",
"title": "Internet of Things: Would New Regulations Help or Hurt?",
"pubdate": "20160507"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-bake-security-into-from-get-go-directLink-1-i-3166.mp3",
"title": "How to Bake Security Into IT From the Start",
"pubdate": "20160506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adopting-proactive-security-stance-directLink-4-i-3165.mp3",
"title": "Why Banks Need To Be More Proactive With Security",
"pubdate": "20160505"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-quantum-computing-threats-to-cryptography-directLink-9-i-3163.mp3",
"title": "Tackling Quantum Computing Threats to Cryptography",
"pubdate": "20160503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-phishing-attacks-surge-directLink-5-i-3161.mp3",
"title": "Verizon\"s Latest Breach Report: Same Attacks, More Damage",
"pubdate": "20160429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-update-5-new-requirements-for-service-providers-directLink-3-i-3160.mp3",
"title": "PCI-DSS Update: 5 New Requirements for Service Providers",
"pubdate": "20160428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/important-lesson-from-trade-secrets-case-directLink-8-i-3159.mp3",
"title": "Important Lesson From Trade Secrets Case",
"pubdate": "20160428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-career-advice-for-women-directLink-3-i-3158.mp3",
"title": "InfoSec Career Advice for Women",
"pubdate": "20160428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/test-driving-new-approach-to-online-credentials-directLink-10-i-3157.mp3",
"title": "Test-Driving a New Approach to Online Credentials",
"pubdate": "20160427"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pen-testing-internet-things-directLink-8-i-3155.mp3",
"title": "Internet of Things: Security Insights for Developers",
"pubdate": "20160421"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-state-threat-intelligence-directLink-7-i-3153.mp3",
"title": "The Global State of Threat Intelligence",
"pubdate": "20160419"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-anthem-breach-case-ruling-directLink-5-i-3150.mp3",
"title": "Analysis: Impact of Anthem Breach Case Ruling",
"pubdate": "20160416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/living-malware-how-to-become-intrusion-tolerant-directLink-6-i-3148.mp3",
"title": "Living With Malware: How to Become \"Intrusion-Tolerant\"",
"pubdate": "20160412"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurer-offers-ransomware-defense-insights-directLink-4-i-3146.mp3",
"title": "Cyber Insurer Offers Ransomware Defense Insights",
"pubdate": "20160408"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-distributed-workforce-directLink-8-i-3145.mp3",
"title": "Securing the Distributed Workforce",
"pubdate": "20160405"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-cloud-based-iam-directLink-8-i-3138.mp3",
"title": "The Case for Cloud-Based IAM",
"pubdate": "20160405"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-framework-for-security-privacy-compromise-directLink-3-i-3143.mp3",
"title": "Creating a Framework for a Security-Privacy Dialogue",
"pubdate": "20160404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ransomware-healthcare-fights-back-directLink-6-i-3144.mp3",
"title": "Ransomware: Healthcare Fights Back",
"pubdate": "20160401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-cybersecurity-task-force-will-make-difference-directLink-1-i-3142.mp3",
"title": "New Cybersecurity Task Force: Will It Make a Difference?",
"pubdate": "20160331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-its-necessarily-what-you-think-is-directLink-2-i-3141.mp3",
"title": "DDoS: It\"s Not Necessarily What You Think It Is",
"pubdate": "20160330"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leveraging-security-to-meet-compliance-directLink-6-i-3124.mp3",
"title": "Leveraging Security to Meet Compliance",
"pubdate": "20160330"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-threat-seen-intensifying-in-next-two-years-directLink-10-i-3139.mp3",
"title": "Report: IT Security Threat to Intensify in Next Two Years",
"pubdate": "20160329"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-prepare-for-phase-two-hipaa-compliance-audits-directLink-4-i-3137.mp3",
"title": "How to Prepare for \"Phase Two\" HIPAA Compliance Audits",
"pubdate": "20160328"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-issues-persist-as-fbi-backs-off-for-now-in-iphone-case-directLink-4-i-3135.mp3",
"title": "Legal Issues Persist as FBI Backs Off in iPhone Case",
"pubdate": "20160324"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciociso-finding-critical-balance-directLink-3-i-3131.mp3",
"title": "CIO/CISO - Finding the Critical Balance",
"pubdate": "20160323"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cambridge-savings-bank-directLink-6-i-3129.mp3",
"title": "Case Study: A Community Bank Deploys Biometrics",
"pubdate": "20160323"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-federal-ciso-faces-tough-challenges-directLink-1-i-3128.mp3",
"title": "Federal CISO Will Face Tough Challenges",
"pubdate": "20160322"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visualizing-entire-attack-surface-directLink-5-i-3126.mp3",
"title": "Visualizing the Entire Attack Surface",
"pubdate": "20160319"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/terrorist-financing-growing-worry-for-us-banks-directLink-9-i-3125.mp3",
"title": "Terrorist Financing a Growing Worry for U.S. Banks",
"pubdate": "20160317"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experts-buyers-market-for-cyber-insurance-directLink-9-i-3123.mp3",
"title": "Cyber Insurance: A Buyers\" Market?",
"pubdate": "20160312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-playing-larger-role-directLink-6-i-3121.mp3",
"title": "CISOs Playing a Larger Role",
"pubdate": "20160311"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automated-info-sharing-improves-threat-response-time-directLink-10-i-3122.mp3",
"title": "Study: Automated Info Sharing Improves Threat Response Time",
"pubdate": "20160310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/could-blockchain-play-broader-role-in-payments-directLink-4-i-3119.mp3",
"title": "Could Blockchain Play Broader Role in Payments?",
"pubdate": "20160310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-pii-ip-theft-true-cost-breach-directLink-3-i-3118.mp3",
"title": "Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches",
"pubdate": "20160310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/traditional-defenses-will-never-work-again-directLink-8-i-3116.mp3",
"title": "Why Traditional Defenses Will Never Work Again",
"pubdate": "20160308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-threats-shift-to-response-directLink-1-i-3117.mp3",
"title": "Advanced Threats: The Shift to Response",
"pubdate": "20160308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dellsecure-works-directLink-2-i-3107.mp3",
"title": "More Hackers Relying on Compromised Credentials",
"pubdate": "20160308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bringing-cias-information-sharing-values-to-congress-directLink-5-i-3109.mp3",
"title": "Bringing CIA Cybersecurity Experience to Congress",
"pubdate": "20160308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-revising-infusion-pump-cybersecurity-guidance-directLink-2-i-3094.mp3",
"title": "Why NIST Is Revising Infusion Pump Cybersecurity Guidance",
"pubdate": "20160307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-ashish-thapar-directLink-1-i-3113.mp3",
"title": "Up Close: Verizon Data Breach Digest",
"pubdate": "20160305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chris-pierson-directLink-10-i-3115.mp3",
"title": "Apple Case Creates Important Policy Debate",
"pubdate": "20160305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/va-gov-mcauliffe-on-cybersecurity-directLink-4-i-3114.mp3",
"title": "VA Gov. McAuliffe on Cybersecurity",
"pubdate": "20160305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spotting-breaches-by-studying-users-directLink-2-i-3112.mp3",
"title": "Spotting Breaches by Studying Users",
"pubdate": "20160304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-good-versus-bad-directLink-5-i-3111.mp3",
"title": "Emerging ID Management Issues for 2016",
"pubdate": "20160304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-good-versus-bad-directLink-5-i-3110.mp3",
"title": "Cloud Computing: The Security Concerns",
"pubdate": "20160304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/testing-secure-texting-for-healthcare-directLink-10-i-3099.mp3",
"title": "Testing Secure Texting for Healthcare",
"pubdate": "20160303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-2016-be-record-year-hipaa-penalties-directLink-1-i-3095.mp3",
"title": "Will 2016 Be a Record Year for HIPAA Penalties?",
"pubdate": "20160303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pledge-to-facilitate-secure-health-data-exchange-directLink-1-i-3100.mp3",
"title": "A \"Pledge\" to Facilitate Secure Health Data Exchange",
"pubdate": "20160303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/george-tubin-directLink-2-i-3106.mp3",
"title": "\"Industrialization\" of Cybercrime: Sizing Up the Impact",
"pubdate": "20160302"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deven-mcgraw-directLink-4-i-3097.mp3",
"title": "HIPAA Audits: A Progress Report",
"pubdate": "20160302"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malcolm-harkins-directLink-1-i-3105.mp3",
"title": "Are We Approaching Security Wrong?",
"pubdate": "20160302"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-signatures-employing-malware-provenance-to-identify-malicious-software-directLink-5-i-3101.mp3",
"title": "DHS Eyes Malware Provenance to Identify Malicious Code",
"pubdate": "20160229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adapting-cyber-challenge-competitions-as-recruitment-tool-directLink-1-i-3092.mp3",
"title": "Adapting Cybersecurity Contests as a Recruitment Tool",
"pubdate": "20160225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-its-now-enabler-directLink-10-i-3083.mp3",
"title": "Cloud Security: It\"s Now an Enabler",
"pubdate": "20160225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-to-require-multifactor-authentication-for-administrators-directLink-4-i-3091.mp3",
"title": "PCI DSS Update: What to Expect",
"pubdate": "20160224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-cybersecurity-rating-systems-for-cars-directLink-3-i-3088.mp3",
"title": "Creating Cybersecurity Rating Systems for Cars",
"pubdate": "20160222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audio-report-time-right-to-debate-apple-fbi-crypto-battle-directLink-6-i-3087.mp3",
"title": "The Crypto Debate: Apple vs. the FBI",
"pubdate": "20160219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/strategies-for-advanced-endpoint-protection-directLink-7-i-3089.mp3",
"title": "Strategies for Advanced Endpoint Protection",
"pubdate": "20160219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jeff-shaffer-interview-directLink-5-i-3085.mp3",
"title": "Inside the Cybercrime Investigator\"s Notebook",
"pubdate": "20160218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-security-empower-your-people-directLink-2-i-3059.mp3",
"title": "Network Security - Empower Your People",
"pubdate": "20160212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pierson-interview-directLink-1-i-3079.mp3",
"title": "Why CISOs Need a \"Separate Voice\" from CIOs",
"pubdate": "20160211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-takes-center-stage-at-rsa-conference-directLink-5-i-3077.mp3",
"title": "Privacy Takes Center Stage at RSA Conference",
"pubdate": "20160211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-turns-25-directLink-10-i-3074.mp3",
"title": "RSA Conference Turns 25",
"pubdate": "20160211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-david-shearer-isc2-directLink-5-i-3078.mp3",
"title": "Security Profession Must Get Younger",
"pubdate": "20160209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-courts-business-to-share-cyberthreat-data-directLink-9-i-3076.mp3",
"title": "DHS Tries to Entice Businesses to Share Cyberthreat Data",
"pubdate": "20160206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ed-cabrera-trend-micro-directLink-1-i-3013.mp3",
"title": "Be Secure and Comply in a Hybrid Cloud Environment",
"pubdate": "20160204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-yahoo-hacks-itself-directLink-1-i-3073.mp3",
"title": "How Yahoo Hacks Itself",
"pubdate": "20160204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-cybersecurity-risks-measuring-impact-directLink-10-i-3072.mp3",
"title": "Medical Device Cybersecurity Risks: Measuring the Impact",
"pubdate": "20160202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-french-caldwell-metric-stream-directLink-6-i-3069.mp3",
"title": "How Will GRC Take on Mobility, IoT?",
"pubdate": "20160202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/absolute-data-device-security-directLink-10-i-3070.mp3",
"title": "Absolute Data & Device Security",
"pubdate": "20160130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishme-directLink-9-i-3065.mp3",
"title": "Phishing: How to Counter Targeted Attacks",
"pubdate": "20160126"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-role-in-fighting-extortion-directLink-10-i-3060.mp3",
"title": "The CISO\"s Role in Fighting Extortion",
"pubdate": "20160121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rivals-avoid-taking-stand-on-backdoor-directLink-5-i-3056.mp3",
"title": "Rivals Avoid Taking Stand on Backdoor",
"pubdate": "20160119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-downside-to-proposed-hipaa-changes-directLink-6-i-3057.mp3",
"title": "Privacy Downside to Proposed HIPAA Changes",
"pubdate": "20160119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-identifying-malicious-insiders-directLink-7-i-3055.mp3",
"title": "Special Report: Identifying Malicious Insiders",
"pubdate": "20160118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-health-data-privacy-legislative-outlook-directLink-3-i-3050.mp3",
"title": "2016 Health Data Privacy Regulatory Outlook",
"pubdate": "20160113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/where-will-we-find-next-generation-security-leaders-directLink-9-i-3047.mp3",
"title": "Where Will We Find Next Generation of Security Leaders?",
"pubdate": "20160113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-accidental-insider-threat-directLink-4-i-3049.mp3",
"title": "Mitigating the Accidental Insider Threat",
"pubdate": "20160113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/group-seeks-measurable-infosec-solutions-directLink-3-i-3048.mp3",
"title": "New Global Alliance Seeks Measurable InfoSec Solutions",
"pubdate": "20160112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/traditional-security-tools-cant-cut-directLink-5-i-3046.mp3",
"title": "Why Traditional Security Tools Can\"t Cut it",
"pubdate": "20160108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-unusual-ruling-in-massachusetts-breach-case-directLink-10-i-3045.mp3",
"title": "Analysis: Unusual Ruling in Massachusetts Breach Case",
"pubdate": "20160108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-breach-prevention-time-to-purge-data-directLink-9-i-3042.mp3",
"title": "2016 Breach Prevention: Time to Purge Data",
"pubdate": "20160105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lance-hayden-directLink-7-i-3032.mp3",
"title": "Cybersecurity as a Competitive Advantage",
"pubdate": "20160104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-year-cyberthreat-info-sharing-directLink-9-i-3040.mp3",
"title": "2016: Year of Cyberthreat Info Sharing",
"pubdate": "20160104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opm-breach-game-changer-in-2015-directLink-9-i-3037.mp3",
"title": "OPM Breach: A Game Changer in 2015",
"pubdate": "20151231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2-worst-breaches-2015-directLink-4-i-3035.mp3",
"title": "The 2 Worst Breaches of 2015",
"pubdate": "20151231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breach-defense-please-stay-focused-directLink-6-i-3034.mp3",
"title": "Solve Old Security Problems First",
"pubdate": "20151230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-next-for-cybersecurity-framework-directLink-5-i-3033.mp3",
"title": "What\"s Next for Cybersecurity Framework?",
"pubdate": "20151230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-mobile-threats-in-healthcare-directLink-10-i-3026.mp3",
"title": "Mitigating Mobile Risks in Healthcare",
"pubdate": "20151228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/practical-application-user-behavior-analytics-directLink-1-i-3031.mp3",
"title": "The Practical Application of User Behavior Analytics",
"pubdate": "20151224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-user-behavior-analytics-directLink-7-i-3028.mp3",
"title": "The Evolution of User Behavior Analytics",
"pubdate": "20151224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bits-president-cyber-guidance-confuses-cisos-directLink-1-i-3029.mp3",
"title": "BITS President: Cyber Guidance Confuses CISOs",
"pubdate": "20151224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-infosec-educator-shortage-directLink-10-i-3025.mp3",
"title": "Addressing the InfoSec Educator Shortage",
"pubdate": "20151224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2016-year-cloud-exploit-directLink-7-i-3023.mp3",
"title": "2016: The Year Hackers Exploit the Cloud?",
"pubdate": "20151224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-impact-info-sharing-law-on-healthcare-directLink-10-i-3027.mp3",
"title": "Analysis: Cybersecurity Law\"s Impact on Healthcare",
"pubdate": "20151223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exploring-ethics-behind-dnc-breach-directLink-1-i-3022.mp3",
"title": "Exploring the Ethics Behind DNC Breach",
"pubdate": "20151222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-hipaa-security-rule-need-updating-directLink-7-i-3021.mp3",
"title": "Why the HIPAA Security Rule Needs Updating",
"pubdate": "20151222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-interview-directLink-10-i-3019.mp3",
"title": "PCI Council Extends Encryption Deadline",
"pubdate": "20151221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-malware-taught-us-for-2016-directLink-10-i-3018.mp3",
"title": "What Malware Taught us for 2016",
"pubdate": "20151219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wearable-devices-will-they-face-regulatory-scrutiny-directLink-9-i-3017.mp3",
"title": "Wearable Devices: Will They Face Regulatory Scrutiny?",
"pubdate": "20151219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/check-fraud-remains-so-hot-what-to-do-about-it-directLink-7-i-3009.mp3",
"title": "Why Check Fraud Remains So Hot - and What to Do About It",
"pubdate": "20151215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/leading-cybersecurity-out-medieval-times-directLink-9-i-3011.mp3",
"title": "Leading Cybersecurity Out of Medieval Times",
"pubdate": "20151210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/i-bet-my-career-on-directLink-7-i-3001.mp3",
"title": "\"I Bet My Career on It ...\"",
"pubdate": "20151210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/walter-mix-directLink-2-i-3010.mp3",
"title": "Why Regulatory Scrutiny of Banks Will Intensify in 2016",
"pubdate": "20151209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/look-for-more-fda-medical-device-security-alerts-in-2016-directLink-6-i-3008.mp3",
"title": "Look for More FDA Medical Device Security Alerts in 2016",
"pubdate": "20151209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-calling-for-encryption-bypass-directLink-9-i-3007.mp3",
"title": "Is Obama Calling for Encryption Bypass?",
"pubdate": "20151208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bas-hipaa-enforcement-priority-directLink-9-i-3004.mp3",
"title": "Business Associates: A HIPAA Enforcement Priority?",
"pubdate": "20151208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberattack-drill-eye-opening-lessons-directLink-2-i-3005.mp3",
"title": "Cyberattack Drill: Eye-Opening Lessons",
"pubdate": "20151205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/detecting-anomalous-behavior-new-strategy-directLink-2-i-2986.mp3",
"title": "Detecting Anomalous Behavior: A New Strategy",
"pubdate": "20151205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-on-how-security-shaping-for-2016-directLink-9-i-2998.mp3",
"title": "Former RSA Chair Coviello on 2016 Security Outlook",
"pubdate": "20151203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/joy-reverse-engineering-malware-directLink-6-i-3003.mp3",
"title": "Building a Career on Taking Apart Malware",
"pubdate": "20151203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishlabs-directLink-3-i-3000.mp3",
"title": "Business Email Compromise Attacks Rapidly Evolving",
"pubdate": "20151201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/report-insiders-still-top-breach-threat-directLink-6-i-2995.mp3",
"title": "Report: Insiders Still Top Breach Threat",
"pubdate": "20151130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/careers-dale-meyerrose-directLink-7-i-2997.mp3",
"title": "Sending CISOs to Cyberthreat Bootcamp",
"pubdate": "20151125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-compliance-in-cloud-directLink-4-i-2996.mp3",
"title": "PCI Compliance in the Cloud",
"pubdate": "20151125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lexis-nexis-shelton-directLink-9-i-2992.mp3",
"title": "What is \"Sleeper Fraud,\" And Why Must Banks Beware?",
"pubdate": "20151124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-privacy-patients-genomic-data-directLink-7-i-2993.mp3",
"title": "Protecting the Privacy of Patients\" Genomic Data",
"pubdate": "20151124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/labmd-ceo-speaks-about-ftc-legal-battle-directLink-1-i-2990.mp3",
"title": "LabMD CEO Speaks About FTC Legal Battle",
"pubdate": "20151123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rethinking-way-to-recruit-infosec-pros-directLink-4-i-2987.mp3",
"title": "Rethinking How to Recruit InfoSec Pros",
"pubdate": "20151120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-ftc-ruling-impact-future-data-security-cases-directLink-10-i-2988.mp3",
"title": "Will FTC Ruling Impact Future Data Security Cases?",
"pubdate": "20151118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-paris-attacks-dont-rush-to-kill-crypto-directLink-4-i-2985.mp3",
"title": "After Paris Attacks, Beware Rush to Weaken Crypto",
"pubdate": "20151118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/paris-attacks-reignite-encryption-debate-directLink-3-i-2984.mp3",
"title": "Paris Attacks Reignite Encryption Debate",
"pubdate": "20151117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-chase-breach-directLink-10-i-2982.mp3",
"title": "What the JPMorgan Chase Breach Teaches Us",
"pubdate": "20151116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-hipaa-audits-result-in-settlements-directLink-9-i-2983.mp3",
"title": "Will HIPAA Audits Result in Settlements?",
"pubdate": "20151116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pascual-directLink-5-i-2980.mp3",
"title": "Why Banks Need to Prepare for More Chase-Like Breaches",
"pubdate": "20151112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phi-breaches-just-healthcare-sectors-problem-directLink-10-i-2979.mp3",
"title": "PHI Breaches: Not Just Healthcare Sector\"s Problem",
"pubdate": "20151111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisas-healthcare-sector-provisions-directLink-3-i-2975.mp3",
"title": "Analyzing CISA\"s Healthcare Sector Provisions",
"pubdate": "20151106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-succeed-at-information-security-directLink-3-i-2974.mp3",
"title": "How to Succeed at Information Security",
"pubdate": "20151104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/x-directLink-10-i-2973.mp3",
"title": "Why Tinba Trojan Is Now a Global Concern",
"pubdate": "20151104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/oncs-top-privacy-priorities-for-2016-directLink-7-i-2971.mp3",
"title": "ONC\"s Top Privacy Priorities for 2016",
"pubdate": "20151103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviellos-new-cybersecurity-agenda-directLink-6-i-2968.mp3",
"title": "Art Coviello\"s New Cybersecurity Agenda",
"pubdate": "20151031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/durbin-from-london-directLink-10-i-2969.mp3",
"title": "Cybersecurity: The CEO\"s Responsibilities",
"pubdate": "20151030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-hipaa-myths-block-data-exchange-directLink-8-i-2967.mp3",
"title": "How HIPAA Myths Block Data Exchange",
"pubdate": "20151029"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mergers-create-challenges-for-cisos-directLink-5-i-2960.mp3",
"title": "Mergers Create Challenges for CISOs",
"pubdate": "20151028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-guide-to-spear-phishing-defense-directLink-5-i-2966.mp3",
"title": "CISO\"s Guide to Spear Phishing Defense",
"pubdate": "20151026"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pcis-king-directLink-5-i-2965.mp3",
"title": "TalkTalk Attack Highlights Worldwide Breach Concerns",
"pubdate": "20151026"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/genomic-data-exchange-challenges-directLink-6-i-2964.mp3",
"title": "Genomic Data Exchange: The Security Challenges",
"pubdate": "20151024"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-ehr-vendors-hope-to-measure-interoperability-directLink-4-i-2963.mp3",
"title": "How EHR Vendors Hope to Measure Interoperability",
"pubdate": "20151023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-health-data-exchange-hurdles-to-overcome-directLink-3-i-2962.mp3",
"title": "Secure Health Data Exchange: Hurdles to Overcome",
"pubdate": "20151021"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solving-secure-email-platform-challenge-directLink-6-i-2959.mp3",
"title": "Solving Secure Email Platform Challenge",
"pubdate": "20151019"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intel-sharing-project-ciso-leads-way-directLink-3-i-2958.mp3",
"title": "Threat Intel Sharing Project: A CISO Leads the Way",
"pubdate": "20151017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isaca-careers-directLink-7-i-2953.mp3",
"title": "Attracting More Women to InfoSec Careers",
"pubdate": "20151015"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/liz-garner-directLink-3-i-2951.mp3",
"title": "Payment Security: What Factors Are Essential?",
"pubdate": "20151014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chimes-charles-christian-on-2016-cyber-threat-outlook-directLink-7-i-2950.mp3",
"title": "CHIME\"s Charles Christian on 2016 Cyber Threat Outlook",
"pubdate": "20151014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-unifying-authentication-directLink-9-i-2947.mp3",
"title": "Simplifying and Unifying Authentication",
"pubdate": "20151009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nacs-emv-directLink-10-i-2946.mp3",
"title": "Is EMV Bad News to Small Businesses?",
"pubdate": "20151009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shift-to-file-centric-security-directLink-10-i-2930.mp3",
"title": "The Shift to File-Centric Security",
"pubdate": "20151009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-job-opportunities-directLink-7-i-2944.mp3",
"title": "Cloud Security: Job Opportunities",
"pubdate": "20151009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/change-heart-ex-nsa-chief-argues-against-circumvent-encryption-directLink-5-i-2943.mp3",
"title": "Why Ex-NSA Chief Now Argues Against Encryption Backdoor",
"pubdate": "20151008"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/should-medicare-move-to-chip-id-cards-directLink-7-i-2941.mp3",
"title": "Should Medicare Move to Chip ID Cards?",
"pubdate": "20151007"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-bitsights-benchmark-report-directLink-7-i-2940.mp3",
"title": "Inside BitSight\"s Benchmark Report",
"pubdate": "20151006"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-centric-security-directLink-3-i-2939.mp3",
"title": "Identity-Centric Security",
"pubdate": "20151006"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experian-breach-lessons-learned-directLink-8-i-2936.mp3",
"title": "Experian Breach: Lessons Learned",
"pubdate": "20151006"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/precision-medicine-initiative-big-data-security-privacy-concerns-directLink-2-i-2935.mp3",
"title": "Precision Medicine: \"Big Data\" Security, Privacy Concerns",
"pubdate": "20151002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/driehuis-directLink-9-i-2933.mp3",
"title": "Banking Trojans Retooled for Data Mining",
"pubdate": "20151001"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-raimund-genes-directLink-2-i-2932.mp3",
"title": "Targeted Attacks Becoming the Norm",
"pubdate": "20151001"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-pros-must-understand-privacy-issues-directLink-2-i-2931.mp3",
"title": "Why InfoSec Professionals Must Understand Privacy Issues",
"pubdate": "20150930"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-security-intelligence-centers-directLink-3-i-2816.mp3",
"title": "Rise of Security Intelligence Centers",
"pubdate": "20150929"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-be-security-auditor-directLink-8-i-2925.mp3",
"title": "What It Takes to Be an IT Security Auditor",
"pubdate": "20150924"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kevin-mandia-on-state-cybersecurity-directLink-6-i-2923.mp3",
"title": "Kevin Mandia on the State of Cybersecurity",
"pubdate": "20150923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/road-to-true-data-protection-directLink-5-i-2904.mp3",
"title": "The Road to True Data Protection",
"pubdate": "20150923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forensics-how-to-spoil-data-directLink-2-i-2890.mp3",
"title": "Forensics - How Not to Spoil the Data",
"pubdate": "20150923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/aml-vinny-directLink-3-i-2918.mp3",
"title": "How Banks Can Leverage the Bitcoin Infrastructure",
"pubdate": "20150921"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/californias-proactive-approach-to-cyberthreats-directLink-10-i-2917.mp3",
"title": "California\"s Proactive Approach to Cyberthreats",
"pubdate": "20150919"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-risk-inaction-directLink-7-i-2824.mp3",
"title": "Insider Threat: The Risk of Inaction",
"pubdate": "20150918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gray-taylor-directLink-2-i-2913.mp3",
"title": "Will Mobile Payments Overshadow EMV Card Migration?",
"pubdate": "20150918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-cyber-challenge-seeks-to-boost-number-infosecurity-pros-directLink-3-i-2915.mp3",
"title": "U.S. Cyber Challenge Seeks to Boost Number of Security Pros",
"pubdate": "20150917"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-threatens-sanctions-against-china-if-hacks-continue-directLink-7-i-2914.mp3",
"title": "Obama Threatens Sanctions Against China If Hacks Continue",
"pubdate": "20150917"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-align-security-to-business-performance-directLink-9-i-2907.mp3",
"title": "How to Align Security to Business Performance",
"pubdate": "20150917"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybercrime-now-exceeds-traditional-crime-directLink-6-i-2901.mp3",
"title": "Why Cybercrime Now Exceeds Conventional Crime",
"pubdate": "20150916"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/charles-gunther-directLink-7-i-2906.mp3",
"title": "How the FBI Helped Recover Millions from Wire Fraud",
"pubdate": "20150915"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infusion-pump-security-nist-refining-guidance-directLink-5-i-2898.mp3",
"title": "Infusion Pump Security: NIST Refining Guidance",
"pubdate": "20150911"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/clyde-langley-directLink-9-i-2897.mp3",
"title": "Fighting Fraud: New Insights from a Former FBI Agent",
"pubdate": "20150910"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mit-unveils-new-cybersecurity-course-directLink-1-i-2893.mp3",
"title": "MIT Offers Online Cybersecurity Training",
"pubdate": "20150910"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-buy-in-to-fight-apt-directLink-5-i-2848.mp3",
"title": "Securing Buy-in to Fight APT",
"pubdate": "20150909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/commercializing-federal-security-wares-directLink-1-i-2894.mp3",
"title": "Commercializing Federal IT Security Wares",
"pubdate": "20150909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exclusive-ocrs-mcgraw-on-hipaa-audits-timing-directLink-1-i-2889.mp3",
"title": "Exclusive: OCR\"s McGraw on Timing of HIPAA Audits",
"pubdate": "20150905"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-interview-on-medical-devices-directLink-3-i-2869.mp3",
"title": "FDA Official: More Medical Device Vulnerability Discoveries Are Likely",
"pubdate": "20150903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-hacks-onc-emphasizing-id-access-management-directLink-3-i-2872.mp3",
"title": "After Hacks, ONC Emphasizing ID and Access Management",
"pubdate": "20150903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phil-burdette-directLink-9-i-2870.mp3",
"title": "How Hackers Are Bypassing Intrusion Detection",
"pubdate": "20150903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-lessons-government-learn-from-industry-directLink-5-i-2868.mp3",
"title": "Incident Response: Lessons Government Can Learn from Industry",
"pubdate": "20150903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/titus-directLink-5-i-2867.mp3",
"title": "InfoSec Careers: How to Attract, Retain More Women",
"pubdate": "20150903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proactive-malware-hunting-directLink-3-i-2866.mp3",
"title": "Proactive Malware Hunting",
"pubdate": "20150902"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-healthcare-payments-fraud-directLink-4-i-2865.mp3",
"title": "Fighting Healthcare Payments Fraud",
"pubdate": "20150902"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keyraider-directLink-10-i-2864.mp3",
"title": "How KeyRaider Malware Hacked 225K Apple Accounts",
"pubdate": "20150901"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacker-havens-rise-bulletproof-hosting-environments-directLink-3-i-2862.mp3",
"title": "Hacker Havens: The Rise of Bulletproof Hosting Environments",
"pubdate": "20150831"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/litan-part-2-directLink-2-i-2860.mp3",
"title": "Gartner\"s Litan Warns of EMV Fraud Risks",
"pubdate": "20150827"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/killing-bugs-focus-on-half-life-directLink-4-i-2859.mp3",
"title": "Killing Bugs: Focus on \"Half-Life\"",
"pubdate": "20150827"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/venture-capitalist-im-still-bullish-directLink-1-i-2857.mp3",
"title": "Venture Capitalist: \"I\"m Still Bullish\"",
"pubdate": "20150825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/economically-weaker-chinas-impact-on-cyberspying-directLink-10-i-2856.mp3",
"title": "Impact of Economically Weaker China on Cyber Spying",
"pubdate": "20150825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/extortion-alert-ashley-madison-emails-directLink-9-i-2854.mp3",
"title": "Mitigating Organizational Risks After the Ashley Madison Leaks",
"pubdate": "20150825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avivah-litan-directLink-1-i-2853.mp3",
"title": "Gartner\"s Litan: Top New Threats to Banks",
"pubdate": "20150824"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patient-data-matching-privacy-challenges-directLink-3-i-2851.mp3",
"title": "Patient Data Matching: Privacy Challenges",
"pubdate": "20150822"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-infosec-deficiencies-plaguing-federal-agencies-directLink-4-i-2849.mp3",
"title": "3 InfoSec Woes Plaguing Federal Agencies",
"pubdate": "20150820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-device-alert-catalyst-for-change-directLink-8-i-2845.mp3",
"title": "FDA Device Alert: A Catalyst for Change",
"pubdate": "20150819"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stop-griping-hacking-for-spying-ok-directLink-7-i-2842.mp3",
"title": "Why It\"s OK to Hack for Spying",
"pubdate": "20150817"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-neglect-made-healthcare-hackers-no1-target-directLink-7-i-2840.mp3",
"title": "How \"Neglect\" Made Healthcare No.1 Target",
"pubdate": "20150814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/windows-10-security-questions-directLink-3-i-2837.mp3",
"title": "Is Windows 10 Secure for the Enterprise?",
"pubdate": "20150814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-will-fbi-examine-hillarys-server-directLink-8-i-2839.mp3",
"title": "How Will FBI Examine Hillary\"s Server?",
"pubdate": "20150814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/levels-mobile-security-directLink-3-i-2836.mp3",
"title": "The Levels of Mobile Security",
"pubdate": "20150814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ozment-to-lead-dhs-integration-center-directLink-4-i-2834.mp3",
"title": "DHS Appoints Key Cybersecurity Leader",
"pubdate": "20150812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-assessing-skills-gap-directLink-4-i-2831.mp3",
"title": "Re-Assessing the Skills Gap",
"pubdate": "20150806"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fox-it-directLink-6-i-2830.mp3",
"title": "Lessons from Gameover Zeus Takedown",
"pubdate": "20150806"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kesner-directLink-4-i-2828.mp3",
"title": "Ex-FBI Official on Why Attribution Matters",
"pubdate": "20150805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/needle-in-haystack-finding-malware-directLink-4-i-2827.mp3",
"title": "Needle in a Haystack: Finding Malware",
"pubdate": "20150805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-new-measure-success-directLink-1-i-2826.mp3",
"title": "Security: The New Measure of Success",
"pubdate": "20150805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sea-to-sea-china-hacks-in-us-directLink-1-i-2825.mp3",
"title": "Sea-to-Sea: China Hacks in U.S.",
"pubdate": "20150802"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-context-king-directLink-6-i-2823.mp3",
"title": "Threat Intelligence - Context is King",
"pubdate": "20150801"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-anthem-hackers-motivations-directLink-4-i-2822.mp3",
"title": "Anthem Attackers Tied to Espionage",
"pubdate": "20150731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/julie-conroy-directLink-1-i-2821.mp3",
"title": "Banks Brace for Fraud Migration",
"pubdate": "20150731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-masayoshi-someya-directLink-6-i-2820.mp3",
"title": "Targeted Attacks: How Ready is Japan?",
"pubdate": "20150731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/planning-your-bot-management-program-directLink-6-i-2819.mp3",
"title": "Planning Your Bot Management Program",
"pubdate": "20150730"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-face-mobile-app-security-directLink-6-i-2818.mp3",
"title": "The New Face of Mobile App Security",
"pubdate": "20150730"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critical-steps-for-protecting-mobile-health-data-directLink-1-i-2815.mp3",
"title": "NIST on Protecting Mobile Health Data",
"pubdate": "20150730"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steering-death-passwords-directLink-4-i-2814.mp3",
"title": "Steering the Death of Passwords",
"pubdate": "20150730"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-lessons-learned-directLink-4-i-2813.mp3",
"title": "Cloud Security: Lessons Learned",
"pubdate": "20150729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internet-needs-new-security-model-directLink-9-i-2812.mp3",
"title": "Internet Needs a New Security Model",
"pubdate": "20150729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-privacy-threats-in-healthcare-directLink-2-i-2811.mp3",
"title": "New Privacy Threats in Healthcare?",
"pubdate": "20150728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/perez-directLink-10-i-2810.mp3",
"title": "Visa on Reducing Merchant Risks",
"pubdate": "20150727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-flash-java-now-kill-rc4-crypto-directLink-7-i-2804.mp3",
"title": "Ditch RC4 Crypto Before It\"s Too Late",
"pubdate": "20150724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-imagining-breach-defense-directLink-5-i-2808.mp3",
"title": "Re-Imagining Breach Defense",
"pubdate": "20150724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-munawar-hossain-directLink-5-i-2807.mp3",
"title": "Data Center Security\"s Changing Face",
"pubdate": "20150724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/staying-ahead-cybercrime-directLink-3-i-2805.mp3",
"title": "Staying Ahead of Cybercrime",
"pubdate": "20150724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacktivists-grown-up-dangerous-directLink-5-i-2803.mp3",
"title": "Hacktivists: Grown Up and Dangerous",
"pubdate": "20150723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-shared-assessments-directLink-10-i-2801.mp3",
"title": "Making the Case for Shared Assessments",
"pubdate": "20150723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-raimund-genes-directLink-6-i-2799.mp3",
"title": "Moving Beyond the Buzzwords",
"pubdate": "20150722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mike-smith-interview-rsa-directLink-8-i-2797.mp3",
"title": "Secure DNS: Beyond Hijacks, Defacement",
"pubdate": "20150722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/misusing-privileges-gray-areas-directLink-9-i-2798.mp3",
"title": "Misusing Privileges: The Gray Areas",
"pubdate": "20150722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/buyers-guide-to-ddos-mitigation-directLink-8-i-2794.mp3",
"title": "Buyer\"s Guide to DDoS Mitigation",
"pubdate": "20150721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-cures-bills-privacy-impact-directLink-4-i-2796.mp3",
"title": "Analyzing \"Cures\" Bill\"s Privacy Impact",
"pubdate": "20150721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-challenges-in-sdn-directLink-10-i-2795.mp3",
"title": "Security Challenges in SDN",
"pubdate": "20150720"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opm-breach-cyber-lessons-learned-directLink-8-i-2792.mp3",
"title": "OPM Breach: Get Your Priorities Straight",
"pubdate": "20150715"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-opm-breach-directLink-1-i-2793.mp3",
"title": "Lessons from the OPM Breach",
"pubdate": "20150714"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fed-reserves-gordon-directLink-5-i-2791.mp3",
"title": "Fed\"s Faster Payments Security Priorities",
"pubdate": "20150714"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-face-opm-breach-directLink-7-i-2790.mp3",
"title": "OPM Breach: One Victim\"s Experience",
"pubdate": "20150713"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-case-for-national-patient-id-directLink-7-i-2789.mp3",
"title": "Making a Case for a National Patient ID",
"pubdate": "20150710"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/toys-in-attic-iot-as-security-risk-directLink-10-i-2783.mp3",
"title": "The \"Internet of Things\" as a Security Risk",
"pubdate": "20150707"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ncua-directLink-6-i-2781.mp3",
"title": "FFIEC Issues Cyber Assessment Tool",
"pubdate": "20150702"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/swarming-talent-on-infosec-challenges-directLink-6-i-2780.mp3",
"title": "\"Swarming\" Talent on InfoSec Challenges",
"pubdate": "20150702"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-encryption-standard-updated-directLink-3-i-2775.mp3",
"title": "PCI Encryption Standard Updated",
"pubdate": "20150701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/classifying-data-seeking-automation-directLink-6-i-2774.mp3",
"title": "Classifying Data: Seeking Automation",
"pubdate": "20150701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/watch-for-visual-hacking-directLink-5-i-2772.mp3",
"title": "Watch for \"Visual Hacking\"",
"pubdate": "20150701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/federal-cio-backs-opm-leaders-directLink-8-i-2770.mp3",
"title": "Federal CIO Backs OPM Leaders",
"pubdate": "20150626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/house-divided-on-opm-directors-tenure-directLink-6-i-2769.mp3",
"title": "House Divided on OPM Director\"s Fate",
"pubdate": "20150625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-cyber-domino-effect-directLink-2-i-2768.mp3",
"title": "Mitigating the Cyber Domino Effect",
"pubdate": "20150624"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/context-aware-security-limiting-access-directLink-7-i-2767.mp3",
"title": "Context-Aware Security: Limiting Access",
"pubdate": "20150624"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/malware-from-infection-to-detection-directLink-4-i-2645.mp3",
"title": "Malware: From Infection to Detection",
"pubdate": "20150620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tapping-analytics-in-cybersec-fraud-directLink-9-i-2765.mp3",
"title": "Tapping Analytics In CyberSec, Fraud",
"pubdate": "20150620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-homegrown-mobile-apps-directLink-9-i-2761.mp3",
"title": "Securing Homegrown Mobile Apps",
"pubdate": "20150618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disrupting-attacks-kill-chains-directLink-5-i-2760.mp3",
"title": "Disrupting Attacks With Kill Chains",
"pubdate": "20150618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-trusted-online-identities-directLink-10-i-2756.mp3",
"title": "The Rise of Trusted Online Identities",
"pubdate": "20150618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enterprise-risk-internet-things-directLink-7-i-2755.mp3",
"title": "Enterprise Risk: Internet of Things",
"pubdate": "20150617"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blocking-intellectual-property-theft-directLink-7-i-2748.mp3",
"title": "How CIOs Must Prioritize Defenses",
"pubdate": "20150615"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/path-to-privileged-access-management-directLink-9-i-2753.mp3",
"title": "Path to Privileged Access Management",
"pubdate": "20150613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tracking-missing-devices-directLink-9-i-2751.mp3",
"title": "Tracking Missing Devices",
"pubdate": "20150613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/navy-red-team-testing-moves-to-business-directLink-7-i-2750.mp3",
"title": "Navy Red-Team Testing Moves to Business",
"pubdate": "20150612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-inception-apt-campaign-directLink-1-i-2749.mp3",
"title": "Inside the Inception APT Campaign",
"pubdate": "20150612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-creating-new-security-platform-directLink-7-i-2747.mp3",
"title": "Cisco to Launch New Security Platform",
"pubdate": "20150612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/duqu-teardown-espionage-malware-directLink-2-i-2742.mp3",
"title": "Duqu Teardown: Espionage Malware",
"pubdate": "20150611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gets-more-proactive-directLink-7-i-2740.mp3",
"title": "Breach Responders Get Proactive",
"pubdate": "20150611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/detection-systems-dont-always-work-directLink-5-i-2741.mp3",
"title": "Why Detection Systems Don\"t Always Work",
"pubdate": "20150611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-how-attacks-have-evolved-directLink-9-i-2737.mp3",
"title": "DDoS Attacks Continue to Evolve",
"pubdate": "20150610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-eu-need-to-regain-trust-over-cyber-directLink-5-i-2738.mp3",
"title": "Cybersecurity: Rebuilding U.S.-EU Trust",
"pubdate": "20150610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/seeking-faster-data-breach-response-directLink-2-i-2736.mp3",
"title": "Seeking Faster Data Breach Response",
"pubdate": "20150609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ponemon-directLink-4-i-2734.mp3",
"title": "Analysis: Ponemon Breach Cost Study",
"pubdate": "20150609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visualizing-security-metrics-directLink-2-i-2731.mp3",
"title": "Visualizing Security Metrics",
"pubdate": "20150609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/weatherford-directLink-10-i-2732.mp3",
"title": "Dissecting the OPM Breach",
"pubdate": "20150606"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/stroud-isaca-directLink-3-i-2728.mp3",
"title": "ISACA: How Law Could Spur Info Sharing",
"pubdate": "20150606"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/machine-learning-threat-protection-directLink-1-i-2730.mp3",
"title": "Machine Learning & Threat Protection",
"pubdate": "20150606"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-banking-security-will-evolve-directLink-6-i-2729.mp3",
"title": "How Banking Security Will Evolve",
"pubdate": "20150605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-borderless-workplace-directLink-9-i-2727.mp3",
"title": "Securing a Borderless Workplace",
"pubdate": "20150605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/busting-beebone-botnet-directLink-2-i-2725.mp3",
"title": "Busting the Beebone Botnet",
"pubdate": "20150605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/xx-directLink-6-i-2726.mp3",
"title": "Inside An Elite APT Attack Group",
"pubdate": "20150604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-cyber-security-directLink-5-i-2722.mp3",
"title": "The Rise of \"Cyber\" Security",
"pubdate": "20150604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evaluating-risk-digital-business-directLink-7-i-2724.mp3",
"title": "Evaluating the Risk of \"Digital Business\"",
"pubdate": "20150604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/behavioral-learning-secures-networks-directLink-8-i-2721.mp3",
"title": "Behavioral Learning Secures Networks",
"pubdate": "20150604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeted-versus-zero-day-attacks-directLink-9-i-2720.mp3",
"title": "Cybercrime: Niche Services Evolve",
"pubdate": "20150603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irs-authentication-method-criticized-directLink-2-i-2714.mp3",
"title": "IRS Authentication Method Criticized",
"pubdate": "20150529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/selling-infosec-to-women-directLink-7-i-2713.mp3",
"title": "Selling InfoSec Careers to Women",
"pubdate": "20150528"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-snowden-world-new-infosec-model-directLink-6-i-2712.mp3",
"title": "A New, Post-Snowden InfoSec Model",
"pubdate": "20150528"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warning-security-alert-overload-directLink-4-i-2710.mp3",
"title": "Warning: Security Alert Overload",
"pubdate": "20150527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/researcher-describes-medical-device-flaws-directLink-5-i-2711.mp3",
"title": "Researcher on Medical Device Flaws",
"pubdate": "20150527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/manhattan-project-for-cybersecurity-rd-directLink-5-i-2708.mp3",
"title": "Manhattan Project for Cybersecurity R&D",
"pubdate": "20150523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/webroot-ceo-on-hiring-cyber-pros-directLink-10-i-2706.mp3",
"title": "Webroot CEO on Hiring CyberSec Pros",
"pubdate": "20150521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-venture-capitalist-directLink-5-i-2700.mp3",
"title": "Art Coviello: Venture Capitalist",
"pubdate": "20150515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/criminals-love-cybercrime-directLink-2-i-2696.mp3",
"title": "Crime: Why So Much Is Cyber-Enabled",
"pubdate": "20150513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marketing-infosec-profession-directLink-9-i-2690.mp3",
"title": "Marketing the InfoSec Profession",
"pubdate": "20150509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rapid-evolution-cyber-diplomacy-directLink-6-i-2687.mp3",
"title": "The Rapid Evolution of Cyber Diplomacy",
"pubdate": "20150506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/doj-fraud-summit-directLink-7-i-2686.mp3",
"title": "U.S. Attorney: Managing Fraud Investigations",
"pubdate": "20150505"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-hacker-attacks-directLink-8-i-2685.mp3",
"title": "Defending Against Hacker Attacks",
"pubdate": "20150505"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sophos-interview-directLink-5-i-2660.mp3",
"title": "EMV: Changing U.S. Payments",
"pubdate": "20150501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-moving-to-endpoint-directLink-8-i-2679.mp3",
"title": "Security: Moving to the Endpoint",
"pubdate": "20150430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bugcrowd-unites-code-builders-breakers-directLink-3-i-2677.mp3",
"title": "Bugcrowd Unites Code Builders, Breakers",
"pubdate": "20150430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-services-keep-evolving-directLink-8-i-2676.mp3",
"title": "Security Services Keep Evolving",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-language-security-to-monitor-apps-directLink-2-i-2678.mp3",
"title": "Application Protection: A New Approach",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-consume-threat-intelligence-directLink-8-i-2675.mp3",
"title": "How to Consume Threat Intelligence",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/commoditization-ddos-directLink-9-i-2673.mp3",
"title": "The Commoditization of DDoS",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-on-your-network-directLink-2-i-2681.mp3",
"title": "What\"s on Your Network?",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-corporate-brand-directLink-9-i-2672.mp3",
"title": "Securing the Corporate Brand",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/botnets-get-opportunistic-directLink-3-i-2680.mp3",
"title": "Botnets Get More Opportunistic",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coordinating-cyberattacker-takedowns-directLink-5-i-2670.mp3",
"title": "Helping Cybercrime Takedowns",
"pubdate": "20150429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-standards-required-directLink-1-i-2669.mp3",
"title": "Threat Intelligence: Standards Required",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/monitoring-behavior-to-flag-intrusions-directLink-3-i-2668.mp3",
"title": "Monitoring Behavior to Flag Intrusions",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-versus-threat-data-directLink-1-i-2663.mp3",
"title": "Threat Intelligence Versus Threat Data",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/strategies-for-secure-messaging-directLink-6-i-2667.mp3",
"title": "Strategies for Secure Messaging",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/link-between-breaches-botnets-directLink-10-i-2666.mp3",
"title": "Prioritizing Gaps in Breach Prevention: The Role of Third Party Risk Ratings",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-access-from-anywhere-directLink-2-i-2661.mp3",
"title": "Securing Access from Anywhere",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-cyberthreat-analysis-directLink-10-i-2658.mp3",
"title": "Automating Cyberthreat Analysis",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-behavior-to-identify-hackers-directLink-9-i-2657.mp3",
"title": "Analyzing Behavior to Identify Hackers",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bracing-for-uptick-in-cnp-fraud-directLink-7-i-2662.mp3",
"title": "Bracing for Uptick in CNP Fraud",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-cloud-security-directLink-6-i-2659.mp3",
"title": "Automating Cloud Security",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-data-protection-directLink-10-i-2656.mp3",
"title": "Simplifying Data Protection",
"pubdate": "20150428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/target-could-owe-banks-directLink-8-i-2652.mp3",
"title": "Why Target Could Owe Banks",
"pubdate": "20150425"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mark-clancy-directLink-2-i-2650.mp3",
"title": "Lessons from Intelligence Info Sharing",
"pubdate": "20150421"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nelson-directLink-4-i-2649.mp3",
"title": "Information Sharing: A Matter of Trust",
"pubdate": "20150420"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-dss-version-31-whats-new-directLink-10-i-2648.mp3",
"title": "PCI DSS Version 3.1 - What\"s New?",
"pubdate": "20150418"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-ensure-security-convenience-directLink-10-i-2639.mp3",
"title": "How to Ensure Security and Convenience",
"pubdate": "20150416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/framework-for-new-id-ecosystem-directLink-4-i-2638.mp3",
"title": "Framework for a New ID Ecosystem",
"pubdate": "20150416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/could-big-hipaa-settlements-be-coming-directLink-10-i-2633.mp3",
"title": "Could Big HIPAA Settlements Be Coming?",
"pubdate": "20150415"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exclusive-inside-verizon-breach-report-directLink-2-i-2632.mp3",
"title": "Exclusive: Inside Verizon Breach Report",
"pubdate": "20150414"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/oncs-privacy-officer-latest-tips-directLink-9-i-2628.mp3",
"title": "ONC\"s Privacy Officer: The Latest Tips",
"pubdate": "20150414"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-publishes-supply-chain-risk-guide-directLink-10-i-2630.mp3",
"title": "NIST Publishes Supply Chain Risk Guide",
"pubdate": "20150414"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-2015-sneak-peak-directLink-2-i-2626.mp3",
"title": "RSA Conference 2015: A Sneak Peek",
"pubdate": "20150408"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2015-state-ddos-directLink-7-i-2625.mp3",
"title": "The 2015 State of DDoS",
"pubdate": "20150408"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-on-rsa-conference-directLink-10-i-2624.mp3",
"title": "Art Coviello on RSA Conference",
"pubdate": "20150408"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/talking-security-to-board-directLink-2-i-2623.mp3",
"title": "Talking Security to the Board",
"pubdate": "20150407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emv-should-us-shift-oct-deadline-directLink-4-i-2622.mp3",
"title": "EMV: Should Liability Shift Be Delayed?",
"pubdate": "20150407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enhancing-authentication-status-report-directLink-1-i-2621.mp3",
"title": "Enhancing Authentication: Status Report",
"pubdate": "20150407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-amit-yoran-2015-security-agenda-directLink-9-i-2585.mp3",
"title": "RSA\"s Amit Yoran: 2015 Security Agenda",
"pubdate": "20150406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-coviello-on-state-security-directLink-7-i-2575.mp3",
"title": "RSA\"s Coviello on the State of Security",
"pubdate": "20150406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bitsight-ceo-on-nation-state-attacks-directLink-1-i-2618.mp3",
"title": "BitSight CEO on Nation-State Attacks",
"pubdate": "20150402"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/david-lott-directLink-4-i-2614.mp3",
"title": "Mobile Fraud: A Focus for Fed Reserve",
"pubdate": "20150327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tougher-challenges-ahead-to-secure-it-directLink-4-i-2613.mp3",
"title": "Tougher Challenges Ahead to Secure IT",
"pubdate": "20150326"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apt-cyber-extortion-whos-at-risk-directLink-10-i-2609.mp3",
"title": "APT & Cyber-Extortion: Who\"s at Risk?",
"pubdate": "20150321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-ethos-shaping-cyber-insurance-directLink-4-i-2608.mp3",
"title": "Cyber-Insurance Coverage Shifting",
"pubdate": "20150321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-directLink-3-i-2607.mp3",
"title": "New Threat: ID Theft in the Workplace",
"pubdate": "20150320"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lifelock-at-10-identity-fraud-evolves-directLink-3-i-2606.mp3",
"title": "LifeLock at 10: Identity Fraud Evolves",
"pubdate": "20150319"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/was-clinton-server-exposed-to-hacks-directLink-1-i-2602.mp3",
"title": "Was Clinton Server Exposed to Hacks?",
"pubdate": "20150312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spikes-ceo-advances-airgapped-browsers-directLink-6-i-2601.mp3",
"title": "Spikes CEO on \"Air-Gapped\" Browsers",
"pubdate": "20150312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-fraud-sees-first-drop-since-2010-directLink-1-i-2598.mp3",
"title": "ID Fraud Drops for First Time Since 2010",
"pubdate": "20150306"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bit9-ceo-on-data-breach-defense-directLink-2-i-2597.mp3",
"title": "Bit9 CEO on Data Breach Defense",
"pubdate": "20150305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/consolidating-as-security-measure-directLink-1-i-2588.mp3",
"title": "Consolidating IT as a Security Measure",
"pubdate": "20150303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-fraud-security-converge-directLink-1-i-2596.mp3",
"title": "When Fraud and Security Converge",
"pubdate": "20150303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lance-james-directLink-4-i-2594.mp3",
"title": "What is Gov\"t Role in Info Sharing?",
"pubdate": "20150227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hide-cyber-skirmishes-iran-directLink-5-i-2592.mp3",
"title": "Why Hide Cyber Skirmishes With Iran?",
"pubdate": "20150225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-obamas-information-sharing-plan-work-directLink-1-i-2587.mp3",
"title": "Will Obama\"s Information Sharing Plan Work?",
"pubdate": "20150220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-approach-to-ddos-protection-directLink-2-i-2570.mp3",
"title": "The New Approach to DDoS Protection",
"pubdate": "20150220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trusting-cloud-provider-to-secure-data-directLink-5-i-2583.mp3",
"title": "Managing Cloud Providers: New Approach",
"pubdate": "20150218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurance-how-much-enough-directLink-2-i-2579.mp3",
"title": "Cyber-Insurance: How Much Is Enough?",
"pubdate": "20150216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ctiic-matters-directLink-5-i-2576.mp3",
"title": "Raduege: Why New Cyber Agency Matters",
"pubdate": "20150212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-learning-from-anthem-breach-directLink-10-i-2577.mp3",
"title": "Phishing: Learning from Recent Breaches",
"pubdate": "20150212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/merkel-directLink-9-i-2574.mp3",
"title": "Why \"Adaptive Defense\" Is Critical",
"pubdate": "20150212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/liz-garner-directLink-3-i-2572.mp3",
"title": "Can PINs Reduce Online Fraud?",
"pubdate": "20150210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-cyberthreat-intelligence-directLink-2-i-2573.mp3",
"title": "Improving Cyberthreat Intelligence",
"pubdate": "20150210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-shifting-to-mobile-devices-directLink-4-i-2569.mp3",
"title": "Why Fraud Is Shifting to Mobile Devices",
"pubdate": "20150205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/monitoring-third-party-breach-risks-directLink-4-i-2567.mp3",
"title": "Monitoring Third-Party Breach Risks",
"pubdate": "20150205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-behavior-to-identify-intruders-directLink-5-i-2563.mp3",
"title": "Radware CEO on Identifying Intruders",
"pubdate": "20150202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brazil-global-fraud-test-kitchen-directLink-3-i-2562.mp3",
"title": "Brazil: The Global Fraud Test Kitchen",
"pubdate": "20150130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safenet-ceo-on-data-breach-security-directLink-9-i-2560.mp3",
"title": "SafeNet CEO on Data Breach Security",
"pubdate": "20150130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-security-training-to-next-level-directLink-1-i-2559.mp3",
"title": "Taking Security Training to the Next Level",
"pubdate": "20150129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/troy-leach-pci-directLink-2-i-2557.mp3",
"title": "PCI\"s Leach on Fed\"s Fast Payment Plan",
"pubdate": "20150129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vasco-ceo-on-authentication-trends-directLink-4-i-2556.mp3",
"title": "VASCO CEO on Authentication Trends",
"pubdate": "20150126"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boost-for-indo-us-cyber-cooperation-directLink-2-i-2552.mp3",
"title": "A Boost for Indo-U.S. Cyber Cooperation",
"pubdate": "20150120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expert-sony-hackers-sound-russian-directLink-5-i-2548.mp3",
"title": "Expert: Sony Hackers Sound Russian",
"pubdate": "20150113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fidelis-ceo-on-breach-response-directLink-9-i-2546.mp3",
"title": "Fidelis CEO on Breach Response",
"pubdate": "20150109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-cybercrime-as-service-directLink-2-i-2541.mp3",
"title": "Fighting \"Cybercrime as a Service\"",
"pubdate": "20150101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/the-ddos-threat-growing-directLink-5-i-2535.mp3",
"title": "Arbor Networks\" President on DDoS",
"pubdate": "20141230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/web-attacks-how-to-improve-defense-directLink-1-i-2540.mp3",
"title": "Web Based Attack Trends and How to Leverage Information Sharing",
"pubdate": "20141227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-indias-staffing-crisis-directLink-8-i-2539.mp3",
"title": "Staffing Crisis: What India Can Do",
"pubdate": "20141226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sony-hack-breaks-nation-state-mold-directLink-2-i-2536.mp3",
"title": "Sony Hack Breaks \"Nation-State\" Mold",
"pubdate": "20141223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zixcorp-ceo-on-evolution-email-security-directLink-8-i-2534.mp3",
"title": "ZixCorp CEO on E-mail Security Evolution",
"pubdate": "20141222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forescout-ceo-on-internet-things-directLink-5-i-2531.mp3",
"title": "ForeScout CEO on Internet of Things",
"pubdate": "20141218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/agencies-seen-improving-in-gauging-risk-directLink-6-i-2532.mp3",
"title": "Agencies Seen Improving in Gauging Risk",
"pubdate": "20141217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/proofpoints-ceo-says-hackers-are-winning-directLink-1-i-2530.mp3",
"title": "Proofpoint\"s CEO: Hackers Are Winning",
"pubdate": "20141216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-mobile-financial-transactions-directLink-2-i-2529.mp3",
"title": "AirWatch Chairman on Mobile Security",
"pubdate": "20141213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-isc-head-tackles-staffing-crisis-directLink-9-i-2528.mp3",
"title": "New (ISC)² Head Tackles Staffing Crisis",
"pubdate": "20141211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/true-cost-data-breach-directLink-4-i-2527.mp3",
"title": "The True Cost of a Data Breach",
"pubdate": "20141208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/christy-wyatt-on-mobile-security-directLink-1-i-2518.mp3",
"title": "Christy Wyatt on Mobile Security",
"pubdate": "20141205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wiper-malware-what-you-need-to-know-directLink-1-i-2526.mp3",
"title": "\"Wiper\" Malware: What You Need to Know",
"pubdate": "20141203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boost-for-cybersecurity-policy-analysis-directLink-5-i-2517.mp3",
"title": "A Boost for Cybersecurity Policy Analysis",
"pubdate": "20141127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-staffing-real-crisis-directLink-7-i-2506.mp3",
"title": "Security Staffing: The Real Crisis",
"pubdate": "20141127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/embracing-adversary-mindset-directLink-2-i-2514.mp3",
"title": "Embracing the Adversary Mindset",
"pubdate": "20141121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-ibm-will-grow-security-services-directLink-10-i-2505.mp3",
"title": "How IBM Will Grow Its Security Business",
"pubdate": "20141117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multidisciplinary-security-team-directLink-2-i-2511.mp3",
"title": "The Multidisciplinary IT Security Team",
"pubdate": "20141114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fireeye-ceo-evolution-security-directLink-8-i-2500.mp3",
"title": "FireEye CEO: The Evolution of Security",
"pubdate": "20141113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/david-dewalt-business-security-directLink-6-i-2503.mp3",
"title": "David DeWalt: The Business of Security",
"pubdate": "20141113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fiberlink-president-on-future-byod-directLink-5-i-2504.mp3",
"title": "Fiberlink President on Future of BYOD",
"pubdate": "20141112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-fighting-fraud-directLink-3-i-2508.mp3",
"title": "The Business of Fighting Fraud",
"pubdate": "20141112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-on-one-fireeyes-dave-dewalt-directLink-4-i-2499.mp3",
"title": "One on One with FireEye\"s Dave DeWalt",
"pubdate": "20141112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-aftermath-image-vs-security-directLink-5-i-2507.mp3",
"title": "Breach Aftermath: Messaging Matters",
"pubdate": "20141111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-troy-leach-directLink-3-i-2498.mp3",
"title": "Why PCI Will Issue Log Monitoring Guidance",
"pubdate": "20141110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/savage-directLink-10-i-2502.mp3",
"title": "New ONC Privacy Chief\"s Rallying Cry",
"pubdate": "20141110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-following-his-dream-directLink-6-i-2496.mp3",
"title": "NIST\"s Ron Ross on How a Career Evolves",
"pubdate": "20141106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-6-i-2495.mp3",
"title": "FFIEC: Boards Need Cyber Training",
"pubdate": "20141105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wearable-health-tech-new-privacy-risks-directLink-4-i-2493.mp3",
"title": "Wearable Health Tech: New Privacy Risks",
"pubdate": "20141103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-hack-lesson-learned-directLink-4-i-2492.mp3",
"title": "White House Hack: A Lesson Learned",
"pubdate": "20141030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/online-voting-security-vs-expediency-directLink-5-i-2489.mp3",
"title": "Online Voting: Security Vs. Expediency",
"pubdate": "20141027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emv-rollout-role-pins-directLink-3-i-2488.mp3",
"title": "EMV Rollout: Are PINs Essential?",
"pubdate": "20141024"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fixing-two-factor-failures-directLink-4-i-2486.mp3",
"title": "Fixing Two-Factor Failures",
"pubdate": "20141023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-tom-carper-sees-fisma-reform-passing-directLink-2-i-2484.mp3",
"title": "How Tom Carper Sees FISMA Bill Passing",
"pubdate": "20141021"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apt-defense-executing-right-standards-directLink-6-i-2483.mp3",
"title": "APT Defense: Executing the Right Standards",
"pubdate": "20141020"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/group-ib-directLink-6-i-2480.mp3",
"title": "Fighting the Globalization of Cybercrime",
"pubdate": "20141017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-would-original-ciso-do-directLink-5-i-2472.mp3",
"title": "What Would the Original CISO Do?",
"pubdate": "20141016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/manipulating-hackers-as-cyberdefense-directLink-9-i-2477.mp3",
"title": "Manipulating Hackers as a Cyberdefense",
"pubdate": "20141015"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-you-prepared-for-breach-directLink-8-i-2476.mp3",
"title": "Are You Prepared for a Breach?",
"pubdate": "20141014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-changes-coming-in-year-directLink-4-i-2471.mp3",
"title": "Authentication: Changes Coming In a Year",
"pubdate": "20141013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fda-directLink-9-i-2473.mp3",
"title": "Debunking Medical Device Cyber Myths",
"pubdate": "20141013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mike-smith-interview-directLink-4-i-2469.mp3",
"title": "Why Shellshock Battle Is Only Beginning",
"pubdate": "20141008"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/slow-path-to-password-replacement-directLink-9-i-2467.mp3",
"title": "The Slow Path to Password Replacement",
"pubdate": "20141006"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-1-i-2466.mp3",
"title": "Shellshock: The Patching Dilemma",
"pubdate": "20141002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-secure-sensitive-data-on-cloud-directLink-2-i-2465.mp3",
"title": "Adapting FedRAMP to Secure Sensitive Info",
"pubdate": "20141002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/from-isis-to-fisma-conversation-directLink-10-i-2464.mp3",
"title": "From ISIS to FISMA, A Conversation",
"pubdate": "20140929"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bash-bug-podcast-directLink-5-i-2463.mp3",
"title": "Shellshock Bug: How to Respond",
"pubdate": "20140926"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-omnibus-one-year-later-directLink-4-i-2459.mp3",
"title": "HIPAA Omnibus: One Year Later",
"pubdate": "20140922"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-maximize-business-benefits-directLink-7-i-2441.mp3",
"title": "Security: Maximize Business Benefits",
"pubdate": "20140917"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vanderhoof-directLink-10-i-2451.mp3",
"title": "The Biggest Challenge to EMV Migration",
"pubdate": "20140916"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/army-cyber-leader-touts-hacking-skills-directLink-10-i-2446.mp3",
"title": "Army Cyber Leader Touts Hacking Skills",
"pubdate": "20140912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hacker-attacks-are-you-prepared-directLink-10-i-2445.mp3",
"title": "Hacker Attacks: Are You Prepared?",
"pubdate": "20140912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michael-theis-directLink-9-i-2442.mp3",
"title": "Keys to Fighting Insider Fraud",
"pubdate": "20140910"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-prevention-new-approach-directLink-7-i-2436.mp3",
"title": "Breach Prevention: A New Approach",
"pubdate": "20140909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-framework-setting-record-straight-directLink-8-i-2430.mp3",
"title": "Cyber Framework: Setting Record Straight",
"pubdate": "20140827"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-cybercrime-in-canada-directLink-7-i-2432.mp3",
"title": "Fighting Cybercrime in Canada",
"pubdate": "20140827"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-modern-breach-directLink-3-i-2428.mp3",
"title": "Breach Response: Are We Doing Enough?",
"pubdate": "20140825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-banking-evolved-services-risks-directLink-6-i-2425.mp3",
"title": "Mobile Banking: Evolved Services, Risks",
"pubdate": "20140823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michael-daniels-path-to-white-house-directLink-7-i-2422.mp3",
"title": "Michael Daniel\"s Path to the White House",
"pubdate": "20140821"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/critiquing-apple-ios-8-security-features-directLink-3-i-2424.mp3",
"title": "Apple iOS 8: What\"s New for Security?",
"pubdate": "20140820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simplifying-cybersecurity-complexity-directLink-9-i-2417.mp3",
"title": "Simplifying Cybersecurity Complexity",
"pubdate": "20140813"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-us-want-cyber-peace-directLink-5-i-2415.mp3",
"title": "Does U.S. Truly Want Cyber Peace?",
"pubdate": "20140812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blackphone-inside-secure-smartphone-directLink-5-i-2414.mp3",
"title": "Blackphone: Inside a Secure Smart Phone",
"pubdate": "20140808"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/holistic-approach-to-security-directLink-2-i-2408.mp3",
"title": "A Holistic Approach to Security",
"pubdate": "20140808"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-its-team-sport-directLink-7-i-2413.mp3",
"title": "Cybersecurity: Why It\"s Got to Be a Team Sport",
"pubdate": "20140808"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/password-dead-directLink-3-i-2407.mp3",
"title": "The Password Is \"Dead\"",
"pubdate": "20140807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-drowning-in-alerts-directLink-4-i-2409.mp3",
"title": "Incident Response: \"Drowning in Alerts\"",
"pubdate": "20140807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pcileach-interview-directLink-6-i-2406.mp3",
"title": "New PCI Guidance for Third-Party Risks",
"pubdate": "20140807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/putting-cybervor-in-perspective-directLink-5-i-2411.mp3",
"title": "Putting CyberVor in Perspective",
"pubdate": "20140807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/waging-war-against-healthcare-fraud-directLink-6-i-2410.mp3",
"title": "Waging a War Against Healthcare Fraud",
"pubdate": "20140807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-low-cyber-diet-improve-security-directLink-8-i-2405.mp3",
"title": "Will Low-Cyber Diet Improve Security?",
"pubdate": "20140807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeted-attacks-raising-risk-urgency-directLink-7-i-2396.mp3",
"title": "Targeted Attacks: Raising Risk Urgency",
"pubdate": "20140805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-security-lessons-from-nascar-directLink-8-i-2401.mp3",
"title": "Assessing Controls: A NASCAR Lesson",
"pubdate": "20140804"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internet-things-security-analysis-directLink-7-i-2400.mp3",
"title": "\"Internet of Things\" Security Analysis",
"pubdate": "20140801"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sifma-directLink-8-i-2398.mp3",
"title": "Banks as Cybercrime Fighters?",
"pubdate": "20140729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shaping-cloud-services-contract-directLink-4-i-2394.mp3",
"title": "Shaping a Cloud Services Contract",
"pubdate": "20140724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-lessons-in-small-data-directLink-5-i-2392.mp3",
"title": "Big Lessons in Small Data",
"pubdate": "20140723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-security-leaders-role-directLink-9-i-2393.mp3",
"title": "Application Security: The Leader\"s Role",
"pubdate": "20140723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-before-during-after-directLink-6-i-2388.mp3",
"title": "Attack Response: Before, During, After",
"pubdate": "20140723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/modernizing-vas-ehr-directLink-4-i-2387.mp3",
"title": "Modernizing the VA\"s EHR System",
"pubdate": "20140722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analytics-enabled-soc-directLink-6-i-2384.mp3",
"title": "The Analytics-Enabled SOC",
"pubdate": "20140721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/art-coviello-divided-we-fall-directLink-7-i-2383.mp3",
"title": "Art Coviello: Divided We Fall",
"pubdate": "20140718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/testing-your-apt-response-plan-directLink-9-i-2382.mp3",
"title": "Testing Your APT Response Plan",
"pubdate": "20140715"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-research-career-path-directLink-5-i-2377.mp3",
"title": "Security Research: The Career Path",
"pubdate": "20140708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breaches-what-victims-say-directLink-8-i-2374.mp3",
"title": "Data Breaches: What the Victims Say",
"pubdate": "20140703"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-lessons-from-trenches-directLink-8-i-2373.mp3",
"title": "Breach Lessons from the Trenches",
"pubdate": "20140703"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersec-game-fervent-geeks-play-directLink-9-i-2370.mp3",
"title": "The \"Game\" Fervent IT Security Pros Play",
"pubdate": "20140701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-staffs-role-in-vendor-audits-directLink-1-i-2366.mp3",
"title": "InfoSec Staff\"s Role in Vendor Audits",
"pubdate": "20140628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/focusing-on-vectors-threats-directLink-9-i-2365.mp3",
"title": "Focusing on Vectors, Not Threats",
"pubdate": "20140628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-digital-assets-directLink-7-i-2363.mp3",
"title": "Improving Cyberthreat Communication",
"pubdate": "20140627"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-learned-from-cyber-insurance-directLink-10-i-2362.mp3",
"title": "Lessons Learned from Cyber-Insurance",
"pubdate": "20140626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-breaking-down-silos-directLink-5-i-2360.mp3",
"title": "Big Data: Breaking Down Silos",
"pubdate": "20140626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/all-malware-created-equally-directLink-9-i-2358.mp3",
"title": "Not All Malware is Created Equally",
"pubdate": "20140626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/and-security-filling-gap-directLink-10-i-2357.mp3",
"title": "IT and Security: Filling the Gap",
"pubdate": "20140626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-secure-legacy-apps-directLink-9-i-2356.mp3",
"title": "How to Secure Legacy Apps",
"pubdate": "20140626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tim-pawlenty-directLink-5-i-2355.mp3",
"title": "Why Information Sharing Isn\"t Working",
"pubdate": "20140625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/trend-micro-sherry-directLink-2-i-2352.mp3",
"title": "BYOD: Bring Your Own Disaster?",
"pubdate": "20140625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coalfire-dakin-directLink-5-i-2354.mp3",
"title": "3 Key Questions from CEOs to CISOs",
"pubdate": "20140625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/balancing-byod-company-data-directLink-8-i-2359.mp3",
"title": "Combining MDM and BYOD: The Best of Both Worlds",
"pubdate": "20140625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-constant-state-infection-directLink-1-i-2353.mp3",
"title": "Security: A Constant State of Infection",
"pubdate": "20140625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-privileged-id-governance-directLink-10-i-2349.mp3",
"title": "The ROI of Privileged ID Governance",
"pubdate": "20140625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/greg-garcia-directLink-4-i-2348.mp3",
"title": "The Key to Anticipating Cyber-Attacks",
"pubdate": "20140620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-women-advance-let-them-fail-directLink-1-i-2344.mp3",
"title": "How Can Women Advance? Let Them Fail",
"pubdate": "20140619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/application-fraud-scams-solutions-directLink-4-i-2341.mp3",
"title": "Application Fraud: Scams and Solutions",
"pubdate": "20140616"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-safely-reduce-security-controls-directLink-6-i-2340.mp3",
"title": "How to Safely Reduce Security Controls",
"pubdate": "20140611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/florida-fights-fraud-authentication-directLink-3-i-2339.mp3",
"title": "Florida Fights Fraud with Authentication",
"pubdate": "20140609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multidisciplinary-approach-to-infosec-directLink-8-i-2335.mp3",
"title": "A Multidisciplinary Approach to InfoSec",
"pubdate": "20140609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iam-improving-customer-experience-directLink-1-i-2337.mp3",
"title": "IAM and Improving the Customer Experience",
"pubdate": "20140606"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-6-i-2334.mp3",
"title": "Stop Breaches? Improve Internet Hygiene",
"pubdate": "20140605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-be-cso-for-fbi-directLink-5-i-2332.mp3",
"title": "How To Be a CSO for the FBI",
"pubdate": "20140603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-strategy-for-winning-funding-directLink-9-i-2331.mp3",
"title": "A CISO\"s Strategy for Winning Funding",
"pubdate": "20140602"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keeping-up-cybersecurity-framework-directLink-2-i-2329.mp3",
"title": "Keeping Up with Cybersecurity Framework",
"pubdate": "20140530"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/-directLink-6-i-2326.mp3",
"title": "Target\"s Impact on Mobile Payments",
"pubdate": "20140521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-ciso-ceo-to-talk-same-language-directLink-10-i-2325.mp3",
"title": "Getting CISO, CEO to Talk Same Language",
"pubdate": "20140519"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fed-to-offer-fast-payments-game-plan-directLink-3-i-2318.mp3",
"title": "Fed to Unveil Plan for \"Fast Payments\"",
"pubdate": "20140516"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-context-aware-security-directLink-10-i-2317.mp3",
"title": "Avivah Litan on \"Context-Aware\" Security",
"pubdate": "20140515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/consumers-on-infosec-what-me-worry-directLink-10-i-2324.mp3",
"title": "Consumers on InfoSec: What, Me Worry?",
"pubdate": "20140515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/applying-engineering-values-to-infosec-directLink-10-i-2322.mp3",
"title": "Applying Engineering Values to InfoSec",
"pubdate": "20140515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-risk-based-approach-to-awareness-directLink-5-i-2321.mp3",
"title": "A New Way to Build Security Awareness",
"pubdate": "20140513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/haiyan-song-joe-goldberg-directLink-7-i-2284.mp3",
"title": "Getting Up to Speed on Security",
"pubdate": "20140510"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-cybercriminal-directLink-6-i-2279.mp3",
"title": "The Evolution of the Cybercriminal",
"pubdate": "20140510"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2nd-panel-oks-limits-on-bulk-collection-directLink-1-i-2315.mp3",
"title": "2nd Panel OKs Limits on Bulk Collection",
"pubdate": "20140509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-defense-cybersecurity-framework-directLink-10-i-2302.mp3",
"title": "In Defense of Cybersecurity Framework",
"pubdate": "20140508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compiling-byod-strategy-directLink-2-i-2274.mp3",
"title": "BYOD: Building an Effective Strategy",
"pubdate": "20140506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-file-sharing-trends-directLink-4-i-2297.mp3",
"title": "Mobile File Sharing Trends",
"pubdate": "20140506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ponemon-data-breach-costs-rising-directLink-10-i-2310.mp3",
"title": "Ponemon: Data Breach Costs Rising",
"pubdate": "20140506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/signature-vs-behavior-based-analysis-directLink-9-i-2275.mp3",
"title": "Fighting Threats with Behavioral Analysis",
"pubdate": "20140506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-generation-encryption-directLink-2-i-2300.mp3",
"title": "The Next Generation of Encryption",
"pubdate": "20140506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crawling-new-networks-directLink-8-i-2288.mp3",
"title": "Using Network \"Situational Awareness\"",
"pubdate": "20140506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-economic-view-to-cybersecurity-directLink-9-i-2294.mp3",
"title": "Cybersecurity: Taking an Economic View",
"pubdate": "20140503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-individual-directLink-2-i-2301.mp3",
"title": "Authentication and the Individual",
"pubdate": "20140503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-as-enabler-trusted-id-directLink-5-i-2292.mp3",
"title": "Mobile as the Enabler of Trusted ID",
"pubdate": "20140503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-network-visibility-directLink-1-i-2287.mp3",
"title": "The Need for Network Visibility",
"pubdate": "20140502"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-built-into-code-directLink-10-i-2283.mp3",
"title": "Security Built Into the Code",
"pubdate": "20140502"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-ddos-industry-directLink-7-i-2296.mp3",
"title": "The New DDoS Industry",
"pubdate": "20140502"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/filtering-content-for-different-regions-directLink-4-i-2306.mp3",
"title": "Secure Web Gateway: Cultural Issues",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-websites-through-hacking-directLink-1-i-2298.mp3",
"title": "The Role of Ethical Hacking",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/changing-ddos-environment-directLink-10-i-2293.mp3",
"title": "DDoS: Evolving Attacks and Response",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-security-simpler-directLink-2-i-2305.mp3",
"title": "Turning Awareness into Action",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-cloud-to-detect-malware-directLink-9-i-2277.mp3",
"title": "Cloud-Based Threat Protection",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jason-hart-directLink-3-i-2281.mp3",
"title": "Reassessing Information Security",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/matt-middleton-leal-directLink-8-i-2285.mp3",
"title": "Protecting Credentialed Information",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-evolution-directLink-3-i-2289.mp3",
"title": "The Authentication Evolution",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-network-testing-directLink-7-i-2304.mp3",
"title": "The Need for Product Testing",
"pubdate": "20140501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uk-ddos-attacks-work-as-smokescreen-directLink-4-i-2290.mp3",
"title": "U.K. DDoS Attacks Work as Smokescreen",
"pubdate": "20140430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enhancing-application-security-directLink-6-i-2286.mp3",
"title": "Enhancing Application Security",
"pubdate": "20140430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/choosing-application-components-directLink-2-i-2280.mp3",
"title": "Choosing the Right App Components",
"pubdate": "20140430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-vulnerability-management-directLink-10-i-2282.mp3",
"title": "Understanding Vulnerability Management",
"pubdate": "20140430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-security-within-technology-directLink-1-i-2303.mp3",
"title": "Security for Smaller Organizations",
"pubdate": "20140430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reducing-response-times-directLink-9-i-2278.mp3",
"title": "Reducing Cyber-Attack Response Times",
"pubdate": "20140429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-inbound-traffic-detect-trouble-directLink-10-i-2268.mp3",
"title": "Eric Cole to Enter Hall of Fame",
"pubdate": "20140424"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersec-framework-doomed-to-fail-directLink-5-i-2267.mp3",
"title": "Is CyberSec Framework Doomed to Fail?",
"pubdate": "20140423"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/v-directLink-4-i-2266.mp3",
"title": "Verizon Report: Web App Attacks on Rise",
"pubdate": "20140422"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/oncs-desalvo-on-privacy-security-directLink-5-i-2264.mp3",
"title": "ONC\"s DeSalvo on Privacy, Security",
"pubdate": "20140421"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-showcase-intels-malcolm-harkins-directLink-6-i-2258.mp3",
"title": "CISO Showcase: Intel\"s Malcolm Harkins",
"pubdate": "20140415"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/determining-heartbleed-exfiltration-directLink-10-i-2256.mp3",
"title": "Determining Heartbleed Exfiltration",
"pubdate": "20140411"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartbleed-rethinking-cybersecurity-directLink-8-i-2252.mp3",
"title": "Heartbleed Discoverer Speaks Out",
"pubdate": "20140410"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/uphill-battle-against-cyber-attackers-directLink-1-i-2251.mp3",
"title": "Inside Symantec\"s 2014 Threat Report",
"pubdate": "20140409"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/viewing-information-as-asset-to-protect-directLink-5-i-2247.mp3",
"title": "Cybersecurity: Involving Senior Leaders",
"pubdate": "20140404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/changing-landscape-application-security-directLink-5-i-2244.mp3",
"title": "Changing Landscape of Application Security",
"pubdate": "20140403"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-new-global-threat-report-directLink-3-i-2246.mp3",
"title": "Inside the New Global Threat Report",
"pubdate": "20140401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/career-profile-attorney-kim-peretti-directLink-9-i-2245.mp3",
"title": "Career Profile: Attorney Kim Peretti",
"pubdate": "20140401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-threat-defense-directLink-6-i-2242.mp3",
"title": "Advanced Threat Defense",
"pubdate": "20140331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isc-turns-25-whats-ahead-directLink-8-i-2241.mp3",
"title": "(ISC)² Turns 25: What\"s Ahead?",
"pubdate": "20140325"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/end-to-end-encryption-challenges-directLink-10-i-2239.mp3",
"title": "Why Is End-to-End Encryption So Daunting?",
"pubdate": "20140324"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-marijuana-risks-directLink-9-i-2238.mp3",
"title": "State Marijuana Laws: The Challenges",
"pubdate": "20140320"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/so-you-want-career-in-privacy-directLink-1-i-2235.mp3",
"title": "So, You Want a Career in Privacy?",
"pubdate": "20140318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/retail-breaches-malware-source-directLink-2-i-2233.mp3",
"title": "Retail Breaches: The Malware Source",
"pubdate": "20140312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fido-pushing-international-buy-in-directLink-3-i-2229.mp3",
"title": "FIDO: Pushing International Buy-In",
"pubdate": "20140312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deploying-continuous-monitoring-plan-directLink-4-i-2227.mp3",
"title": "Deploying a Continuous Monitoring Plan",
"pubdate": "20140311"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-diagnostics-game-changer-directLink-7-i-2222.mp3",
"title": "Continuous Diagnostics: A Game Changer",
"pubdate": "20140304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/accelops-directLink-1-i-2204.mp3",
"title": "Automating Data Analysis",
"pubdate": "20140303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-professionals-time-to-step-up-directLink-2-i-2221.mp3",
"title": "Security Professionals: Time to Step Up",
"pubdate": "20140303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/real-threat-intelligence-directLink-6-i-2201.mp3",
"title": "Real Threat Intelligence",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolving-threatscape-directLink-7-i-2211.mp3",
"title": "The Evolving Threatscape",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keys-to-secure-content-sharing-directLink-4-i-2225.mp3",
"title": "Keys to Secure Content Sharing",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-continue-to-grow-directLink-9-i-2212.mp3",
"title": "DDoS Attacks Continue to Grow",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fox-it-directLink-9-i-2203.mp3",
"title": "How to Improve Cybercrime Tracking",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-phone-fraud-directLink-4-i-2193.mp3",
"title": "Fighting Phone Fraud",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/api-as-attack-vector-directLink-7-i-2192.mp3",
"title": "The API as an Attack Vector",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-encryption-management-directLink-4-i-2191.mp3",
"title": "Improving Encryption Management",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-mobile-hacks-threaten-enterprise-directLink-10-i-2199.mp3",
"title": "How Mobile Hacks Threaten Enterprise",
"pubdate": "20140227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threatmetrix-directLink-9-i-2206.mp3",
"title": "Insights on Enhancing Authentication",
"pubdate": "20140226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2014-brings-shift-in-cyber-attacks-directLink-3-i-2218.mp3",
"title": "2014 Brings Shift in Cyber-Attacks",
"pubdate": "20140226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/barrett-lyon-directLink-3-i-2217.mp3",
"title": "DDoS: More Defenses Needed",
"pubdate": "20140226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-going-beyond-compliance-directLink-1-i-2197.mp3",
"title": "Security: Going Beyond Compliance",
"pubdate": "20140226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iboss-offers-behavioral-analysis-directLink-10-i-2190.mp3",
"title": "iBoss Offers Behavioral Analysis",
"pubdate": "20140226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberthreat-protection-evolves-directLink-1-i-2209.mp3",
"title": "Cyberthreat Protection Evolves",
"pubdate": "20140226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fido-beyond-simple-authentication-directLink-7-i-2214.mp3",
"title": "FIDO: Beyond \"Simple\" Authentication",
"pubdate": "20140225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-unveils-open-source-initiative-directLink-7-i-2208.mp3",
"title": "Cisco Unveils Open Source Initiative",
"pubdate": "20140225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/impact-bit9-carbon-black-merger-directLink-3-i-2223.mp3",
"title": "The Impact of Bit9, Carbon Black Merger",
"pubdate": "20140225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cipherclouds-new-offering-directLink-2-i-2215.mp3",
"title": "CipherCloud Unveils New Platform",
"pubdate": "20140225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-network-architecture-directLink-4-i-2200.mp3",
"title": "Securing Network Architecture",
"pubdate": "20140225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dell-secureworks-directLink-1-i-2195.mp3",
"title": "Cryptocurrency an Easy Target",
"pubdate": "20140225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/solutionary-directLink-1-i-2194.mp3",
"title": "Log Analysis for Breach Prevention",
"pubdate": "20140225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advanced-threat-defense-directLink-8-i-2205.mp3",
"title": "Advanced Threat Defense",
"pubdate": "20140224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/litan-directLink-3-i-2198.mp3",
"title": "2014 Fraud Prevention: 2 Key Steps",
"pubdate": "20140222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-smart-grid-directLink-2-i-2188.mp3",
"title": "Securing the Smart Grid",
"pubdate": "20140220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-investments-venture-capitals-view-directLink-1-i-2187.mp3",
"title": "InfoSec Investments: Venture Capital\"s View",
"pubdate": "20140219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unfcu-directLink-3-i-2185.mp3",
"title": "An EMV Pioneer Offers Lessons Learned",
"pubdate": "20140217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/baking-privacy-into-health-it-directLink-10-i-2183.mp3",
"title": "Baking Privacy Into Health IT",
"pubdate": "20140213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cba-directLink-1-i-2182.mp3",
"title": "Target Breach: The Cost to Banks",
"pubdate": "20140212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-one-shot-memory-device-directLink-7-i-2181.mp3",
"title": "Building a \"One-Shot\" Memory Device",
"pubdate": "20140212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-directLink-7-i-2180.mp3",
"title": "5 Ways to Improve PCI Compliance",
"pubdate": "20140211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/javelin-directLink-10-i-2178.mp3",
"title": "Card Breaches Pose Greatest Fraud Risk",
"pubdate": "20140207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lax-security-to-blame-for-breaches-directLink-3-i-2176.mp3",
"title": "Compensating Banks for Breaches",
"pubdate": "20140206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2014-preview-directLink-6-i-2172.mp3",
"title": "RSA 2014: A Preview",
"pubdate": "20140205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-responds-to-critics-directLink-3-i-2175.mp3",
"title": "PCI Council Responds to Critics",
"pubdate": "20140203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/agency-security-audits-better-way-directLink-2-i-2168.mp3",
"title": "Agency Security Audits: A Better Way?",
"pubdate": "20140130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isight-directLink-8-i-2174.mp3",
"title": "DHS Report Researcher: Retailers at Risk",
"pubdate": "20140129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-state-privacy-directLink-4-i-2171.mp3",
"title": "The Global State of Privacy",
"pubdate": "20140128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/smarter-criminals-behind-breach-rise-directLink-2-i-2166.mp3",
"title": "Records Exposed Hit New High in 2013",
"pubdate": "20140124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iphone-app-offers-breach-law-guide-directLink-8-i-2163.mp3",
"title": "iPhone App Offers Breach Law Guide",
"pubdate": "20140122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ethics-technology-disconnect-directLink-7-i-2157.mp3",
"title": "Ethics & Technology: The Disconnect",
"pubdate": "20140121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intelcrawler-directLink-3-i-2161.mp3",
"title": "Target Malware: Exploring the Origins",
"pubdate": "20140120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exclusive-inside-cisco-security-report-directLink-2-i-2158.mp3",
"title": "Exclusive: Inside Cisco Security Report",
"pubdate": "20140117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/healthcare-total-network-security-directLink-2-i-2159.mp3",
"title": "Network Security: Enhancing Visibility Through Integration",
"pubdate": "20140117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-predictions-for-2014-directLink-5-i-2130.mp3",
"title": "Breach Predictions for 2014",
"pubdate": "20140117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breaches-expose-flawed-payments-system-directLink-8-i-2155.mp3",
"title": "Breaches Expose Payments System Flaws",
"pubdate": "20140115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-trends-to-sway-cybersecuritys-future-directLink-2-i-2153.mp3",
"title": "5 Trends to Sway Cybersecurity\"s Future",
"pubdate": "20140111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/financial-trojans-what-to-expect-in-2014-directLink-10-i-2150.mp3",
"title": "Financial Trojans: What to Expect in 2014",
"pubdate": "20140110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-training-weaknesses-idd-directLink-9-i-2148.mp3",
"title": "Why Training Doesn\"t Mitigate Phishing",
"pubdate": "20140107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/background-screening-top-10-trends-directLink-9-i-2152.mp3",
"title": "Background Screening: Top 10 Trends",
"pubdate": "20140107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/jump-starting-stronger-authentication-directLink-5-i-2151.mp3",
"title": "FIDO\"s 2014 Authentication Agenda",
"pubdate": "20140103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2014-cybersecurity-forecast-directLink-6-i-2144.mp3",
"title": "2014 Cybersecurity Forecast",
"pubdate": "20140103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/5-resolutions-for-security-pros-directLink-7-i-2140.mp3",
"title": "5 Resolutions for IT Security Pros",
"pubdate": "20131230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reworking-frameworks-privacy-approach-directLink-5-i-2145.mp3",
"title": "Reworking Framework\"s Privacy Approach",
"pubdate": "20131227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-way-to-manage-risk-directLink-4-i-2143.mp3",
"title": "Improving the Way to Manage Risk",
"pubdate": "20131226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/target-breach-watershed-event-directLink-10-i-2139.mp3",
"title": "Target Breach: A Watershed Event",
"pubdate": "20131223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enisa-on-new-threat-landscape-directLink-9-i-2135.mp3",
"title": "ENISA on the New Threat Landscape",
"pubdate": "20131220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/emv-outlook-for-2014-directLink-8-i-2136.mp3",
"title": "EMV: The Outlook for 2014",
"pubdate": "20131218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unsecure-ids-lead-to-fraud-directLink-5-i-2132.mp3",
"title": "Fighting Fraud With ID Management",
"pubdate": "20131216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nccoe-to-address-iam-risks-directLink-7-i-2133.mp3",
"title": "Timely Advice on IAM, Asset Management",
"pubdate": "20131216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-flaw-in-va-software-was-found-directLink-i-2129.mp3",
"title": "How a Flaw in VA Software Was Found",
"pubdate": "20131211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-role-based-security-training-directLink-i-2128.mp3",
"title": "Creating Role-Based Security Training",
"pubdate": "20131210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bill-stewart-directLink-i-2126.mp3",
"title": "How Will NIST Framework Affect Banks?",
"pubdate": "20131209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/major-password-breach-lessons-learned-directLink-i-2125.mp3",
"title": "Major Password Breach: Lessons Learned",
"pubdate": "20131206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/questioning-culture-surveillance-directLink-i-2117.mp3",
"title": "Questioning the Culture of Surveillance",
"pubdate": "20131202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patent-reform-legislative-update-directLink-i-2121.mp3",
"title": "Push for Patent Reform Advances",
"pubdate": "20131127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-10-top-tips-directLink-i-2118.mp3",
"title": "Cloud Security: Top 10 Tips",
"pubdate": "20131127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-balancing-act-for-hies-directLink-i-2120.mp3",
"title": "Authentication: Balancing Act for HIEs",
"pubdate": "20131127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/somers-directLink-i-2116.mp3",
"title": "How to Fight Cross-Border ATM Fraud",
"pubdate": "20131125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/accessing-big-data-for-health-research-directLink-i-2114.mp3",
"title": "Accessing Big Data for Health Research",
"pubdate": "20131122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/consumer-advocate-shut-obamacare-site-directLink-i-2113.mp3",
"title": "Consumer Advocate: Shut Obamacare Site",
"pubdate": "20131121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-see-repute-at-risk-from-breaches-directLink-i-2111.mp3",
"title": "How to Minimize Supply Chain Risks",
"pubdate": "20131119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-encryption-tools-for-cloud-directLink-i-2109.mp3",
"title": "New Encryption Tools for the Cloud",
"pubdate": "20131118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prosecutor-id-theft-top-fraud-concern-directLink-i-2112.mp3",
"title": "Prosecutor: ID Theft Top Fraud Concern",
"pubdate": "20131118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-valuable-cybersecurity-metrics-directLink-i-2106.mp3",
"title": "Creating Valuable Cybersecurity Metrics",
"pubdate": "20131113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/governing-internet-things-directLink-i-2103.mp3",
"title": "Governing the \"Internet of Things\"",
"pubdate": "20131111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-insurance-exchange-works-directLink-i-2102.mp3",
"title": "State Insurance Exchange: Why It Works",
"pubdate": "20131108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-update-focus-on-third-party-risks-directLink-i-2101.mp3",
"title": "PCI Update: Focus on Third-Party Risks",
"pubdate": "20131107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-creates-cyber-national-guard-directLink-i-2099.mp3",
"title": "State Creates \"Cyber National Guard\"",
"pubdate": "20131107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-lessons-learned-directLink-i-2083.mp3",
"title": "Breach Response: Lessons Learned",
"pubdate": "20131106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/todays-greatest-online-payment-risk-directLink-i-2096.mp3",
"title": "Today\"s Greatest Online Payment Risk",
"pubdate": "20131105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/contain-mobile-security-threats-directLink-i-2095.mp3",
"title": "Contain Mobile Security Threats",
"pubdate": "20131105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obama-fis-talk-cybersecurity-directLink-i-2093.mp3",
"title": "Obama, FIs Talk Cybersecurity",
"pubdate": "20131101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-launches-single-identity-pilot-directLink-i-2092.mp3",
"title": "State Launches Single Identity Pilot",
"pubdate": "20131101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-unintentional-insider-threat-directLink-i-2091.mp3",
"title": "What is Unintentional Insider Threat?",
"pubdate": "20131031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-what-to-expect-next-directLink-i-2090.mp3",
"title": "DDoS: What to Expect Next",
"pubdate": "20131030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasonable-security-changing-rules-directLink-i-2089.mp3",
"title": "Reasonable Security: Changing the Rules",
"pubdate": "20131028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/synthetic-ids-understanding-threat-directLink-i-2087.mp3",
"title": "Synthetic IDs: Understanding the Threat",
"pubdate": "20131025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prosecutor-offers-fraud-fighting-advice-directLink-i-2086.mp3",
"title": "Prosecutor Offers Fraud-Fighting Advice",
"pubdate": "20131024"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/building-defensible-breach-response-directLink-i-2085.mp3",
"title": "Building a \"Defensible\" Breach Response",
"pubdate": "20131023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-mitigation-directLink-i-2081.mp3",
"title": "Continuous Monitoring and Mitigation",
"pubdate": "20131023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-balance-risk-tech-obligations-directLink-i-2084.mp3",
"title": "CISOs Balance Risk, Tech Obligations",
"pubdate": "20131022"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-fight-insider-fraud-directLink-i-2080.mp3",
"title": "How to Fight Insider Fraud",
"pubdate": "20131017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/role-ehrs-in-healthcare-fraud-directLink-i-2077.mp3",
"title": "The Role of EHRs in Healthcare Fraud",
"pubdate": "20131015"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/helping-businesses-cybersecurity-directLink-i-2069.mp3",
"title": "Helping Businesses With Cybersecurity",
"pubdate": "20131014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/finding-new-ways-to-fight-fraud-directLink-i-2076.mp3",
"title": "Finding New Ways to Fight Fraud",
"pubdate": "20131011"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-trade-on-collision-course-directLink-i-2071.mp3",
"title": "Cybersecurity, Trade on Collision Course",
"pubdate": "20131010"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-fighting-call-center-fraud-directLink-i-2074.mp3",
"title": "Insights on Fighting Call Center Fraud",
"pubdate": "20131009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/purdues-spafford-on-educating-executives-directLink-i-2072.mp3",
"title": "Purdue\"s Spafford on Educating Executives",
"pubdate": "20131009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-fixing-authentication-directLink-i-2073.mp3",
"title": "Gartner\"s Litan on Fixing Authentication",
"pubdate": "20131007"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/attackers-for-hire-troubling-trend-directLink-i-2070.mp3",
"title": "Attackers-for-Hire: A Troubling Trend",
"pubdate": "20131004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tracking-fraud-lifecycle-directLink-i-2048.mp3",
"title": "Tracking the Fraud Lifecycle",
"pubdate": "20131002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-updates-address-retail-breaches-directLink-i-2067.mp3",
"title": "PCI Updates Address Retail Breaches",
"pubdate": "20130930"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ceos-as-privacy-leaders-directLink-i-2065.mp3",
"title": "CEOs as Privacy Leaders",
"pubdate": "20130925"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pitfalls-professionalizing-infosec-directLink-i-2064.mp3",
"title": "Pitfalls of Professionalizing InfoSec",
"pubdate": "20130924"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/smus-new-cybersecurity-mission-directLink-i-2060.mp3",
"title": "SMU\"s New Cybersecurity Mission",
"pubdate": "20130918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-whats-overlooked-directLink-i-2058.mp3",
"title": "Business Continuity: What\"s Overlooked?",
"pubdate": "20130911"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expanding-continuous-diagnostic-effort-directLink-i-2056.mp3",
"title": "Expanding Continuous Diagnostic Effort",
"pubdate": "20130910"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/implementing-continuous-monitoring-plan-directLink-i-2053.mp3",
"title": "Implementing Continuous Monitoring Plan",
"pubdate": "20130905"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-nist-guidance-for-hipaa-compliance-directLink-i-2052.mp3",
"title": "Using NIST Guidance for HIPAA Compliance",
"pubdate": "20130904"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-federal-game-plan-directLink-i-2045.mp3",
"title": "Continuous Monitoring: Federal Game Plan",
"pubdate": "20130903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-fraudsters-edge-directLink-i-2050.mp3",
"title": "Account Takeover: The Fraudsters\" Edge",
"pubdate": "20130903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/call-center-fraud-succeeds-directLink-i-2049.mp3",
"title": "Why Call Center Fraud Succeeds",
"pubdate": "20130830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warning-new-ddos-fraud-link-directLink-i-2044.mp3",
"title": "Warning: A New DDoS-Fraud Link",
"pubdate": "20130826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/impact-big-data-on-privacy-policy-directLink-i-2041.mp3",
"title": "Impact of Big Data on Privacy Policy",
"pubdate": "20130822"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facing-advanced-threat-directLink-i-2039.mp3",
"title": "Facing the Advanced Threat",
"pubdate": "20130820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-30-draft-guidelines-released-directLink-i-2034.mp3",
"title": "PCI 3.0 Draft Guidelines Released",
"pubdate": "20130819"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-insurance-exchange-deadline-nears-directLink-i-2037.mp3",
"title": "Health Insurance Exchange Deadline Nears",
"pubdate": "20130819"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-be-trusted-to-protect-govt-it-directLink-i-2036.mp3",
"title": "Can DHS Be Trusted to Protect Gov\"t IT?",
"pubdate": "20130816"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confronting-iran-as-cyber-adversary-directLink-i-2035.mp3",
"title": "Confronting Iran as a Cyber-Adversary",
"pubdate": "20130815"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/re-assessing-ddos-lessons-learned-directLink-i-2033.mp3",
"title": "Re-Assessing DDoS: The Lessons Learned",
"pubdate": "20130814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-sharing-whats-missing-directLink-i-2028.mp3",
"title": "Information Sharing: What\"s Missing?",
"pubdate": "20130812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exit-interview-dhss-bruce-mcconnell-directLink-i-2027.mp3",
"title": "Exit Interview: DHS\"s Bruce McConnell",
"pubdate": "20130812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-mobile-payments-risks-directLink-i-2026.mp3",
"title": "Addressing Mobile Payments Risks",
"pubdate": "20130809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/is-my-security-program-protecting-my-business-directLink-i-2018.mp3",
"title": "\"Is My Security Program Protecting My Business?\"",
"pubdate": "20130809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/diplomat-security-openness-co-exist-directLink-i-2025.mp3",
"title": "Diplomat: Security, Openness Can Co-Exist",
"pubdate": "20130806"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hotlines-new-use-avert-cyber-disaster-directLink-i-2024.mp3",
"title": "Hotline\"s New Use: Avert Cyber Disaster",
"pubdate": "20130802"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/indictments-new-clues-into-fraud-schemes-directLink-i-2021.mp3",
"title": "Indictments: New Clues Into Fraud Schemes",
"pubdate": "20130731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-tips-for-managing-social-media-directLink-i-2017.mp3",
"title": "Legal Tips for Managing Social Media",
"pubdate": "20130724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exchanging-health-data-during-disasters-directLink-i-2015.mp3",
"title": "Exchanging Health Data During Disasters",
"pubdate": "20130722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-owns-your-social-media-assets-directLink-i-2014.mp3",
"title": "Who Owns Your Social Media Assets?",
"pubdate": "20130719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bill-endorses-obama-cybersecurity-plans-directLink-i-2013.mp3",
"title": "Bill Endorses Obama Cybersecurity Plans",
"pubdate": "20130718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/path-to-accelerated-breach-response-directLink-i-2011.mp3",
"title": "The Path to Accelerated Breach Response",
"pubdate": "20130718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-readies-incident-coordination-guide-directLink-i-2010.mp3",
"title": "NIST Readies Incident Coordination Guide",
"pubdate": "20130712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insurance-exchange-tackles-security-directLink-i-2008.mp3",
"title": "An Insurance Exchange Tackles Security",
"pubdate": "20130710"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/man-behind-cybersecurity-framework-directLink-i-2006.mp3",
"title": "Man Behind the Cybersecurity Framework",
"pubdate": "20130708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-cybersecurity-game-changers-directLink-i-2003.mp3",
"title": "3 Cybersecurity Game Changers",
"pubdate": "20130708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-borderless-breach-law-directLink-i-2005.mp3",
"title": "The Case for a \"Borderless\" Breach Law",
"pubdate": "20130705"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-for-cyber-patent-disputes-directLink-i-2002.mp3",
"title": "Preparing for Cyber Patent Disputes",
"pubdate": "20130701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-info-shared-even-without-cispa-directLink-i-2000.mp3",
"title": "Threat Info Shared Even Without CISPA",
"pubdate": "20130628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intels-harkins-on-mobile-security-directLink-i-1996.mp3",
"title": "Intel\"s Harkins on Mobile Security",
"pubdate": "20130627"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/laying-foundation-for-next-gen-workforce-directLink-i-1994.mp3",
"title": "Laying Foundation for Next-Gen Workforce",
"pubdate": "20130626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/expanding-global-threat-data-sharing-directLink-i-1995.mp3",
"title": "Expanding Global Threat Data Sharing",
"pubdate": "20130626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-security-corporate-data-directLink-i-1987.mp3",
"title": "Mobile Security of Corporate Data",
"pubdate": "20130626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cias-ex-ciso-on-preventing-leaks-directLink-i-1992.mp3",
"title": "CIA\"s Ex-CISO on Preventing Leaks",
"pubdate": "20130621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nsa-leak-lessons-for-cisos-cpos-directLink-i-1991.mp3",
"title": "NSA Leak: Lessons for CISOs, CPOs",
"pubdate": "20130620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-on-preparing-for-ipv6-directLink-i-1989.mp3",
"title": "Tips on Preparing for IPv6",
"pubdate": "20130619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dlp-engage-end-user-directLink-i-1988.mp3",
"title": "DLP: Engage the End-User",
"pubdate": "20130619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defining-next-generation-security-directLink-i-1984.mp3",
"title": "Defining Next-Generation Security",
"pubdate": "20130619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-against-advanced-threats-directLink-i-1983.mp3",
"title": "Defending Against Advanced Threats",
"pubdate": "20130619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-access-intelligence-directLink-i-1986.mp3",
"title": "The Power of Access Intelligence",
"pubdate": "20130619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/where-s-in-grc-directLink-i-1985.mp3",
"title": "Where Is the \\\"S\\\" in GRC?",
"pubdate": "20130619"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dods-influence-on-smart-phone-security-directLink-i-1977.mp3",
"title": "DoD\"s Influence on Smart Phone Security",
"pubdate": "20130618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-grc-agenda-directLink-i-1981.mp3",
"title": "The New GRC Agenda",
"pubdate": "20130618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-leverage-threat-intelligence-directLink-i-1982.mp3",
"title": "How to Leverage Threat Intelligence",
"pubdate": "20130618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/responding-to-state-sponsored-attacks-directLink-i-1980.mp3",
"title": "Responding to State-Sponsored Attacks",
"pubdate": "20130618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/next-gen-firewall-security-directLink-i-1978.mp3",
"title": "Next-Gen Firewall Security",
"pubdate": "20130618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/australia-mulls-data-breach-notice-law-directLink-i-1976.mp3",
"title": "Australia Mulls Data Breach Notice Law",
"pubdate": "20130614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-look-at-mobile-security-directLink-i-1975.mp3",
"title": "A New Look at Mobile Security",
"pubdate": "20130614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-breach-response-directLink-i-1974.mp3",
"title": "The Case for Breach Response",
"pubdate": "20130614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-view-ddos-directLink-i-1973.mp3",
"title": "The Global View of DDoS",
"pubdate": "20130614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/adversarial-view-security-directLink-i-1972.mp3",
"title": "An Adversarial View of Security",
"pubdate": "20130614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-application-layer-attacks-directLink-i-1970.mp3",
"title": "The Rise of Application-Layer Attacks",
"pubdate": "20130613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-what-to-do-directLink-i-1971.mp3",
"title": "Breach Response: What Not to Do",
"pubdate": "20130612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-malware-telling-us-directLink-i-1969.mp3",
"title": "What Malware is Telling Us",
"pubdate": "20130612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/usc-launches-masters-in-cybersecurity-directLink-i-1956.mp3",
"title": "USC Launches Master\"s in Cybersecurity",
"pubdate": "20130612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/regulations-impact-on-data-breach-costs-directLink-i-1953.mp3",
"title": "Regulations\" Impact on Data Breach Costs",
"pubdate": "20130611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cold-facts-about-web-app-security-directLink-i-1955.mp3",
"title": "Cold Facts About Web App Security",
"pubdate": "20130611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-virtual-supply-chain-directLink-i-1947.mp3",
"title": "Protecting the Virtual Supply Chain",
"pubdate": "20130611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-impact-on-brand-directLink-i-1954.mp3",
"title": "DDoS Attacks: The Impact on Brand",
"pubdate": "20130610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-analytics-will-change-security-directLink-i-1952.mp3",
"title": "How Analytics Will Change Security",
"pubdate": "20130607"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-privatization-trojans-directLink-i-1951.mp3",
"title": "Phishing: The Privatization of Trojans",
"pubdate": "20130606"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-coviello-how-to-use-big-data-directLink-i-1950.mp3",
"title": "RSA\"s Coviello: How to Use Big Data",
"pubdate": "20130605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-security-lessons-from-asia-directLink-i-1948.mp3",
"title": "Mobile Security: Lessons from Asia",
"pubdate": "20130604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/americans-dont-fret-over-cybersecurity-directLink-i-1945.mp3",
"title": "Americans Don\"t Fret Over Cybersecurity",
"pubdate": "20130604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/questioning-legality-hack-back-directLink-i-1936.mp3",
"title": "Questioning the Legality of Hack-Back",
"pubdate": "20130603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-threats-outpace-pc-attacks-directLink-i-1940.mp3",
"title": "Mobile Threats Outpace PC Attacks",
"pubdate": "20130529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/keys-to-successful-info-sharing-directLink-i-1935.mp3",
"title": "Keys to Successful Info Sharing",
"pubdate": "20130524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/targeted-cyber-attacks-how-to-respond-directLink-i-1933.mp3",
"title": "Targeted Cyber-Attacks: How to Respond",
"pubdate": "20130523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/logs-paint-picture-menacing-insider-directLink-i-1929.mp3",
"title": "Logs Paint Picture of Menacing Insider",
"pubdate": "20130521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/we-expect-more-atm-cash-outs-directLink-i-1920.mp3",
"title": "Why We Can Expect More ATM Cash-Outs",
"pubdate": "20130514"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-hovering-in-cloud-directLink-i-1921.mp3",
"title": "Insider Threat Hovering in the Cloud",
"pubdate": "20130513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-arrests-a-victory-for-us-directLink-i-1919.mp3",
"title": "Fraud Arrests \"A Victory for Us\"",
"pubdate": "20130511"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avivah-litan-on-bank-cyberheist-directLink-i-1918.mp3",
"title": "Avivah Litan on Bank Cyberheist",
"pubdate": "20130510"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-insider-threat-from-cloud-directLink-i-1917.mp3",
"title": "Mitigating Insider Threat From the Cloud",
"pubdate": "20130509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/opusa-sizing-up-threat-directLink-i-1914.mp3",
"title": "OpUSA: Sizing Up the Threat",
"pubdate": "20130508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-ddos-in-risk-assessments-directLink-i-1911.mp3",
"title": "Addressing DDoS in Risk Assessments",
"pubdate": "20130503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-big-data-to-fight-phishing-directLink-i-1909.mp3",
"title": "Using Big Data to Fight Phishing",
"pubdate": "20130501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-unveils-security-privacy-controls-directLink-i-1907.mp3",
"title": "NIST Unveils Security, Privacy Controls",
"pubdate": "20130501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mandiant-on-nation-state-threats-directLink-i-1906.mp3",
"title": "Mandiant on Nation-State Threats",
"pubdate": "20130430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spamhaus-ddos-attack-called-preventable-directLink-i-1905.mp3",
"title": "Spamhaus DDoS Attack Called Preventable",
"pubdate": "20130430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/growing-global-security-community-directLink-i-1903.mp3",
"title": "Growing the Global Security Community",
"pubdate": "20130430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/240-ideas-to-secure-critical-it-directLink-i-1900.mp3",
"title": "240 Ideas to Secure Critical IT",
"pubdate": "20130429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/utah-breach-potential-costs-directLink-i-1901.mp3",
"title": "Utah Breach: The Potential Costs",
"pubdate": "20130429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-attacks-new-maturity-directLink-i-1898.mp3",
"title": "Cyber-Attacks: The New Maturity",
"pubdate": "20130425"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-skills-crisis-directLink-i-1899.mp3",
"title": "Addressing the Skills Crisis",
"pubdate": "20130425"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-era-third-party-risks-directLink-i-1895.mp3",
"title": "The New Era of Third-Party Risks",
"pubdate": "20130425"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-across-borders-directLink-i-1893.mp3",
"title": "Privacy Across Borders",
"pubdate": "20130424"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-are-no-big-deal-directLink-i-1894.mp3",
"title": "Why DDoS Attacks Are \"No Big Deal\"",
"pubdate": "20130424"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/professionalizing-security-field-directLink-i-1891.mp3",
"title": "Professionalizing the IT Security Field",
"pubdate": "20130423"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-report-ddos-broad-threat-directLink-i-1892.mp3",
"title": "Verizon Report: DDoS a Broad Threat",
"pubdate": "20130423"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enisa-aims-for-longer-stronger-role-directLink-i-1890.mp3",
"title": "ENISA Aims for Longer, Stronger Role",
"pubdate": "20130422"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boston-lockdown-business-continuity-directLink-i-1889.mp3",
"title": "Boston Lockdown: Business Continuity",
"pubdate": "20130419"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-breach-credit-monitoring-strategies-directLink-i-1884.mp3",
"title": "Post-Breach Credit Monitoring Strategies",
"pubdate": "20130418"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-new-hires-impede-future-security-directLink-i-1883.mp3",
"title": "Will New Hires Impede Future Security?",
"pubdate": "20130416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-security-new-focus-directLink-i-1882.mp3",
"title": "Medical Device Security: A New Focus",
"pubdate": "20130416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-careers-breaking-barriers-directLink-i-1880.mp3",
"title": "Security Careers: Breaking Barriers",
"pubdate": "20130410"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-data-to-cloud-reduce-risk-directLink-i-1878.mp3",
"title": "Can Moving Data to Cloud Reduce Risk?",
"pubdate": "20130409"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/spear-phishing-goes-mobile-directLink-i-1877.mp3",
"title": "Spear Phishing Goes Mobile",
"pubdate": "20130408"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bits-improving-e-mail-authentication-directLink-i-1876.mp3",
"title": "BITS: Improving E-mail Authentication",
"pubdate": "20130404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-as-chief-privacy-officer-directLink-i-1875.mp3",
"title": "CISO as Chief Privacy Officer",
"pubdate": "20130402"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/6-ways-to-reform-fisma-without-new-law-directLink-i-1872.mp3",
"title": "6 Ways to Reform FISMA Without New Law",
"pubdate": "20130401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/diplomacy-pays-off-safer-networks-directLink-i-1871.mp3",
"title": "Diplomacy Pays Off with Safer IT Networks",
"pubdate": "20130329"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/old-cyberthreats-pose-greater-dangers-directLink-i-1865.mp3",
"title": "Old Cyberthreats Pose Greater Dangers",
"pubdate": "20130327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-how-to-use-it-directLink-i-1868.mp3",
"title": "Big Data: How to Use it",
"pubdate": "20130327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/predictive-analysis-in-cyberdefense-directLink-i-1864.mp3",
"title": "Predictive Analysis in Cyberdefense",
"pubdate": "20130326"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-breaches-teach-us-directLink-i-1867.mp3",
"title": "What Breaches Can Teach Us",
"pubdate": "20130326"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-cost-failed-trust-directLink-i-1863.mp3",
"title": "What\"s the Cost of Failed Trust?",
"pubdate": "20130326"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analyzing-motive-behind-south-korean-attack-directLink-i-1862.mp3",
"title": "Analyzing Motive Behind South Korean Attack",
"pubdate": "20130322"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/venture-capitals-role-in-security-directLink-i-1859.mp3",
"title": "Venture Capital\"s Role in Security",
"pubdate": "20130318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-the-new-normal-directLink-i-1887.mp3",
"title": "DDoS: \"The New Normal\"",
"pubdate": "20130311"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-evolving-threats-solutions-directLink-i-1840.mp3",
"title": "DDoS: Evolving Threats, Solutions",
"pubdate": "20130311"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/developing-information-superiority-directLink-i-1843.mp3",
"title": "Developing Information Superiority",
"pubdate": "20130307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-phishing-attacks-are-evolving-directLink-i-1849.mp3",
"title": "How Phishing Attacks Are Evolving",
"pubdate": "20130307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-ddos-attacks-directLink-i-1845.mp3",
"title": "Evolution of DDoS Attacks",
"pubdate": "20130307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-access-control-to-managers-directLink-i-1841.mp3",
"title": "Giving Access Control to Managers",
"pubdate": "20130306"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-internal-authentication-directLink-i-1835.mp3",
"title": "Improving Internal Authentication",
"pubdate": "20130306"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-audits-status-report-directLink-i-1838.mp3",
"title": "HIPAA Audits: A Status Report",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/report-28-breaches-lead-to-fraud-directLink-i-1834.mp3",
"title": "Report: 28% of Breaches Lead to Fraud",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/formalizing-cyber-physical-security-directLink-i-1832.mp3",
"title": "Formalizing Cyber-Physical Security",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-new-perimeter-directLink-i-1842.mp3",
"title": "Data: The New Perimeter",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-attacks-remain-no-1-risk-directLink-i-1836.mp3",
"title": "Phishing Attacks Remain No. 1 Risk",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-intelligence-to-fight-apts-directLink-i-1837.mp3",
"title": "Using Intelligence to Fight APTs",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-order-private-sectors-role-directLink-i-1831.mp3",
"title": "Executive Order: Private Sector\"s Role",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-analytics-to-fight-fraud-directLink-i-1826.mp3",
"title": "Using Analytics to Fight Fraud",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-cloud-affects-authentication-directLink-i-1823.mp3",
"title": "How the Cloud Affects Authentication",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/masking-test-data-in-cloud-directLink-i-1822.mp3",
"title": "Masking Test Data in the Cloud",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-mobile-device-management-directLink-i-1818.mp3",
"title": "Beyond Mobile Device Management",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-directLink-i-1812.mp3",
"title": "Fighting Fraud",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/public-cloud-services-security-issues-directLink-i-1825.mp3",
"title": "Public Cloud Services: Security Issues",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/layered-security-for-mobile-apps-directLink-i-1824.mp3",
"title": "Layered Security for Mobile Apps",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banking-mobile-app-security-key-issues-directLink-i-1821.mp3",
"title": "Banking Mobile App Security: Key Issues",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-risk-profiling-directLink-i-1814.mp3",
"title": "Automating Risk Profiling",
"pubdate": "20130305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disrupting-ddos-directLink-i-1833.mp3",
"title": "Disrupting DDoS",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-beyond-perimeter-directLink-i-1830.mp3",
"title": "Security Beyond the Perimeter",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-securing-mobile-apps-directLink-i-1829.mp3",
"title": "Tips for Securing Mobile Apps",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apt-protecting-against-fraud-directLink-i-1828.mp3",
"title": "APT: Protecting Against Fraud",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/network-access-control-byod-directLink-i-1827.mp3",
"title": "Network Access Control and BYOD",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/simulating-cyberattacks-directLink-i-1819.mp3",
"title": "Simulating Cyberattacks",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automating-governance-directLink-i-1817.mp3",
"title": "Automating Governance",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/more-investment-needed-for-app-security-directLink-i-1816.mp3",
"title": "More Investment Needed for App Security",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-too-much-data-directLink-i-1815.mp3",
"title": "Overcoming Too Much Data",
"pubdate": "20130304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/daniel-sees-path-to-new-infosec-law-directLink-i-1806.mp3",
"title": "Daniel Sees Path to New Infosec Law",
"pubdate": "20130301"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-data-for-id-management-directLink-i-1811.mp3",
"title": "Using Data for ID Management",
"pubdate": "20130301"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciphercloud-unveils-new-offering-directLink-i-1813.mp3",
"title": "CipherCloud Unveils New Offering",
"pubdate": "20130228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/embracing-byod-trend-directLink-i-1810.mp3",
"title": "Embracing the BYOD Trend",
"pubdate": "20130228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-omnibus-compliance-plan-directLink-i-1809.mp3",
"title": "HIPAA Omnibus: A Compliance Plan",
"pubdate": "20130227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-call-center-fraud-directLink-i-1807.mp3",
"title": "Tackling Call Center Fraud",
"pubdate": "20130227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-identity-risks-directLink-i-1808.mp3",
"title": "Managing Identity Risks",
"pubdate": "20130227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/staffing-crisis-what-to-do-about-it-directLink-i-1805.mp3",
"title": "Staffing Crisis: What to Do About it",
"pubdate": "20130227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-lessons-from-patco-fraud-case-directLink-i-1803.mp3",
"title": "Legal Lessons from PATCO Fraud Case",
"pubdate": "20130225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nists-ron-ross-on-risk-mgt-framework-directLink-i-1802.mp3",
"title": "NIST\"s Ron Ross on Risk Mgt. Framework",
"pubdate": "20130223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/psychology-risk-directLink-i-1794.mp3",
"title": "The Psychology of Risk",
"pubdate": "20130221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-for-fraud-detection-directLink-i-1800.mp3",
"title": "Big Data for Fraud Detection",
"pubdate": "20130221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-to-expect-at-rsa-2013-directLink-i-1778.mp3",
"title": "What to Expect at RSA 2013",
"pubdate": "20130220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multi-channel-fraud-defense-plan-directLink-i-1799.mp3",
"title": "Multi-Channel Fraud: A Defense Plan",
"pubdate": "20130220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banks-benefit-from-new-cyber-bill-directLink-i-1798.mp3",
"title": "Why Banks Benefit from New Cyber Bill",
"pubdate": "20130220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-threats-to-mobile-workers-directLink-i-1790.mp3",
"title": "Top Threats to Mobile Workers",
"pubdate": "20130220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/threat-intelligence-in-action-directLink-i-1797.mp3",
"title": "Threat Intelligence in Action",
"pubdate": "20130220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facebook-hack-what-breach-tells-us-directLink-i-1796.mp3",
"title": "Facebook Hack: What the Breach Tells Us",
"pubdate": "20130219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/move-to-data-centric-security-directLink-i-1791.mp3",
"title": "The Move to Data-Centric Security",
"pubdate": "20130215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/examining-new-eu-cybersec-directive-directLink-i-1793.mp3",
"title": "Examining the New EU Cybersec Directive",
"pubdate": "20130215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fdic-explains-social-media-guidance-directLink-i-1789.mp3",
"title": "FDIC Explains Social Media Guidance",
"pubdate": "20130214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-lessons-learned-directLink-i-1788.mp3",
"title": "DDoS Attacks: Lessons Learned",
"pubdate": "20130213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-secure-network-directLink-i-1785.mp3",
"title": "BYOD: Secure the Network",
"pubdate": "20130212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-data-breach-response-tips-directLink-i-1775.mp3",
"title": "Health Data Breach Response Tips",
"pubdate": "20130211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-its-skills-crisis-directLink-i-1783.mp3",
"title": "Cybersecurity: It\"s a Skills Crisis",
"pubdate": "20130208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-council-issues-cloud-guidance-directLink-i-1784.mp3",
"title": "PCI Council Issues Cloud Guidance",
"pubdate": "20130207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2013-data-protection-agenda-directLink-i-1780.mp3",
"title": "2013 Data Protection Agenda",
"pubdate": "20130206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-are-attacks-really-over-directLink-i-1782.mp3",
"title": "DDoS: Are Attacks Really Over?",
"pubdate": "20130205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-omnibus-more-breach-notices-directLink-i-1779.mp3",
"title": "HIPAA Omnibus: More Breach Notices?",
"pubdate": "20130204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-data-via-containerization-directLink-i-1777.mp3",
"title": "Securing Data Via Containerization",
"pubdate": "20130201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-big-data-used-for-research-directLink-i-1773.mp3",
"title": "Protecting Big Data Used for Research",
"pubdate": "20130126"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hhs-official-explains-hipaa-omnibus-directLink-i-1772.mp3",
"title": "HHS Official Explains HIPAA Omnibus",
"pubdate": "20130125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-cloud-directLink-i-1771.mp3",
"title": "Continuous Monitoring and the Cloud",
"pubdate": "20130125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-malware-threats-2013-directLink-i-1770.mp3",
"title": "Top Malware Threats of 2013",
"pubdate": "20130124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-reveal-top-threat-worries-directLink-i-1769.mp3",
"title": "CISOs Reveal Top Threat Worries",
"pubdate": "20130123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/linking-cyber-physical-threat-data-directLink-i-1768.mp3",
"title": "Linking Cyber, Physical Threat Data",
"pubdate": "20130122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enisa-identifies-top-cyberthreats-directLink-i-1766.mp3",
"title": "ENISA Identifies Top Cyberthreats",
"pubdate": "20130122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/arguing-against-voluntary-standards-directLink-i-1767.mp3",
"title": "Arguing Against Voluntary Standards",
"pubdate": "20130121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/maturing-biometrics-on-smart-phones-directLink-i-1764.mp3",
"title": "Maturing of Biometrics on Smart Phones",
"pubdate": "20130116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolution-incident-response-directLink-i-1761.mp3",
"title": "The Evolution of Incident Response",
"pubdate": "20130114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vanroekel-on-infosec-sequestration-directLink-i-1763.mp3",
"title": "VanRoekel on Infosec and Sequestration",
"pubdate": "20130114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-10-screening-trends-for-2013-directLink-i-1760.mp3",
"title": "Top 10 Screening Trends for 2013",
"pubdate": "20130111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-2013-top-trends-directLink-i-1759.mp3",
"title": "ID Theft: 2013 Top Trends",
"pubdate": "20130110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/educational-value-competition-directLink-i-1712.mp3",
"title": "Educational Value of Competition",
"pubdate": "20130109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-authentication-challenge-directLink-i-1755.mp3",
"title": "Tackling the Authentication Challenge",
"pubdate": "20130108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tom-ridge-on-dhss-security-role-directLink-i-1757.mp3",
"title": "Tom Ridge on DHS\"s IT Security Role",
"pubdate": "20130108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/chicago-initiates-cloud-strategy-directLink-i-1754.mp3",
"title": "Chicago Initiates a Cloud Strategy",
"pubdate": "20130104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hanging-tough-intl-privacy-regs-directLink-i-1752.mp3",
"title": "Hanging Tough with Int\"l Privacy Regs",
"pubdate": "20130104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legislation-to-watch-in-2013-directLink-i-1751.mp3",
"title": "Legislation to Watch in 2013",
"pubdate": "20130103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/account-takeover-2013-outlook-directLink-i-1753.mp3",
"title": "Account Takeover: The 2013 Outlook",
"pubdate": "20130103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-say-yes-to-byod-directLink-i-1750.mp3",
"title": "How to Say \"Yes\" to BYOD",
"pubdate": "20130102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-prospects-for-new-infosec-law-directLink-i-1746.mp3",
"title": "Assessing Prospects for New InfoSec Law",
"pubdate": "20121231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012s-top-breaches-lessons-learned-directLink-i-1749.mp3",
"title": "2012\"s Top Breaches & Lessons Learned",
"pubdate": "20121227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/does-security-stall-technology-adoption-directLink-i-1747.mp3",
"title": "Does Security Stall Technology Adoption?",
"pubdate": "20121227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-address-securitys-weakest-link-directLink-i-1745.mp3",
"title": "How to Address Security\"s Weakest Link",
"pubdate": "20121224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/organizations-fail-to-encrypt-directLink-i-1740.mp3",
"title": "Why Organizations Fail to Encrypt",
"pubdate": "20121222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/langevin-treaty-stifles-internet-freedom-directLink-i-1744.mp3",
"title": "Langevin: Treaty Stifles Internet Freedom",
"pubdate": "20121221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-3-security-priorities-for-2013-directLink-i-1743.mp3",
"title": "Top 3 Security Priorities for 2013",
"pubdate": "20121221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-reasonable-security-directLink-i-1739.mp3",
"title": "What is \"Reasonable Security?\"",
"pubdate": "20121221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/its-time-for-next-gen-firewall-directLink-i-1742.mp3",
"title": "Why It\"s Time for Next-Gen Firewall",
"pubdate": "20121220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2013-mobile-security-payments-outlook-directLink-i-1741.mp3",
"title": "2013 Mobile Security, Payments Outlook",
"pubdate": "20121219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-breach-led-to-change-in-culture-directLink-i-1738.mp3",
"title": "How a Breach Led to Change in Culture",
"pubdate": "20121218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hipaa-enforcer-reveals-audit-timeline-directLink-i-1736.mp3",
"title": "HIPAA Enforcer Reveals Audit Timeline",
"pubdate": "20121215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/banks-must-brace-for-blitzkrieg-attacks-directLink-i-1735.mp3",
"title": "Banks Must Brace for \"Blitzkrieg\" Attacks",
"pubdate": "20121214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-protection-us-falls-short-directLink-i-1732.mp3",
"title": "Privacy Protection: U.S. Falls Short",
"pubdate": "20121214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-continuous-monitoring-culture-directLink-i-1733.mp3",
"title": "Creating a Continuous Monitoring Culture",
"pubdate": "20121212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-merits-hack-back-strategy-directLink-i-1729.mp3",
"title": "Legal Merits of \"Hack Back\" Strategy",
"pubdate": "20121211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/paying-more-mind-to-malicious-insider-directLink-i-1731.mp3",
"title": "Paying More Mind to Malicious Insider",
"pubdate": "20121210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-trojan-exploits-mobile-channel-directLink-i-1730.mp3",
"title": "New Trojan Exploits Mobile Channel",
"pubdate": "20121207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-vs-security-dialogue-directLink-i-1727.mp3",
"title": "Privacy vs. Security: A Dialogue",
"pubdate": "20121205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-creating-byod-policy-directLink-i-1725.mp3",
"title": "Tips for Creating a BYOD Policy",
"pubdate": "20121127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-forensics-investigation-directLink-i-1723.mp3",
"title": "Inside a Forensics Investigation",
"pubdate": "20121121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-ddos-attacks-on-israeli-sites-directLink-i-1721.mp3",
"title": "Assessing DDoS Attacks on Israeli Sites",
"pubdate": "20121120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/surviving-sandy-important-lessons-directLink-i-1722.mp3",
"title": "Surviving Sandy: Important Lessons",
"pubdate": "20121120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-4-cyberthreats-2013-directLink-i-1720.mp3",
"title": "Top 4 Cyberthreats of 2013",
"pubdate": "20121116"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/storm-offers-disaster-planning-lessons-directLink-i-1716.mp3",
"title": "Storm Offers Disaster Planning Lessons",
"pubdate": "20121113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/moving-siem-to-cloud-directLink-i-1717.mp3",
"title": "Moving SIEM to the Cloud",
"pubdate": "20121113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gathering-facts-directLink-i-1718.mp3",
"title": "Incident Response: Gathering the Facts",
"pubdate": "20121113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-reassess-your-strategy-directLink-i-1715.mp3",
"title": "Social Media: Reassess Your Strategy",
"pubdate": "20121110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-device-ids-patient-safety-directLink-i-1714.mp3",
"title": "Medical Device IDs and Patient Safety",
"pubdate": "20121109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gathering-facts-directLink-i-1713.mp3",
"title": "Incident Response: Gathering the Facts",
"pubdate": "20121109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-secure-are-wares-you-buy-directLink-i-1711.mp3",
"title": "How Secure are the IT Wares You Buy?",
"pubdate": "20121106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hies-help-in-disasters-directLink-i-1710.mp3",
"title": "HIEs: Help in Disasters?",
"pubdate": "20121102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/irene-prepares-state-to-confront-sandy-directLink-i-1708.mp3",
"title": "Irene Prepares State to Confront Sandy",
"pubdate": "20121030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/storm-prep-key-to-recovery-directLink-i-1707.mp3",
"title": "Storm Prep Key to Recovery",
"pubdate": "20121030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hurricane-sandy-triple-threat-disaster-directLink-i-1706.mp3",
"title": "Hurricane Sandy: Triple-Threat Disaster",
"pubdate": "20121030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-protecting-genomic-data-directLink-i-1704.mp3",
"title": "Insights on Protecting Genomic Data",
"pubdate": "20121026"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-first-signs-fraud-directLink-i-1705.mp3",
"title": "DDoS Attacks: First Signs of Fraud?",
"pubdate": "20121026"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breaches-small-incidents-add-up-to-greatest-losses-directLink-i-1703.mp3",
"title": "Breaches: Small Incidents Add Up to Greatest Losses",
"pubdate": "20121025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-china-detente-in-air-directLink-i-1702.mp3",
"title": "Is U.S.-China Détente in the Air?",
"pubdate": "20121025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/experts-offer-fed-infosec-governance-plan-directLink-i-1701.mp3",
"title": "Experts Offer Fed Infosec Governance Plan",
"pubdate": "20121024"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-challenge-security-risk-directLink-i-1700.mp3",
"title": "CISO\"s Challenge: Security & Risk",
"pubdate": "20121023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-use-cloud-to-repel-ddos-attacks-directLink-i-1698.mp3",
"title": "NIST: Use Cloud to Repel DDoS Attacks",
"pubdate": "20121022"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/transparency-key-after-cyberattack-directLink-i-1696.mp3",
"title": "Transparency Key after Cyberattack",
"pubdate": "20121019"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ddos-attacks-how-to-reduce-your-risks-directLink-i-1695.mp3",
"title": "DDoS Attacks: How to Reduce Your Risks",
"pubdate": "20121017"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evil-8-threats-to-mobile-computing-directLink-i-1689.mp3",
"title": "The \"Evil 8\" Threats to Mobile Computing",
"pubdate": "20121016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-assessments-expert-advice-directLink-i-1688.mp3",
"title": "Risk Assessments: Expert Advice",
"pubdate": "20121011"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-one-step-forward-one-step-back-directLink-i-1684.mp3",
"title": "Infosec: One Step Forward, One Step Back",
"pubdate": "20121009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lacking-gut-feeling-for-cybersecurity-directLink-i-1679.mp3",
"title": "Lacking a Gut Feeling for Cybersecurity",
"pubdate": "20121004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-warns-new-attacks-on-banks-directLink-i-1681.mp3",
"title": "RSA Warns of New Attacks on Banks",
"pubdate": "20121004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/windows-8-security-upgrade-directLink-i-1677.mp3",
"title": "Windows 8: A Security Upgrade?",
"pubdate": "20121004"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fine-tuning-data-breach-notification-law-directLink-i-1676.mp3",
"title": "Fine Tuning Data Breach Notification Law",
"pubdate": "20121002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/on-job-training-for-isos-directLink-i-1669.mp3",
"title": "On the Job Training for ISOs",
"pubdate": "20120928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberthreats-whats-next-directLink-i-1668.mp3",
"title": "Cyberthreats: What\"s Next?",
"pubdate": "20120928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-on-new-risk-assessment-guide-directLink-i-1666.mp3",
"title": "Ron Ross on New Risk Assessment Guide",
"pubdate": "20120927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-trust-9-million-pilots-directLink-i-1663.mp3",
"title": "Creating Trust: The $9 Million Pilots",
"pubdate": "20120924"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosecs-cheerleader-in-chief-governor-directLink-i-1661.mp3",
"title": "Infosec\"s Cheerleader-In-Chief: Governor",
"pubdate": "20120920"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-payment-guidelines-issued-directLink-i-1658.mp3",
"title": "Mobile Payment Guidelines Issued",
"pubdate": "20120918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurance-getting-started-directLink-i-1660.mp3",
"title": "Cyber Insurance: Getting Started",
"pubdate": "20120918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iphone-5-next-gen-mobile-security-directLink-i-1657.mp3",
"title": "iPhone 5 and Next-Gen Mobile Security",
"pubdate": "20120914"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-policy-one-size-doesnt-fit-all-directLink-i-1655.mp3",
"title": "Mobile Policy: One Size Doesn\"t Fit All",
"pubdate": "20120914"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-cso-reflects-on-breach-directLink-i-1656.mp3",
"title": "A State CSO Reflects on a Breach",
"pubdate": "20120913"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visas-new-end-to-end-encryption-service-directLink-i-1650.mp3",
"title": "Visa\"s New End-to-End Encryption Service",
"pubdate": "20120912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/10-tips-for-evolved-defense-directLink-i-1653.mp3",
"title": "10 Tips for Evolved Defense",
"pubdate": "20120912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-perspective-on-regulation-directLink-i-1645.mp3",
"title": "New Perspective on Regulation",
"pubdate": "20120911"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/Roel_Schouwenberg _Gauss_090712.mp3",
"title": "New Nation-State Attacks Target Banks",
"pubdate": "20120910"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/continuous-monitoring-overcome-challenges-directLink-i-1651.mp3",
"title": "Continuous Monitoring: Overcome the Challenges",
"pubdate": "20120910"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tackling-big-data-challenge-directLink-i-1647.mp3",
"title": "Tackling the Big Data Challenge",
"pubdate": "20120905"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-fraud-low-slow-approach-directLink-i-1643.mp3",
"title": "Insider Fraud: The \"Low, Slow\" Approach",
"pubdate": "20120904"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hurricane-season-are-we-prepared-directLink-i-1640.mp3",
"title": "Hurricane Season: Are We Prepared?",
"pubdate": "20120830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rethinking-security-best-practices-directLink-i-1636.mp3",
"title": "Rethinking Security Best Practices",
"pubdate": "20120828"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/apple-samsung-case-lessons-for-cisos-directLink-i-1637.mp3",
"title": "Apple-Samsung Case: Lessons for CISOs",
"pubdate": "20120828"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-messaging-risks-directLink-i-1635.mp3",
"title": "Mitigating Messaging Risks",
"pubdate": "20120827"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-cloud-facilitate-risk-management-directLink-i-1634.mp3",
"title": "How Cloud Can Facilitate Risk Management",
"pubdate": "20120824"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-lines-cyberdefense-directLink-i-1631.mp3",
"title": "3 Lines of Cyberdefense",
"pubdate": "20120823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wisconsin-hie-favors-hybrid-data-model-directLink-i-1630.mp3",
"title": "Wisconsin HIE Favors Hybrid Data Model",
"pubdate": "20120820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/onc-plans-mobile-security-guidance-directLink-i-1629.mp3",
"title": "ONC Plans Mobile Security Guidance",
"pubdate": "20120817"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-hackers-take-aim-at-us-banks-directLink-i-1628.mp3",
"title": "Global Hackers Take Aim at U.S. Banks",
"pubdate": "20120816"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-new-approach-to-merchant-security-directLink-i-1626.mp3",
"title": "PCI: New Approach to Merchant Security",
"pubdate": "20120815"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-assurance-job-market-soars-directLink-i-1162.mp3",
"title": "Information Assurance Job Market Soars",
"pubdate": "20120815"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-talk-security-to-board-directors-directLink-i-1625.mp3",
"title": "How to Talk Security to the Board of Directors",
"pubdate": "20120814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ftcs-google-fine-privacy-message-directLink-i-1623.mp3",
"title": "FTC\"s Google Fine: The Privacy Message",
"pubdate": "20120811"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-us-attorneys-war-on-cyberfraud-directLink-i-1622.mp3",
"title": "One U.S. Attorney\"s War on Cyberfraud",
"pubdate": "20120810"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thinking-smartly-about-cloud-computing-directLink-i-1619.mp3",
"title": "Thinking Smartly About Cloud Computing",
"pubdate": "20120809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-pros-cons-directLink-i-1620.mp3",
"title": "Social Media: Pros & Cons",
"pubdate": "20120807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-grid-too-reliable-for-own-good-directLink-i-1617.mp3",
"title": "Power Grid Too Reliable for Own Good?",
"pubdate": "20120806"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/symantecs-ciso-on-security-leadership-directLink-i-1615.mp3",
"title": "Symantec\"s CISO on Security Leadership",
"pubdate": "20120803"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-act-fails-what-next-directLink-i-1616.mp3",
"title": "Cybersecurity Act Fails; What Next?",
"pubdate": "20120803"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-do-track-debate-directLink-i-1612.mp3",
"title": "Privacy: \"Do Not Track\" Debate",
"pubdate": "20120731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eddie-schwartz-on-his-year-as-rsas-ciso-directLink-i-1608.mp3",
"title": "Eddie Schwartz on His Year as RSA\"s CISO",
"pubdate": "20120723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-update-no-brand-safe-directLink-i-1609.mp3",
"title": "Phishing Update: \"No Brand is Safe\"",
"pubdate": "20120723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cobit-5-for-security-what-you-need-to-know-directLink-i-1590.mp3",
"title": "COBIT 5 for Security: What You Need to Know",
"pubdate": "20120723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-breach-planning-fails-directLink-i-1606.mp3",
"title": "When Breach Planning Fails",
"pubdate": "20120720"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-success-requires-collaboration-directLink-i-1605.mp3",
"title": "CISO Success Requires Collaboration",
"pubdate": "20120719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/smart-grids-unique-security-challenge-directLink-i-1603.mp3",
"title": "Smart Grid\"s Unique Security Challenge",
"pubdate": "20120718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-california-isos-up-to-snuff-directLink-i-1602.mp3",
"title": "Getting California ISOs Up to Snuff",
"pubdate": "20120717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breached-organizations-are-tight-lipped-directLink-i-1601.mp3",
"title": "Breached Organizations Are Tight-Lipped",
"pubdate": "20120717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-all-that-security-directLink-i-1599.mp3",
"title": "Managing All That Security",
"pubdate": "20120717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/evolving-role-id-access-management-directLink-i-1593.mp3",
"title": "Evolving Role of ID, Access Management",
"pubdate": "20120709"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zeus-how-to-fight-back-directLink-i-1592.mp3",
"title": "Zeus: How to Fight Back",
"pubdate": "20120706"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bargain-hunting-raises-infosec-awareness-directLink-i-1587.mp3",
"title": "Bargain Hunting Raises Infosec Awareness",
"pubdate": "20120628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-exists-to-refocus-infosec-skills-directLink-i-1585.mp3",
"title": "Need Exists to Refocus Infosec Skills",
"pubdate": "20120626"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protection-from-online-risks-directLink-i-1581.mp3",
"title": "Protection from Online Risks",
"pubdate": "20120620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-wares-need-to-id-unknown-threats-directLink-i-1583.mp3",
"title": "Infosec Wares Need to ID Unknown Threats",
"pubdate": "20120620"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-risk-to-fund-infosec-projects-directLink-i-1579.mp3",
"title": "Using Risk to Fund Infosec Projects",
"pubdate": "20120614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wireless-monitoring-risks-benefits-directLink-i-1578.mp3",
"title": "Wireless Monitoring: Risks, Benefits",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-challenge-directLink-i-1968.mp3",
"title": "The BYOD Challenge",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-mobile-risks-directLink-i-1967.mp3",
"title": "Mitigating Mobile Risks",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-identity-access-management-directLink-i-1966.mp3",
"title": "Improving Identity and Access Management",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-business-driven-iam-to-improve-security-directLink-i-1965.mp3",
"title": "Using Business-Driven IAM to Improve Security",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-cloud-in-government-directLink-i-1964.mp3",
"title": "Addressing Cloud in Government",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-byod-advice-directLink-i-1963.mp3",
"title": "Getting BYOD Advice",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mitigating-advanced-cyber-attacks-directLink-i-1962.mp3",
"title": "Mitigating Advanced Cyber-Attacks",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-address-byod-directLink-i-1961.mp3",
"title": "How to Address BYOD",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-risk-concerns-directLink-i-1960.mp3",
"title": "Top Risk Concerns",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-mobile-to-authenticate-directLink-i-1959.mp3",
"title": "Using Mobile to Authenticate",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/move-to-data-centric-security-directLink-i-1958.mp3",
"title": "The Move to Data-Centric Security",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rise-in-encryption-directLink-i-1957.mp3",
"title": "A Rise in Encryption?",
"pubdate": "20120613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/big-data-its-about-size-directLink-i-1576.mp3",
"title": "Big Data: It\"s Not About Size",
"pubdate": "20120612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-linkedin-breach-directLink-i-1577.mp3",
"title": "Lessons from LinkedIn Breach",
"pubdate": "20120612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-malware-intel-sharing-system-directLink-i-1575.mp3",
"title": "Creating a Malware Intel Sharing System",
"pubdate": "20120612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/employing-cybersecurity-index-as-metric-directLink-i-1567.mp3",
"title": "Employing Cybersecurity Index as a Metric",
"pubdate": "20120604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/five-application-security-tips-directLink-i-1571.mp3",
"title": "Five Application Security Tips",
"pubdate": "20120530"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-electronically-stored-info-directLink-i-1570.mp3",
"title": "Understanding Electronically Stored Info",
"pubdate": "20120529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/boards-directors-dont-get-it-directLink-i-1569.mp3",
"title": "Why Boards of Directors Don\"t Get It",
"pubdate": "20120524"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-respond-to-hacktivism-directLink-i-1568.mp3",
"title": "How to Respond to Hacktivism",
"pubdate": "20120523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intelligent-defense-against-intruders-directLink-i-1565.mp3",
"title": "Intelligent Defense Against Intruders",
"pubdate": "20120523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/matching-personalities-to-jobs-directLink-i-1562.mp3",
"title": "Matching Personalities to Jobs",
"pubdate": "20120518"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risks-false-credentials-directLink-i-1561.mp3",
"title": "Risks of False Credentials",
"pubdate": "20120514"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-breach-investigations-directLink-i-1560.mp3",
"title": "Improving Breach Investigations",
"pubdate": "20120511"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-spot-fraudster-directLink-i-1558.mp3",
"title": "How to Spot a Fraudster",
"pubdate": "20120509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/americans-less-jittery-about-net-security-directLink-i-1559.mp3",
"title": "Americans Less Jittery About Net Security",
"pubdate": "20120509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-characteristics-influential-cisos-directLink-i-1555.mp3",
"title": "Key Characteristics of Influential CISOs",
"pubdate": "20120507"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/its-war-for-talent-directLink-i-1553.mp3",
"title": "\"It\"s a War for Talent\"",
"pubdate": "20120504"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-engineering-next-generation-directLink-i-1554.mp3",
"title": "Social Engineering: The Next Generation",
"pubdate": "20120504"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/teaming-up-to-fight-ach-fraud-directLink-i-1552.mp3",
"title": "Teaming Up to Fight ACH Fraud",
"pubdate": "20120502"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anti-fraud-evolution-directLink-i-1546.mp3",
"title": "The Anti-Fraud Evolution",
"pubdate": "20120427"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-bc-standard-an-end-to-uncertainty-directLink-i-1547.mp3",
"title": "New BC Standard: \"An End to Uncertainty\"",
"pubdate": "20120425"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identifying-undetected-breaches-directLink-i-1542.mp3",
"title": "Identifying Undetected Breaches",
"pubdate": "20120421"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-fighting-how-to-engage-customer-directLink-i-1534.mp3",
"title": "Fraud Fighting: How to Engage the Customer",
"pubdate": "20120420"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prospects-iffy-for-cybersecurity-bills-directLink-i-1541.mp3",
"title": "Prospects Iffy for Cybersecurity Bills",
"pubdate": "20120420"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-costs-for-government-could-rise-directLink-i-1535.mp3",
"title": "Cloud Costs for Government Could Rise",
"pubdate": "20120417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/post-breach-pr-lessons-learned-directLink-i-1536.mp3",
"title": "Post-Breach PR: Lessons Learned",
"pubdate": "20120417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartland-ceo-on-breach-response-directLink-i-1531.mp3",
"title": "Heartland CEO on Breach Response",
"pubdate": "20120416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/6-steps-to-secure-big-data-directLink-i-1529.mp3",
"title": "6 Steps to Secure Big Data",
"pubdate": "20120413"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-gaps-directLink-i-1528.mp3",
"title": "Incident Response: The Gaps",
"pubdate": "20120413"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012-faces-fraud-first-look-directLink-i-1524.mp3",
"title": "2012 Faces of Fraud: First Look",
"pubdate": "20120412"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-changing-corporate-culture-directLink-i-1526.mp3",
"title": "Privacy: Changing a Corporate Culture",
"pubdate": "20120411"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-education-for-senior-execs-directLink-i-1509.mp3",
"title": "Security Education for Senior Execs",
"pubdate": "20120406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/using-big-data-to-identify-anomalies-directLink-i-1515.mp3",
"title": "Using Big Data to Identify Anomalies",
"pubdate": "20120406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/selecting-breach-resolution-vendor-directLink-i-1518.mp3",
"title": "Selecting a Breach Resolution Vendor",
"pubdate": "20120404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-litan-on-global-payments-breach-directLink-i-1516.mp3",
"title": "Gartner\"s Litan on Global Payments Breach",
"pubdate": "20120403"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assuring-security-ipv6-directLink-i-1512.mp3",
"title": "Assuring the Security of IPv6",
"pubdate": "20120403"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-decides-how-to-allot-infosec-funds-directLink-i-1508.mp3",
"title": "Who Decides How to Allot Infosec Funds?",
"pubdate": "20120331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-device-management-tips-directLink-i-1507.mp3",
"title": "Mobile Device Management Tips",
"pubdate": "20120329"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/designing-privacy-into-online-products-directLink-i-1506.mp3",
"title": "Designing Privacy into Online Products",
"pubdate": "20120328"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cost-data-breach-directLink-i-1502.mp3",
"title": "The Cost of a Data Breach",
"pubdate": "20120323"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/verizon-hacktivists-1-breach-threat-directLink-i-1501.mp3",
"title": "Verizon: Hacktivists #1 Breach Threat",
"pubdate": "20120322"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/redefining-securitys-core-tenets-directLink-i-1498.mp3",
"title": "Redefining IT Security\"s Core Tenets",
"pubdate": "20120317"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/avoiding-pitfalls-cloud-contract-directLink-i-1497.mp3",
"title": "Avoiding Pitfalls of the Cloud Contract",
"pubdate": "20120315"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-new-ipad-be-blast-from-past-directLink-i-1495.mp3",
"title": "How New iPad Can Be Blast from the Past",
"pubdate": "20120312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ipad3-4g-nudges-byod-directLink-i-1490.mp3",
"title": "iPad3 4G Nudges BYOD",
"pubdate": "20120309"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dissecting-hacktivist-attack-directLink-i-1446.mp3",
"title": "Dissecting a Hacktivist Attack",
"pubdate": "20120306"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/deferring-to-business-on-cybersecurity-directLink-i-1444.mp3",
"title": "Deferring to Business on Cybersecurity",
"pubdate": "20120305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breaches-top-trends-directLink-i-1433.mp3",
"title": "Breaches: The Top Trends",
"pubdate": "20120302"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/schmidt-hopeful-on-bills-passage-directLink-i-1422.mp3",
"title": "Schmidt Hopeful on Bill\"s Passage",
"pubdate": "20120301"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/framework-for-vulnerability-reports-directLink-i-1412.mp3",
"title": "A Framework for Vulnerability Reports",
"pubdate": "20120229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-attacks-if-or-when-but-now-directLink-i-1409.mp3",
"title": "Cyber Attacks: Not If or When, But Now",
"pubdate": "20120228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fewer-than-150-hipaa-audits-expected-directLink-i-1407.mp3",
"title": "Fewer Than 150 HIPAA Audits Expected",
"pubdate": "20120227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/scholarship-for-service-program-grows-directLink-i-1406.mp3",
"title": "Scholarship for Service Program Grows",
"pubdate": "20120227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-bill-rights-be-all-end-all-directLink-i-1405.mp3",
"title": "Privacy Bill of Rights: Not Be-All, End-All",
"pubdate": "20120224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-to-expect-at-rsa-conference-directLink-i-1404.mp3",
"title": "What to Expect at RSA Conference",
"pubdate": "20120223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-security-enabling-byod-directLink-i-1399.mp3",
"title": "Mobile Security: Enabling BYOD",
"pubdate": "20120222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/book-on-insider-threats-directLink-i-1396.mp3",
"title": "The Book on Insider Threats",
"pubdate": "20120222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/putting-to-rest-rsa-key-security-worries-directLink-i-1395.mp3",
"title": "Putting to Rest RSA Key Security Worries",
"pubdate": "20120221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ciso-challenge-directLink-i-1393.mp3",
"title": "The CISO Challenge",
"pubdate": "20120218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-initiate-forensic-probe-directLink-i-1382.mp3",
"title": "Breach Response: Initiate Forensic Probe",
"pubdate": "20120217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-fight-how-to-pick-your-battles-directLink-i-1385.mp3",
"title": "Fraud Fight: How to Pick Your Battles",
"pubdate": "20120216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-latest-threats-directLink-i-1384.mp3",
"title": "Fraud: The Latest Threats",
"pubdate": "20120216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-to-unveil-controls-guidance-at-rsa-directLink-i-1383.mp3",
"title": "NIST to Unveil Controls Guidance at RSA",
"pubdate": "20120216"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-latest-threats-directLink-i-1379.mp3",
"title": "Fraud: The Latest Threats",
"pubdate": "20120215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/7-steps-to-building-security-program-directLink-i-1375.mp3",
"title": "7 Steps to Building a Security Program",
"pubdate": "20120210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-officer-in-hot-seat-directLink-i-1372.mp3",
"title": "Privacy Officer in the Hot Seat",
"pubdate": "20120208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/after-breach-3-lessons-directLink-i-1368.mp3",
"title": "After a Breach: 3 Lessons",
"pubdate": "20120201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/elements-social-media-policy-directLink-i-1359.mp3",
"title": "Elements of a Social Media Policy",
"pubdate": "20120123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/are-anti-piracy-laws-really-needed-directLink-i-1356.mp3",
"title": "Are Anti-Piracy Laws Really Needed?",
"pubdate": "20120121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/visa-on-emv-in-us-directLink-i-1354.mp3",
"title": "Visa on EMV in the U.S.",
"pubdate": "20120120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-resolution-8-lessons-learned-directLink-i-1351.mp3",
"title": "Breach Resolution: 8 Lessons Learned",
"pubdate": "20120119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-identify-insider-threat-directLink-i-1348.mp3",
"title": "How to Identify the Insider Threat",
"pubdate": "20120118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-for-encrypting-mobile-devices-directLink-i-1340.mp3",
"title": "Tips for Encrypting Mobile Devices",
"pubdate": "20120112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tablets-seen-mitigating-security-risks-directLink-i-1339.mp3",
"title": "Tablets Seen Mitigating Security Risks",
"pubdate": "20120110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insource-forensics-directLink-i-1336.mp3",
"title": "Why Insource Forensics?",
"pubdate": "20120109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/automation-dash-humanity-directLink-i-1325.mp3",
"title": "Automation with a Dash of Humanity",
"pubdate": "20120104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012-government-strategy-guide-to-defending-against-cyber-attacks-directLink-i-1254.mp3",
"title": "2012 Government Strategy Guide to Defending Against Cyber-Attacks",
"pubdate": "20120102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-tech-trends-for-2012-directLink-i-1329.mp3",
"title": "Top Tech Trends for 2012",
"pubdate": "20111230"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-manage-risks-directLink-i-1327.mp3",
"title": "BYOD: Manage the Risks",
"pubdate": "20111229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/complexity-major-info-risk-challenge-directLink-i-1324.mp3",
"title": "Complexity Is Major Info Risk Challenge",
"pubdate": "20111229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compliance-cant-create-security-directLink-i-1326.mp3",
"title": "Why Compliance Can\"t Create Security",
"pubdate": "20111227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2012-fraud-fighting-agenda-directLink-i-1322.mp3",
"title": "2012 Fraud-Fighting Agenda",
"pubdate": "20111220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-vs-info-risk-management-directLink-i-1267.mp3",
"title": "IT Security Vs. Info Risk Management",
"pubdate": "20111219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hannaford-breach-ruling-what-means-directLink-i-1321.mp3",
"title": "Hannaford Breach Ruling: What it Means",
"pubdate": "20111217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-awareness-what-do-ceos-need-to-know-directLink-i-1261.mp3",
"title": "Risk Awareness: What Do CEOs Need to Know?",
"pubdate": "20111215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disaster-recovery-supply-chain-at-risk-directLink-i-1319.mp3",
"title": "Disaster Recovery: Supply Chain at Risk",
"pubdate": "20111215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ahima-ceo-tackles-privacy-challenges-directLink-i-1318.mp3",
"title": "AHIMA CEO Tackles Privacy Challenges",
"pubdate": "20111214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-planning-tips-directLink-i-1314.mp3",
"title": "Breach Notification Planning Tips",
"pubdate": "20111208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/making-web-applications-secure-directLink-i-1312.mp3",
"title": "Making Web Applications Secure",
"pubdate": "20111208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pace-charters-new-cyber-institute-directLink-i-1313.mp3",
"title": "Pace Charters New Cyber Institute",
"pubdate": "20111208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/organizing-breach-notification-team-directLink-i-1301.mp3",
"title": "Organizing a Breach Notification Team",
"pubdate": "20111205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/toolkit-helps-risk-assessments-directLink-i-1308.mp3",
"title": "Toolkit Helps With Risk Assessments",
"pubdate": "20111202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-response-reputational-risk-directLink-i-1302.mp3",
"title": "Breach Response: Reputational Risk",
"pubdate": "20111130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-security-education-directLink-i-1300.mp3",
"title": "The State of Security Education",
"pubdate": "20111129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-legislation-next-generation-directLink-i-1273.mp3",
"title": "Breach Legislation: The Next Generation",
"pubdate": "20111129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ip-protection-bills-threaten-internet-directLink-i-1299.mp3",
"title": "IP Protection Bills Threaten Internet",
"pubdate": "20111128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-priority-for-2012-directLink-i-1297.mp3",
"title": "Breach Notification Priority for 2012",
"pubdate": "20111128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/influencing-policy-if-law-directLink-i-1295.mp3",
"title": "Influencing Policy, If Not the Law",
"pubdate": "20111123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/firewalls-next-generation-directLink-i-1072.mp3",
"title": "Firewalls: The Next Generation",
"pubdate": "20111117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identifying-infosec-jobs-skills-tasks-directLink-i-1293.mp3",
"title": "Identifying Infosec Jobs, Skills, Tasks",
"pubdate": "20111115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/byod-corporate-policy-directLink-i-1292.mp3",
"title": "BYOD and Corporate Policy",
"pubdate": "20111115"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/community-service-how-to-give-back-directLink-i-1289.mp3",
"title": "Community Service: How to Give Back",
"pubdate": "20111109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/web-apps-top-vulnerabilities-directLink-i-1286.mp3",
"title": "Web Apps: The Top Vulnerabilities",
"pubdate": "20111103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-intel-employs-risk-approach-directLink-i-1285.mp3",
"title": "Cyber Intel Employs Risk Approach",
"pubdate": "20111102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-physical-security-synergized-directLink-i-1283.mp3",
"title": "Digital, Physical Security Synergized",
"pubdate": "20111101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-how-to-help-consumers-directLink-i-1282.mp3",
"title": "ID Theft: How to Help Consumers",
"pubdate": "20111031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/NACS_Part2_102711.mp3",
"title": "Fighting Fraud: Banks, Merchants Must Align",
"pubdate": "20111028"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vas-plan-for-mobile-device-security-directLink-i-1272.mp3",
"title": "VA\"s Plan for Mobile Device Security",
"pubdate": "20111020"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-audits-increase-infosec-budgets-directLink-i-1268.mp3",
"title": "How Audits Can Increase Infosec Budgets",
"pubdate": "20111019"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blackberry-episode-strikes-at-security-tenet-directLink-i-1265.mp3",
"title": "BlackBerry Episode Strikes at IT Security Tenet",
"pubdate": "20111014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/app-sec-pro-shark-directLink-i-1263.mp3",
"title": "The App Sec Pro and the Shark",
"pubdate": "20111013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/barriers-stunting-cloud-adoption-directLink-i-1260.mp3",
"title": "Barriers Stunting Cloud Adoption",
"pubdate": "20111007"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-computing-compliance-challenges-directLink-i-1259.mp3",
"title": "Cloud Computing: Compliance Challenges",
"pubdate": "20111005"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/interview-new-hipaa-enforcer-directLink-i-1258.mp3",
"title": "Interview: The New HIPAA Enforcer",
"pubdate": "20111003"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-what-were-missing-directLink-i-1256.mp3",
"title": "Business Continuity: What We\"re Missing",
"pubdate": "20111003"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/7-steps-to-secure-mobile-devices-directLink-i-1255.mp3",
"title": "7 Steps to Secure Mobile Devices",
"pubdate": "20110930"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-merchants-still-fall-short-directLink-i-1252.mp3",
"title": "PCI: Merchants Still Fall Short",
"pubdate": "20110928"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taking-charge-physical-security-directLink-i-1251.mp3",
"title": "Taking Charge of Physical, IT Security",
"pubdate": "20110926"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-are-security-risks-overblown-directLink-i-1249.mp3",
"title": "Mobile: Are Security Risks Overblown?",
"pubdate": "20110923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dodd-frank-what-to-expect-in-2012-directLink-i-1248.mp3",
"title": "Dodd-Frank: What to Expect in 2012",
"pubdate": "20110922"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-approach-to-security-directLink-i-1244.mp3",
"title": "A New Approach to IT Security",
"pubdate": "20110914"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hurricane-irene-offers-lessons-directLink-i-1242.mp3",
"title": "Hurricane Irene Offers Lessons",
"pubdate": "20110912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/911-global-perspective-directLink-i-1241.mp3",
"title": "9/11: The Global Perspective",
"pubdate": "20110909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-in-post-911-world-directLink-i-1240.mp3",
"title": "Security in a Post-9/11 World",
"pubdate": "20110909"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shifting-course-on-infosec-post-911-directLink-i-1239.mp3",
"title": "Shifting Course on Infosec Post-9/11",
"pubdate": "20110908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-sept-11-directLink-i-1238.mp3",
"title": "Lessons of Sept. 11",
"pubdate": "20110907"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-training-key-directLink-i-1237.mp3",
"title": "Social Media: Why Training Is Key",
"pubdate": "20110903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/power-next-generation-firewall-directLink-i-1235.mp3",
"title": "The Power of the Next Generation Firewall",
"pubdate": "20110901"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/it-security-careers-remain-hot-directLink-i-1233.mp3",
"title": "Why IT Security Careers Remain Hot",
"pubdate": "20110830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facial-biometrics-pose-privacy-woes-directLink-i-1231.mp3",
"title": "Facial Biometrics Pose Privacy Woes",
"pubdate": "20110829"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/offering-helping-hand-to-agencies-directLink-i-1229.mp3",
"title": "Offering a Helping Hand to Agencies",
"pubdate": "20110826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-a-serious-problem-directLink-i-1228.mp3",
"title": "Fraud: \"A Serious Problem\"",
"pubdate": "20110826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-in-decentralized-environment-directLink-i-1223.mp3",
"title": "Infosec in a Decentralized Environment",
"pubdate": "20110823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-new-tokenization-guidance-issued-directLink-i-1218.mp3",
"title": "PCI: New Tokenization Guidance Issued",
"pubdate": "20110812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-ideas-for-securing-web-directLink-i-1217.mp3",
"title": "New Ideas for Securing the Web",
"pubdate": "20110812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-ag-extension-agent-for-cyber-directLink-i-1216.mp3",
"title": "Creating Ag Extension Agent for Cyber",
"pubdate": "20110810"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-culture-security-directLink-i-1214.mp3",
"title": "Creating a Culture of Security",
"pubdate": "20110809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-cloud-directLink-i-1211.mp3",
"title": "Securing the Cloud",
"pubdate": "20110805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-fraud-investigation-directLink-i-1207.mp3",
"title": "Inside a Fraud Investigation",
"pubdate": "20110803"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-computing-critical-issues-directLink-i-1208.mp3",
"title": "Cloud Computing: Critical Issues",
"pubdate": "20110802"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/value-penetration-testing-directLink-i-1205.mp3",
"title": "The Value of Penetration Testing",
"pubdate": "20110801"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/easing-burden-to-comply-irs-rules-directLink-i-1202.mp3",
"title": "Easing Burden to Comply with IRS Rules",
"pubdate": "20110728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-trustable-identities-directLink-i-1180.mp3",
"title": "The ROI of Trustable Identities",
"pubdate": "20110727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-normal-under-attack-directLink-i-1201.mp3",
"title": "New Normal: Under Attack",
"pubdate": "20110727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/forensics-in-cloud-directLink-i-1200.mp3",
"title": "Forensics in the Cloud",
"pubdate": "20110727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ethics-information-security-directLink-i-1199.mp3",
"title": "The Ethics of Information Security",
"pubdate": "20110725"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-new-frontier-directLink-i-1198.mp3",
"title": "Cybersecurity: The New Frontier",
"pubdate": "20110725"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-on-nists-new-privacy-controls-directLink-i-1196.mp3",
"title": "Ron Ross on NIST\"s New Privacy Controls",
"pubdate": "20110722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/elements-social-media-policy-directLink-i-1194.mp3",
"title": "Elements of a Social Media Policy",
"pubdate": "20110719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bringing-risk-assessment-in-house-directLink-i-1188.mp3",
"title": "Bringing Risk Assessment In-House",
"pubdate": "20110718"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-cso-tells-he-took-job-directLink-i-1187.mp3",
"title": "RSA\"s CSO Tells Why He Took the Job",
"pubdate": "20110712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-roles-in-risk-management-directLink-i-1185.mp3",
"title": "New Roles in Risk Management",
"pubdate": "20110711"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shutdown-takes-toll-on-infosec-pros-directLink-i-1184.mp3",
"title": "Shutdown Takes Toll on Infosec Pros",
"pubdate": "20110708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/biometrics-seen-as-securid-alternative-directLink-i-1182.mp3",
"title": "Biometrics Seen as SecurID Alternative",
"pubdate": "20110707"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-fighters-wanted-directLink-i-1177.mp3",
"title": "Fraud Fighters Wanted",
"pubdate": "20110705"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsas-post-breach-security-directLink-i-1178.mp3",
"title": "RSA\"s Post-Breach Security",
"pubdate": "20110701"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-associates-minimizing-risk-directLink-i-1173.mp3",
"title": "Business Associates: Minimizing Risk",
"pubdate": "20110629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govt-shutdown-poses-unseen-challenges-directLink-i-1174.mp3",
"title": "Gov\"t Shutdown Poses Unseen Challenges",
"pubdate": "20110629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-by-redesign-new-concept-directLink-i-1171.mp3",
"title": "Privacy by Redesign: A New Concept",
"pubdate": "20110628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/executive-decision-what-to-encrypt-directLink-i-1170.mp3",
"title": "Executive Decision: What to Encrypt",
"pubdate": "20110628"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-bits-supports-obama-bill-directLink-i-1169.mp3",
"title": "Cybersecurity: BITS Supports Obama Bill",
"pubdate": "20110627"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compelling-compliance-via-regulations-directLink-i-1167.mp3",
"title": "Compelling Compliance Via Regulations",
"pubdate": "20110623"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-rd-initiatives-focus-on-infosec-directLink-i-1165.mp3",
"title": "4 R&D Initiatives Focus on Infosec",
"pubdate": "20110621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/va-addresses-medical-device-security-directLink-i-1163.mp3",
"title": "VA Addresses Medical Device Security",
"pubdate": "20110621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fdic-on-disaster-recovery-directLink-i-1158.mp3",
"title": "FDIC on Disaster Recovery",
"pubdate": "20110614"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-token-replacement-smart-directLink-i-1154.mp3",
"title": "RSA Breach: Token Replacement is \"Smart\"",
"pubdate": "20110608"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-devices-risks-rewards-directLink-i-1152.mp3",
"title": "Mobile Devices - Risks & Rewards",
"pubdate": "20110603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-index-measures-cyberspace-safety-directLink-i-1148.mp3",
"title": "New Index Measures Cyberspace Safety",
"pubdate": "20110602"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/author-describes-disclosures-rule-directLink-i-1150.mp3",
"title": "Author Describes Disclosures Rule",
"pubdate": "20110601"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/public-health-serves-as-cybersec-model-directLink-i-1147.mp3",
"title": "Public Health Serves as Cybersec Model",
"pubdate": "20110531"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-software-industry-perspective-directLink-i-1137.mp3",
"title": "Securing the Software: An Industry Perspective",
"pubdate": "20110531"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/we-need-ethical-hacking-directLink-i-1145.mp3",
"title": "Why We Need Ethical Hacking",
"pubdate": "20110527"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pressure-on-privacy-pros-directLink-i-1144.mp3",
"title": "Pressure is on Privacy Pros",
"pubdate": "20110526"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-mobile-technology-concerns-me-directLink-i-1141.mp3",
"title": "Privacy: \\\"Mobile Technology Concerns Me\\\"",
"pubdate": "20110523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-you-cant-prepare-enough-directLink-i-1140.mp3",
"title": "Privacy: \\\"You Can\"t Prepare Enough\\\"",
"pubdate": "20110523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-breaking-silos-directLink-i-1139.mp3",
"title": "Business Continuity: Breaking the Silos",
"pubdate": "20110520"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/us-initiates-cybersecurity-diplomacy-directLink-i-1138.mp3",
"title": "U.S. Initiates Cybersecurity Diplomacy",
"pubdate": "20110520"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-information-exchange-success-strategies-directLink-i-959.mp3",
"title": "Health Information Exchange Success Strategies",
"pubdate": "20110516"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/congressman-sees-obama-plan-as-start-directLink-i-1133.mp3",
"title": "Congressman Sees Obama Plan as a Start",
"pubdate": "20110513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disaster-recovery-cross-training-key-directLink-i-1131.mp3",
"title": "Disaster Recovery: Cross-Training Key",
"pubdate": "20110512"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/survey-analysis-securing-cloud-directLink-i-1122.mp3",
"title": "Survey Analysis: Securing the Cloud",
"pubdate": "20110512"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-minimizing-risks-directLink-i-1127.mp3",
"title": "Social Media: Minimizing Risks",
"pubdate": "20110509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-e-government-initiatives-directLink-i-1118.mp3",
"title": "Protecting E-Government Initiatives",
"pubdate": "20110509"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/public-jitters-over-security-on-rise-directLink-i-1125.mp3",
"title": "Public Jitters Over IT Security on Rise",
"pubdate": "20110506"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/limited-government-path-to-nstic-directLink-i-1124.mp3",
"title": "Limited Government: Path to NSTIC",
"pubdate": "20110504"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-cloud-security-standards-directLink-i-1121.mp3",
"title": "The Case for Cloud Security Standards",
"pubdate": "20110503"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-must-care-about-sony-breach-directLink-i-1120.mp3",
"title": "Why CISOs Must Care About Sony Breach",
"pubdate": "20110502"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-editors-choicefor-april-2011-directLink-i-1114.mp3",
"title": "GovInfoSecurity.com
Editor\"s Choice
for April 2011",
"pubdate": "20110430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-fed-health-chief-ids-priorities-directLink-i-1112.mp3",
"title": "New Fed Health IT Chief IDs Priorities",
"pubdate": "20110428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-testing-comes-age-directLink-i-1110.mp3",
"title": "Security Testing Comes of Age",
"pubdate": "20110427"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hidden-files-on-iphone-pose-risk-directLink-i-1107.mp3",
"title": "Hidden Files on iPhone Pose Risk",
"pubdate": "20110424"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-reviewfor-friday-april-22-2011-directLink-i-1104.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, April 22, 2011",
"pubdate": "20110423"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/durbins-impact-on-fraud-directLink-i-1101.mp3",
"title": "Durbin\"s Impact on Fraud",
"pubdate": "20110422"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/governance-its-all-about-risk-directLink-i-1099.mp3",
"title": "Governance: It\"s All About Risk",
"pubdate": "20110422"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breaches-inside-2011-verizon-report-directLink-i-1096.mp3",
"title": "Data Breaches: Inside the 2011 Verizon Report",
"pubdate": "20110419"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-april-15-2011-directLink-i-1093.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, April 15, 2011",
"pubdate": "20110416"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/danger-seen-in-slashing-infosec-spend-directLink-i-1088.mp3",
"title": "Danger Seen In Slashing Infosec Spend",
"pubdate": "20110414"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/phishing-season-how-to-avoid-fraud-directLink-i-1086.mp3",
"title": "Phishing Season: How to Avoid Fraud",
"pubdate": "20110412"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfossecuritycomweek-in-reviewfor-friday-april-8-2011-directLink-i-1083.mp3",
"title": "GovInfosSecurity.com
Week In Review
for Friday, April 8, 2011",
"pubdate": "20110409"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reitingers-quest-build-safer-internet-directLink-i-1079.mp3",
"title": "Reitinger\"s Quest: Build a Safer Internet",
"pubdate": "20110407"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/epsilon-breach-time-to-come-clean-directLink-i-1080.mp3",
"title": "Epsilon Breach: Time to \"Come Clean\"",
"pubdate": "20110406"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/epsilon-breach-risks-lessons-directLink-i-1077.mp3",
"title": "Epsilon Breach: Risks and Lessons",
"pubdate": "20110405"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-challenge-for-state-governments-directLink-i-1069.mp3",
"title": "The Authentication Challenge for State Governments",
"pubdate": "20110404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycomeditors-choice-for-march-2011-directLink-i-1073.mp3",
"title": "GovInfoSecurity.com
Editor\"s Choice
for March 2011",
"pubdate": "20110402"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-emerging-global-threats-directLink-i-1070.mp3",
"title": "Fraud: Emerging Global Threats",
"pubdate": "20110401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/senate-vote-seen-on-security-bill-directLink-i-1068.mp3",
"title": "Senate Vote Seen on IT Security Bill",
"pubdate": "20110329"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycomweek-in-revewfor-friday-march-25-2011-directLink-i-1061.mp3",
"title": "GovInfoSecurity.com
Week In Revew
for Friday, March 25, 2011",
"pubdate": "20110326"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-cisos-action-items-directLink-i-1063.mp3",
"title": "RSA Breach: A CISO\"s Action Items",
"pubdate": "20110325"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-cisos-action-items-directLink-i-1059.mp3",
"title": "RSA Breach: A CISO\"s Action Items",
"pubdate": "20110323"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-customers-perspective-directLink-i-1058.mp3",
"title": "RSA Breach: Customer\"s Perspective",
"pubdate": "20110323"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-new-pci-guidance-directLink-i-1056.mp3",
"title": "Inside New PCI Guidance",
"pubdate": "20110321"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/special-report-rsa-breach-its-impact-directLink-i-1054.mp3",
"title": "Special Report: The RSA Breach and its Impact",
"pubdate": "20110319"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-march-18-2011-directLink-i-1049.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, March 18, 2011",
"pubdate": "20110319"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-breach-not-game-changer-directLink-i-1050.mp3",
"title": "RSA Breach: \"Not a Game-Changer\"",
"pubdate": "20110319"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-japans-disaster-directLink-i-1045.mp3",
"title": "Lessons From Japan\"s Disaster",
"pubdate": "20110318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-view-rsa-breach-directLink-i-1053.mp3",
"title": "Legal View of RSA Breach",
"pubdate": "20110318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ismg-week-in-review-for-fri-march-18-2011-directLink-i-1047.mp3",
"title": "ISMG Week in Review for Fri., March 18, 2011",
"pubdate": "20110318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/japans-crisis-what-you-need-to-know-directLink-i-1044.mp3",
"title": "Japan\"s Crisis: What You Need to Know",
"pubdate": "20110317"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-ohio-decided-on-nist-framework-directLink-i-1041.mp3",
"title": "How Ohio Decided on NIST Framework",
"pubdate": "20110316"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/multifactor-authentication-needs-focus-directLink-i-1015.mp3",
"title": "Multifactor Authentication Needs Focus",
"pubdate": "20110316"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/australia-cyber-crime-fight-directLink-i-969.mp3",
"title": "Australia: Cyber Crime Fight",
"pubdate": "20110316"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-cross-channel-fraud-directLink-i-1038.mp3",
"title": "Fighting Cross-Channel Fraud",
"pubdate": "20110315"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ocrs-mcandrew-on-enforcing-hipaa-directLink-i-1039.mp3",
"title": "OCR\"s McAndrew on Enforcing HIPAA",
"pubdate": "20110314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-govt-will-fix-wikileaks-problem-directLink-i-1035.mp3",
"title": "How Gov\"t Will Fix WikiLeaks Problem",
"pubdate": "20110312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/japan-disaster-business-continuity-directLink-i-1037.mp3",
"title": "Japan Disaster: Business Continuity",
"pubdate": "20110312"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-infosec-unit-shifts-focus-to-risk-directLink-i-1029.mp3",
"title": "State Infosec Unit Shifts Focus to Risk",
"pubdate": "20110310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-pillars-trust-directLink-i-985.mp3",
"title": "The 3 Pillars of Trust",
"pubdate": "20110309"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-notification-national-security-directLink-i-1026.mp3",
"title": "Breach Notification and National Security",
"pubdate": "20110308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-infosec-challenges-states-face-directLink-i-1018.mp3",
"title": "3 Infosec Challenges States Face",
"pubdate": "20110308"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roadmap-to-emv-directLink-i-1025.mp3",
"title": "Roadmap to EMV",
"pubdate": "20110307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/will-pelgrin-ciso-plus-directLink-i-1017.mp3",
"title": "Will Pelgrin: The CISO-Plus",
"pubdate": "20110307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/patrick-bedwell-directLink-i-1380.mp3",
"title": "Patrick Bedwell",
"pubdate": "20110305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-march-4-2011-directLink-i-1021.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, March 4, 2011",
"pubdate": "20110305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-month-in-review-for-february-2011-directLink-i-1003.mp3",
"title": "GovInfoSecurity.com
Month in Review
for February 2011",
"pubdate": "20110226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/diversity-devices-number-them-presents-infosec-challenges-directLink-i-1001.mp3",
"title": "Diversity of Devices, Not the Number of Them, Presents Infosec Challenges",
"pubdate": "20110225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-scientists-on-firewalls-circa-2011-directLink-i-997.mp3",
"title": "NIST Scientists on Firewalls Circa 2011",
"pubdate": "20110222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preventing-online-fraud-directLink-i-995.mp3",
"title": "Preventing Online Fraud",
"pubdate": "20110222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-feb-18-2011-directLink-i-992.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Feb. 18, 2011",
"pubdate": "20110218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-firewalls-are-easy-to-pierce-directLink-i-988.mp3",
"title": "Cybersecurity: Firewalls Are Easy to Pierce",
"pubdate": "20110215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/placing-in-context-infosec-skills-gap-directLink-i-986.mp3",
"title": "Placing in Context Infosec Skills Gap",
"pubdate": "20110214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-feb-11-2011-directLink-i-982.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Feb. 11, 2011",
"pubdate": "20110212"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-fraud-costs-on-rise-directLink-i-977.mp3",
"title": "ID Fraud Costs on the Rise",
"pubdate": "20110209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lauding-president-on-cybersecurity-directLink-i-976.mp3",
"title": "Lauding the President on Cybersecurity",
"pubdate": "20110208"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/allow-by-default-deny-by-exception-directLink-i-974.mp3",
"title": "\\\"Allow by Default, Deny by Exception\\\"",
"pubdate": "20110207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-feb-4-2011-directLink-i-970.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Feb. 4, 2011",
"pubdate": "20110205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/breach-disclosure-new-laws-higher-standard-directLink-i-946.mp3",
"title": "Breach Disclosure: New Laws, Higher Standard",
"pubdate": "20110203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/merits-cyberweaponry-directLink-i-965.mp3",
"title": "The Merits of Cyberweaponry",
"pubdate": "20110202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/73-hospital-system-sets-security-goals-directLink-i-967.mp3",
"title": "73-Hospital System Sets Security Goals",
"pubdate": "20110201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/roi-security-compliance-directLink-i-964.mp3",
"title": "The ROI of Security Compliance",
"pubdate": "20110131"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-editors-choice-for-january-2011-directLink-i-963.mp3",
"title": "GovInfoSecurity.com
Editor\"s Choice
for January 2011",
"pubdate": "20110129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/selecting-data-loss-prevention-app-directLink-i-956.mp3",
"title": "Selecting a Data Loss Prevention App",
"pubdate": "20110127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beware-social-media-for-screening-directLink-i-951.mp3",
"title": "Beware of Social Media for Screening",
"pubdate": "20110125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycomweek-in-reviewfor-friday-jan-21-2011-directLink-i-954.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, Jan. 21, 2011",
"pubdate": "20110122"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-terrorism-how-to-fight-back-directLink-i-945.mp3",
"title": "Cyber Terrorism: How to Fight Back",
"pubdate": "20110121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mobile-chip-emv-directLink-i-944.mp3",
"title": "The Mobile Chip and EMV",
"pubdate": "20110120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/national-breach-warning-system-urged-directLink-i-941.mp3",
"title": "National Breach Warning System Urged",
"pubdate": "20110117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cryptography-in-cloud-directLink-i-936.mp3",
"title": "Cryptography in the Cloud",
"pubdate": "20110114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-jan-14-2011-directLink-i-940.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, Jan. 14, 2011",
"pubdate": "20110114"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-compliance-improvements-needed-directLink-i-934.mp3",
"title": "PCI Compliance: Improvements Needed",
"pubdate": "20110112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/history-emv-directLink-i-933.mp3",
"title": "The History of EMV",
"pubdate": "20110112"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-non-it-execs-onus-for-risk-directLink-i-923.mp3",
"title": "Giving Non-IT Execs Onus for IT Risk",
"pubdate": "20110111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-security-privacy-topics-2011-directLink-i-929.mp3",
"title": "Top Security & Privacy Topics of 2011",
"pubdate": "20110111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-jan-7-2011-directLink-i-926.mp3",
"title": "GovInfoSecurity.com Week In Review for Friday, Jan. 7, 2011",
"pubdate": "20110108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-challenge-directLink-i-924.mp3",
"title": "The Social Media Challenge",
"pubdate": "20110107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rd-focuses-on-finding-data-in-cloud-directLink-i-919.mp3",
"title": "R&D Focuses on Finding Data in Cloud",
"pubdate": "20110104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-editors-choice-for-december-2010-directLink-i-916.mp3",
"title": "GovInfoSecurity.com
Editor\"s Choice for December 2010",
"pubdate": "20101231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/8-security-threats-for-2011-directLink-i-908.mp3",
"title": "8 IT Security Threats for 2011",
"pubdate": "20101228"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/age-involuntary-transparency-directLink-i-907.mp3",
"title": "The Age of \"Involuntary Transparency\"",
"pubdate": "20101227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-components-insider-threat-directLink-i-906.mp3",
"title": "4 Components of the Insider Threat",
"pubdate": "20101223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/global-security-challenges-for-2011-directLink-i-904.mp3",
"title": "Global Security Challenges for 2011",
"pubdate": "20101223"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/firestorm-privacy-activity-directLink-i-903.mp3",
"title": "Firestorm of Privacy Activity",
"pubdate": "20101221"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-dec-17-2010-directLink-i-901.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, Dec. 17, 2010",
"pubdate": "20101218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/managing-risk-its-hot-topic-directLink-i-893.mp3",
"title": "Managing Risk: Why It\"s a Hot Topic",
"pubdate": "20101214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-ranum-on-2011-security-outlook-directLink-i-890.mp3",
"title": "Marcus Ranum on 2011 Security Outlook",
"pubdate": "20101214"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosecs-role-in-feds-25-pt-plan-directLink-i-888.mp3",
"title": "Infosec\"s Role in Feds\" 25-Pt. IT Plan",
"pubdate": "20101213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-dec-10-2010-directLink-i-885.mp3",
"title": "GovInfoSecurity.com
Week In Review for
Friday, Dec. 10, 2010",
"pubdate": "20101211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wikileaks-backlash-we-are-going-to-take-you-down-directLink-i-882.mp3",
"title": "WikiLeaks Backlash: \"We Are Going to Take You Down\"",
"pubdate": "20101210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/warrior-battles-militarys-pii-misuse-directLink-i-880.mp3",
"title": "Warrior Battles Military\"s PII Misuse",
"pubdate": "20101209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wipe-out-data-vanish-on-smart-phones-directLink-i-878.mp3",
"title": "Wipe Out: Data Vanish on Smart Phones",
"pubdate": "20101207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/electronic-drivers-license-new-secure-id-solution-directLink-i-879.mp3",
"title": "Electronic Driver\"s License: The New Secure ID Solution",
"pubdate": "20101207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internal-audit-2011-agenda-directLink-i-875.mp3",
"title": "Internal Audit: The 2011 Agenda",
"pubdate": "20101207"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-learned-from-wikileaks-directLink-i-873.mp3",
"title": "Lessons Not Learned from WikiLeaks",
"pubdate": "20101206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-will-rule-cyberspace-in-2020-directLink-i-847.mp3",
"title": "Who Will Rule Cyberspace in 2020?",
"pubdate": "20101205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-dec-3-2010-directLink-i-871.mp3",
"title": "GovInfoSecurity.com Week In Review for Dec. 3, 2010",
"pubdate": "20101204"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cio-calls-for-security-vigilance-directLink-i-867.mp3",
"title": "A CIO Calls for Security Vigilance",
"pubdate": "20101203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wikileaks-its-major-wake-up-call-directLink-i-866.mp3",
"title": "WikiLeaks: \\\"It\"s a Major Wake-up Call\\\"",
"pubdate": "20101201"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/exempting-infosec-from-civil-service-directLink-i-865.mp3",
"title": "Exempting Infosec from Civil Service",
"pubdate": "20101130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2011-outlook-complexity-biggest-problem-directLink-i-863.mp3",
"title": "2011 Outlook: \"Complexity is the Biggest Problem\"",
"pubdate": "20101129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-month-in-review-for-november-2010-directLink-i-859.mp3",
"title": "GovInfoSecurity.com Month In Review for November 2010",
"pubdate": "20101127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-skills-demand-has-never-been-greater-directLink-i-857.mp3",
"title": "Security Skills: Demand Has Never Been Greater",
"pubdate": "20101126"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/grc-agenda-for-2011-directLink-i-856.mp3",
"title": "GRC Agenda for 2011",
"pubdate": "20101124"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/facing-tradeoffs-to-secure-systems-directLink-i-858.mp3",
"title": "Facing Tradeoffs to Secure IT Systems",
"pubdate": "20101123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-nov-19-2010-directLink-i-852.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, Nov. 19, 2010",
"pubdate": "20101120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-new-security-metrics-directLink-i-854.mp3",
"title": "Understanding New IT Security Metrics",
"pubdate": "20101119"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-nov-12-2010-directLink-i-843.mp3",
"title": "GovInfoSecurity.com
Week In Review
for Friday, Nov. 12, 2010",
"pubdate": "20101113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-assurance-education-2011-directLink-i-839.mp3",
"title": "Information Assurance Education 2011",
"pubdate": "20101111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/physical-vs-virtual-security-no-contest-directLink-i-838.mp3",
"title": "Physical Vs. Virtual Security: No Contest",
"pubdate": "20101111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-insider-access-no-1-threat-directLink-i-836.mp3",
"title": "ID Theft: Insider Access Is No. 1 Threat",
"pubdate": "20101110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/addressing-public-wi-fi-security-risks-directLink-i-833.mp3",
"title": "Addressing Public Wi-Fi Security Risks",
"pubdate": "20101108"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-nov-5-2010-directLink-i-831.mp3",
"title": "GovInfoSecurity.com Week In Review for Friday, Nov. 5, 2010",
"pubdate": "20101106"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ex-cyber-chair-in-house-extols-new-one-directLink-i-828.mp3",
"title": "Ex-Cyber Chair in House Extols New One",
"pubdate": "20101105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-career-trends-directLink-i-824.mp3",
"title": "Incident Response Career Trends",
"pubdate": "20101105"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tech-skills-enough-for-advance-directLink-i-827.mp3",
"title": "Tech Skills Not Enough for Advance",
"pubdate": "20101104"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-trends-for-2011-directLink-i-823.mp3",
"title": "Incident Response Trends for 2011",
"pubdate": "20101103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/never-say-never-apps-on-off-cloud-directLink-i-826.mp3",
"title": "Never Say Never: Apps On, Off the Cloud",
"pubdate": "20101102"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/editors-choice-govinfosecuritycom-octobers-best-directLink-i-815.mp3",
"title": "Editor\"s Choice: GovInfoSecurity.com October\"s Best",
"pubdate": "20101031"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-oct-29-2010-directLink-i-821.mp3",
"title": "GovInfoSecurity.com Week In Review for Friday, Oct. 29, 2010",
"pubdate": "20101030"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/isaca-on-risk-compliance-trends-directLink-i-808.mp3",
"title": "ISACA on Risk, Compliance Trends",
"pubdate": "20101027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-mass-man-shares-story-directLink-i-805.mp3",
"title": "ID Theft: Mass. Man Shares Story",
"pubdate": "20101025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-plan-to-transform-government-directLink-i-796.mp3",
"title": "CISO\"s Plan to Transform Government",
"pubdate": "20101025"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-oct-22-2010-directLink-i-803.mp3",
"title": "GovInfoSecurity.com Week In Review for Oct. 22, 2010",
"pubdate": "20101023"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cag-vs-ig-conflict-over-infosec-directLink-i-795.mp3",
"title": "CAG Vs. IG: Conflict Over Infosec",
"pubdate": "20101022"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-education-initiative-creating-metrics-directLink-i-793.mp3",
"title": "Cyber Education Initiative: Creating Metrics",
"pubdate": "20101021"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steady-approach-to-critical-controls-directLink-i-794.mp3",
"title": "Steady Approach to Critical Controls",
"pubdate": "20101020"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-articulating-value-directLink-i-789.mp3",
"title": "Risk Management: Articulating the Value",
"pubdate": "20101020"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nice-feds-cyber-education-initiative-directLink-i-792.mp3",
"title": "NICE: Fed\"s Cyber Education Initiative",
"pubdate": "20101019"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-wrong-application-security-directLink-i-785.mp3",
"title": "What\"s Wrong with Application Security?",
"pubdate": "20101019"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/editors-notebook-jim-lewis-directLink-i-790.mp3",
"title": "Editor\"s Notebook: Jim Lewis",
"pubdate": "20101018"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-oct-15-2010-directLink-i-786.mp3",
"title": "GovInfoSecurity.com Week In Review for Oct. 15, 2010",
"pubdate": "20101016"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securitys-future-rests-young-directLink-i-780.mp3",
"title": "IT Security\"s Future Rests with Young",
"pubdate": "20101014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lack-spending-alarms-state-ciso-directLink-i-779.mp3",
"title": "Lack of Spending Alarms State CISO",
"pubdate": "20101013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-evolution-mimics-immune-system-directLink-i-778.mp3",
"title": "Infosec Evolution Mimics Immune System",
"pubdate": "20101013"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-oct-8-2010-directLink-i-775.mp3",
"title": "GovInfoSecurity.com Week In Review for Oct. 8, 2010",
"pubdate": "20101009"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-getting-right-directLink-i-768.mp3",
"title": "Business Continuity: Getting it Right",
"pubdate": "20101008"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/itll-take-time-to-achieve-obamas-goals-directLink-i-771.mp3",
"title": "It\"ll Take Time to Achieve Obama\"s Goals",
"pubdate": "20101008"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/physical-logical-security-convergence-directLink-i-767.mp3",
"title": "Physical, Logical Security Convergence",
"pubdate": "20101007"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/zeus-global-cyber-threat-directLink-i-763.mp3",
"title": "Zeus: The Global Cyber Threat",
"pubdate": "20101002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycoms-month-in-review-for-september-2010-directLink-i-758.mp3",
"title": "GovInfoSecurity.com\"s Month In Review for September 2010",
"pubdate": "20101002"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fdic-on-vendor-management-directLink-i-746.mp3",
"title": "The FDIC on Vendor Management",
"pubdate": "20100927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-about-stuxnet-directLink-i-752.mp3",
"title": "What About Stuxnet?",
"pubdate": "20100927"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-sept-24-2010-directLink-i-747.mp3",
"title": "GovInfoSecurity.com Week In Review for Sept. 24, 2010",
"pubdate": "20100925"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-emerging-technology-needs-standardization-directLink-i-745.mp3",
"title": "PCI: Emerging Technology Needs Standardization",
"pubdate": "20100925"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/redefining-role-cybersec-adviser-directLink-i-742.mp3",
"title": "Redefining Role of Cybersec Adviser",
"pubdate": "20100924"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/surviving-social-media-directLink-i-743.mp3",
"title": "Surviving Social Media",
"pubdate": "20100923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/overcoming-fear-cloud-directLink-i-738.mp3",
"title": "Overcoming Fear of the Cloud",
"pubdate": "20100922"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-sept-17-2010-directLink-i-734.mp3",
"title": "GovInfoSecurity.com Week In Review for Friday, Sept. 17, 2010",
"pubdate": "20100918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/legal-issues-in-cloud-computing-directLink-i-728.mp3",
"title": "Legal Issues in Cloud Computing",
"pubdate": "20100916"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/itll-go-on-your-permanent-record-directLink-i-727.mp3",
"title": "\\\"It\"ll Go on Your Permanent Record\\\"",
"pubdate": "20100913"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-sept-sept-10-2010-directLink-i-724.mp3",
"title": "GovInfoSecurity.com Week In Review for Sept, Sept. 10, 2010",
"pubdate": "20100911"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-worker-need-underestimated-directLink-i-719.mp3",
"title": "Is Infosec Worker Need Underestimated?",
"pubdate": "20100907"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/editors-choice-for-august-senate-tackles-cybersecurity-bill-dod-infosec-strategy-us-cert-state-cisos-directLink-i-709.mp3",
"title": "Editor\"s Choice for August: Senate Tackles Cybersecurity Bill, DoD Infosec Strategy, U.S.-CERT, State CISOs",
"pubdate": "20100905"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-sept-3-2010-directLink-i-716.mp3",
"title": "GovInfoSecurity.com Week In Review for Friday, Sept. 3, 2010",
"pubdate": "20100904"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-social-media-directLink-i-706.mp3",
"title": "Risk Management and Social Media",
"pubdate": "20100831"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/reasoning-behind-enhancing-dhs-infosec-prowess-directLink-i-705.mp3",
"title": "Reasoning Behind Enhancing DHS Infosec Prowess",
"pubdate": "20100831"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/senator-gives-white-house-incomplete-on-cybersecurity-performance-directLink-i-703.mp3",
"title": "Senator Gives White House \"Incomplete\"
on Cybersecurity Performance",
"pubdate": "20100830"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-aug-27-2010-directLink-i-701.mp3",
"title": "GovInfoSecurity.com Week In Review for Friday, Aug. 27, 2010",
"pubdate": "20100828"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intrusion-detection-analyzing-data-proves-valuable-directLink-i-698.mp3",
"title": "Intrusion Detection: Analyzing Data Proves Valuable",
"pubdate": "20100827"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dod-unveils-new-cyber-defense-strategy-directLink-i-697.mp3",
"title": "DoD Unveils New Cyber Defense Strategy",
"pubdate": "20100826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-more-secure-environment-directLink-i-694.mp3",
"title": "The Cloud: A More Secure Environment?",
"pubdate": "20100825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ibm-names-top-trends-risks-directLink-i-693.mp3",
"title": "IBM Names Top Trends, Risks",
"pubdate": "20100825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michigan-eyes-hosting-own-cloud-data-center-directLink-i-691.mp3",
"title": "Michigan Eyes Hosting Own Cloud Data Center",
"pubdate": "20100824"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nasas-jpl-reaches-for-cloud-directLink-i-689.mp3",
"title": "NASA\"s JPL Reaches for the Cloud",
"pubdate": "20100823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-friday-aug-20-2010-directLink-i-687.mp3",
"title": "GovInfoSecurity.com Week In Review for Friday, Aug. 20, 2010",
"pubdate": "20100821"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cracking-down-on-id-theft-directLink-i-682.mp3",
"title": "Cracking Down on ID Theft",
"pubdate": "20100817"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fundamentals-risk-management-directLink-i-681.mp3",
"title": "The Fundamentals of Risk Management",
"pubdate": "20100814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-aug-13-2010-directLink-i-679.mp3",
"title": "GovInfoSecurity.com Week In Review for Aug. 13, 2010",
"pubdate": "20100814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/altruistic-cisos-employ-their-smarts-to-succeed-directLink-i-674.mp3",
"title": "Altruistic CISOs Employ Their Smarts to Succeed",
"pubdate": "20100811"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-update-no-surprises-directLink-i-671.mp3",
"title": "PCI Update: \"No Surprises\"",
"pubdate": "20100810"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-theft-how-to-protect-consumers-directLink-i-670.mp3",
"title": "Identity Theft: How To Protect Consumers",
"pubdate": "20100809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defending-it-swimming-against-tide-directLink-i-669.mp3",
"title": "Defending IT: Swimming Against the Tide",
"pubdate": "20100809"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-aug-6-2010-directLink-i-668.mp3",
"title": "GovInfoSecurity.com Week in Review for Aug. 6, 2010",
"pubdate": "20100807"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-computing-case-for-certification-directLink-i-661.mp3",
"title": "Cloud Computing: The Case for Certification",
"pubdate": "20100806"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycoms-best-july-directLink-i-652.mp3",
"title": "GovInfoSecurity.com\"s Best of July",
"pubdate": "20100731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-31-2010-directLink-i-649.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, July 31, 2010",
"pubdate": "20100731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/compliance-i-might-get-breached-but-i-will-get-fined-directLink-i-648.mp3",
"title": "Compliance: \"I Might Get Breached, But I Will Get Fined\"",
"pubdate": "20100730"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/living-security-breaches-directLink-i-645.mp3",
"title": "Living with IT Security Breaches",
"pubdate": "20100729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2010-verizon-data-breach-report-insiders-are-1-threat-directLink-i-644.mp3",
"title": "2010 Verizon Data Breach Report: Insiders are #1 Threat",
"pubdate": "20100728"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/physical-virtual-security-commonalities-directLink-i-643.mp3",
"title": "Physical, Virtual Security Commonalities",
"pubdate": "20100727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-24-2010-directLink-i-639.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, July 24, 2010",
"pubdate": "20100724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/conflict-interest-certifiers-who-train-directLink-i-636.mp3",
"title": "Conflict of Interest: Certifiers Who Train?",
"pubdate": "20100723"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-skills-gap-threatens-key-systems-directLink-i-634.mp3",
"title": "Infosec Skills Gap Threatens Key IT Systems",
"pubdate": "20100722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dangers-consumerization-directLink-i-633.mp3",
"title": "The Dangers of Consumerization",
"pubdate": "20100722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartlands-bob-carr-on-leadership-in-crisis-directLink-i-632.mp3",
"title": "Heartland\"s Bob Carr on Leadership in a Crisis",
"pubdate": "20100720"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/departing-words-from-navy-cio-directLink-i-630.mp3",
"title": "Departing Words from the Navy CIO",
"pubdate": "20100720"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-getting-attention-needs-directLink-i-629.mp3",
"title": "Is Cybersecurity Getting the Attention It Needs?",
"pubdate": "20100719"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-17-2010-directLink-i-625.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, July 17, 2010",
"pubdate": "20100717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentications-chicken-n-egg-dilemma-directLink-i-623.mp3",
"title": "Authentication\"s Chicken \"n\" Egg Dilemma",
"pubdate": "20100715"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-you-cant-stop-stupid-directLink-i-622.mp3",
"title": "Insider Threat: \"You Can\"t Stop Stupid\"",
"pubdate": "20100715"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-commission-encore-presents-challenges-directLink-i-621.mp3",
"title": "Cyber Commission Encore Presents Challenges",
"pubdate": "20100714"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/doug-johnson-aba-on-careers-in-banking-public-policy-directLink-i-620.mp3",
"title": "Doug Johnson of the ABA on Careers in Banking, Public Policy",
"pubdate": "20100713"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ranum-part-ii-on-banking-healthcare-government-directLink-i-619.mp3",
"title": "Ranum Part II: On Banking, Healthcare and Government",
"pubdate": "20100712"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-10-2010-directLink-i-618.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, July 10, 2010",
"pubdate": "20100710"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dhs-addresses-new-fisma-responsibilities-directLink-i-617.mp3",
"title": "DHS Addresses New FISMA Responsibilities",
"pubdate": "20100710"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-warfare-prevention-securing-your-software-applications-directLink-i-611.mp3",
"title": "Cyber Warfare Prevention - Securing Your Software and Applications",
"pubdate": "20100709"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-ranum-on-todays-top-threats-directLink-i-610.mp3",
"title": "Marcus Ranum on Today\"s Top Threats",
"pubdate": "20100708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tom-smedinghoff-on-legal-side-information-security-directLink-i-609.mp3",
"title": "Tom Smedinghoff on the Legal Side of Information Security",
"pubdate": "20100708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/its-time-to-take-security-out-closet-directLink-i-608.mp3",
"title": "It\"s Time to \"Take Security Out of the Closet\"",
"pubdate": "20100703"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-june-editors-choice-for-monday-july-5-2010-directLink-i-605.mp3",
"title": "GovInfoSecurity.com June Editor\"s Choice for Monday, July 5, 2010",
"pubdate": "20100703"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-july-3-2010-directLink-i-603.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, July 3, 2010",
"pubdate": "20100702"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-need-to-be-at-ceos-side-directLink-i-596.mp3",
"title": "Why CISOs Need to be at CEO\"s Side",
"pubdate": "20100629"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-26-2010-directLink-i-592.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, June 26, 2010",
"pubdate": "20100625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/tips-trends-for-security-pros-directLink-i-589.mp3",
"title": "Tips & Trends for Security Pros",
"pubdate": "20100625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/karen-evans-us-cyber-challenge-director-ex-federal-e-government-chief-directLink-i-585.mp3",
"title": "Karen Evans, U.S. Cyber Challenge director and ex-federal e-government chief.",
"pubdate": "20100622"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/guy-kawasaki-on-power-social-media-directLink-i-584.mp3",
"title": "Guy Kawasaki on the Power of Social Media",
"pubdate": "20100622"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenges-global-leadership-directLink-i-583.mp3",
"title": "Challenges of Global Leadership",
"pubdate": "20100622"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/3-questions-for-karen-evans-directLink-i-582.mp3",
"title": "3 Questions for Karen Evans",
"pubdate": "20100621"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-19-2010-directLink-i-578.mp3",
"title": "GovInfoSecurity.com Week In Review for Saturday, June 19, 2010",
"pubdate": "20100618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-12-2010-directLink-i-572.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, June 12, 2010",
"pubdate": "20100612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/understanding-new-senate-cybersecurity-bill-directLink-i-571.mp3",
"title": "Understanding the New Senate Cybersecurity Bill",
"pubdate": "20100611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internal-fraud-part-2-new-solutions-directLink-i-570.mp3",
"title": "Internal Fraud Part 2: New Solutions",
"pubdate": "20100611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/story-behind-nasas-move-to-continuous-monitoring-directLink-i-567.mp3",
"title": "Story Behind NASA\"s Move to Continuous Monitoring",
"pubdate": "20100609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/prof-eugene-spafford-purdue-university-directLink-i-566.mp3",
"title": "Prof. Eugene Spafford, Purdue University",
"pubdate": "20100609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/were-getting-enough-education-to-right-people-directLink-i-565.mp3",
"title": "\\\"We\"re Not Getting Enough Education to the Right People\\\"",
"pubdate": "20100609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-june-5-2010-directLink-i-561.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, June 5, 2010",
"pubdate": "20100605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/internal-fraud-global-threats-solutions-directLink-i-556.mp3",
"title": "Internal Fraud: Global Threats, Solutions",
"pubdate": "20100604"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/showcasing-infosec-talent-to-recruit-infosec-talent-directLink-i-555.mp3",
"title": "Showcasing Infosec Talent to Recruit Infosec Talent",
"pubdate": "20100603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/intrusion-detection-myths-realities-directLink-i-554.mp3",
"title": "Intrusion Detection: Myths & Realities",
"pubdate": "20100603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crafting-social-media-security-policy-directLink-i-553.mp3",
"title": "Crafting a Social Media Security Policy",
"pubdate": "20100603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/earn-masters-in-cybersecurity-directLink-i-552.mp3",
"title": "Earn a Master\"s in Cybersecurity",
"pubdate": "20100602"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-may-29-2010-directLink-i-548.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, May 29, 2010",
"pubdate": "20100529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-month-in-review-monday-may-31-2010-directLink-i-547.mp3",
"title": "GovInfoSecurity.com Month in Review, Monday, May 31, 2010",
"pubdate": "20100529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-may-22-2010-directLink-i-532.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, May 22, 2010",
"pubdate": "20100522"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-open-source-app-development-directLink-i-531.mp3",
"title": "Securing Open Source App Development",
"pubdate": "20100521"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-cybersecurity-directLink-i-528.mp3",
"title": "The State of Cybersecurity",
"pubdate": "20100520"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/steve-katz-worlds-first-ciso-directLink-i-526.mp3",
"title": "Steve Katz, the World\"s First CISO",
"pubdate": "20100518"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-take-to-be-ciro-directLink-i-525.mp3",
"title": "What\"s it Take to be a CIRO?",
"pubdate": "20100518"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-you-need-to-know-about-data-privacy-directLink-i-524.mp3",
"title": "What You Need to Know About Data Privacy",
"pubdate": "20100517"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-for-saturday-may-15-2010-directLink-i-523.mp3",
"title": "GovInfoSecurity.com Week in Review for Saturday, May 15, 2010",
"pubdate": "20100515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/skills-needed-for-cloud-computing-directLink-i-520.mp3",
"title": "The Skills Needed for Cloud Computing",
"pubdate": "20100514"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/curing-cloud-computing-jitters-directLink-i-519.mp3",
"title": "Curing the Cloud Computing Jitters",
"pubdate": "20100513"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-saturday-may-8-2010-directLink-i-512.mp3",
"title": "GovInfoSecurity.Com Week in Review: Saturday, May 8, 2010",
"pubdate": "20100508"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/giving-sweeping-budgeting-power-to-white-house-cyberspace-director-directLink-i-510.mp3",
"title": "Giving Sweeping Budgeting Power to White House Cyberspace Director",
"pubdate": "20100507"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/kim-peretti-ex-senior-counsel-department-justice-directLink-i-507.mp3",
"title": "Kim Peretti, ex-Senior Counsel, Department of Justice",
"pubdate": "20100505"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/surviving-cyber-war-directLink-i-506.mp3",
"title": "Surviving Cyber War",
"pubdate": "20100504"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-may-1-2010-directLink-i-503.mp3",
"title": "GovInfoSecurity.Com Week in Review: May 1, 2010",
"pubdate": "20100501"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-firewalls-speeding-cloud-adoption-story-behind-cisos-firing-directLink-i-501.mp3",
"title": "Beyond Firewalls, Speeding Cloud Adoption, Story Behind CISO\"s Firing",
"pubdate": "20100430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/inside-tjxheartland-investigations-directLink-i-500.mp3",
"title": "Inside the TJX/Heartland Investigations",
"pubdate": "20100430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/microsoft-echoes-public-private-partnership-mantra-directLink-i-497.mp3",
"title": "Microsoft Echoes Public-Private Partnership Mantra",
"pubdate": "20100428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fraud-stupidity-look-lot-alike-directLink-i-495.mp3",
"title": "\\\"Fraud & Stupidity Look a Lot Alike\\\"",
"pubdate": "20100428"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-summit-building-trust-globally-directLink-i-493.mp3",
"title": "Cybersecurity Summit: Building Trust, Globally",
"pubdate": "20100426"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/meeting-minds-over-fed-cybersecurity-directLink-i-491.mp3",
"title": "Meeting of the Minds Over Fed Cybersecurity",
"pubdate": "20100423"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/govinfosecuritycom-week-in-review-april-24-2010-directLink-i-490.mp3",
"title": "GovInfoSecurity.Com Week in Review: April 24, 2010",
"pubdate": "20100423"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/speeding-cloud-adoption-through-new-fedramp-initiative-directLink-i-486.mp3",
"title": "Speeding Cloud Adoption Through New FedRAMP Initiative",
"pubdate": "20100419"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-crime-new-threats-new-targets-directLink-i-484.mp3",
"title": "Cyber Crime: New Threats, New Targets",
"pubdate": "20100417"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/social-media-what-every-senior-leader-must-know-directLink-i-479.mp3",
"title": "Social Media: What Every Senior Leader Must Know",
"pubdate": "20100408"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-needs-improvement-directLink-i-475.mp3",
"title": "Business Continuity: Needs Improvement",
"pubdate": "20100401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-most-misunderstood-about-cloud-computing-directLink-i-474.mp3",
"title": "What\"s Most Misunderstood About Cloud Computing?",
"pubdate": "20100331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/when-gregory-wilshusen-talks-people-listen-directLink-i-472.mp3",
"title": "When Gregory Wilshusen Talks, People Listen",
"pubdate": "20100331"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-federated-id-management-directLink-i-471.mp3",
"title": "The Case for Federated ID Management",
"pubdate": "20100330"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/payments-privacy-vendor-management-global-best-practices-directLink-i-470.mp3",
"title": "Payments, Privacy and Vendor Management - Global Best Practices",
"pubdate": "20100330"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insider-threat-your-greatest-risks-directLink-i-465.mp3",
"title": "Insider Threat: Your Greatest Risks",
"pubdate": "20100322"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-access-to-sensitive-data-insights-from-john-bordwine-public-sector-cto-symantec-directLink-i-464.mp3",
"title": "Secure Access to Sensitive Data: Insights from John Bordwine, Public Sector CTO, Symantec",
"pubdate": "20100318"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartland-payment-systems-works-feds-to-secure-it-directLink-i-462.mp3",
"title": "Heartland Payment Systems Works with Feds to Secure IT",
"pubdate": "20100310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hathaway-speaks-out-on-cnci-declassification-directLink-i-460.mp3",
"title": "Hathaway Speaks Out on CNCI Declassification",
"pubdate": "20100309"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2010-warren-axelrod-on-information-security-directLink-i-456.mp3",
"title": "RSA 2010: Warren Axelrod on Information Security",
"pubdate": "20100306"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-2010-bankingsecurity-agenda-paul-smocer-financial-services-roundtable-directLink-i-454.mp3",
"title": "RSA 2010: Banking/Security Agenda - Paul Smocer, Financial Services Roundtable",
"pubdate": "20100305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/certifications-whats-new-hord-tipton-isc2-directLink-i-453.mp3",
"title": "Certifications: What\"s New? - Hord Tipton, (ISC)2",
"pubdate": "20100305"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pci-whats-next-when-directLink-i-452.mp3",
"title": "PCI: What\"s Next and When?",
"pubdate": "20100303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-happening-trusted-internet-connection-directLink-i-451.mp3",
"title": "What\"s Happening with the Trusted Internet Connection?",
"pubdate": "20100302"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bridging-silicon-valley-beltway-directLink-i-448.mp3",
"title": "Bridging Silicon Valley and the Beltway",
"pubdate": "20100227"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/infosec-guru-ron-ross-on-nists-revolutionary-guidance-directLink-i-447.mp3",
"title": "Infosec Guru Ron Ross on NIST\"s Revolutionary Guidance",
"pubdate": "20100225"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/follow-risk-tips-from-richard-chambers-president-institute-internal-auditors-directLink-i-444.mp3",
"title": "\\\"Follow the Risk\\\" - Tips from Richard Chambers, President of the Institute of Internal Auditors",
"pubdate": "20100220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/skinny-on-kneber-botnet-directLink-i-442.mp3",
"title": "The Skinny on the Kneber Botnet",
"pubdate": "20100219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-manage-social-media-jerry-mechling-harvard-kennedy-school-directLink-i-439.mp3",
"title": "How to Manage Social Media - Jerry Mechling, Harvard Kennedy School",
"pubdate": "20100213"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-compliance-forresters-5-key-principles-directLink-i-437.mp3",
"title": "Beyond Compliance: Forrester\"s 5 Key Principles",
"pubdate": "20100209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/putting-threats-cloud-computing-in-perspective-directLink-i-436.mp3",
"title": "Putting Threats of Cloud Computing in Perspective",
"pubdate": "20100209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-forensics-careers-tips-from-rob-lee-sans-institute-directLink-i-435.mp3",
"title": "Digital Forensics - Careers Tips from Rob Lee of SANS Institute",
"pubdate": "20100206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-avivah-litan-on-fraud-trends-directLink-i-434.mp3",
"title": "Gartner\"s Avivah Litan on Fraud Trends",
"pubdate": "20100205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-cyber-awareness-strategies-from-dena-haritos-tsamitis-carnegie-mellon-directLink-i-433.mp3",
"title": "Improving Cyber Awareness - Strategies from Dena Haritos Tsamitis of Carnegie Mellon",
"pubdate": "20100205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2010-identity-fraud-study-threats-trends-directLink-i-432.mp3",
"title": "2010 Identity Fraud Study: Threats and Trends",
"pubdate": "20100205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/setting-tone-at-top-jennifer-bayuk-on-leadership-directLink-i-431.mp3",
"title": "Setting Tone at the Top: Jennifer Bayuk on Leadership",
"pubdate": "20100203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-make-in-information-security-today-directLink-i-430.mp3",
"title": "What it Takes to Make it in Information Security Today",
"pubdate": "20100202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-ready-for-cyberwar-directLink-i-426.mp3",
"title": "Getting Ready for Cyberwar",
"pubdate": "20100130"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/howard-schmidt-white-house-cybersecurity-coordinator-directLink-i-425.mp3",
"title": "Howard Schmidt, White House Cybersecurity Coordinator",
"pubdate": "20100128"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-agenda-kevin-richards-president-issa-directLink-i-424.mp3",
"title": "Information Security Agenda - Kevin Richards, President of ISSA",
"pubdate": "20100127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-takes-to-be-risk-manager-kenneth-newman-central-pacific-bank-directLink-i-422.mp3",
"title": "What it Takes to be a Risk Manager - Kenneth Newman, Central Pacific Bank",
"pubdate": "20100126"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/google-attack-prelude-to-more-intrusions-directLink-i-421.mp3",
"title": "Google Attack: Prelude to More Intrusions",
"pubdate": "20100125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cost-data-breach-dr-larry-ponemon-ponemon-institute-directLink-i-420.mp3",
"title": "Cost of a Data Breach - Dr. Larry Ponemon, Ponemon Institute",
"pubdate": "20100123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-trends-in-background-screening-lester-rosen-employment-screening-resources-directLink-i-418.mp3",
"title": "Top Trends in Background Screening - Lester Rosen, Employment Screening Resources",
"pubdate": "20100121"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-consumer-protection-what-to-expect-in-2010-directLink-i-415.mp3",
"title": "Privacy & Consumer Protection: What to Expect in 2010",
"pubdate": "20100118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/taming-wild-west-internet-directLink-i-411.mp3",
"title": "Taming the Wild-West Internet",
"pubdate": "20100109"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/grading-obamas-first-year-cybersecurity-performance-directLink-i-407.mp3",
"title": "Grading Obama\"s First-Year Cybersecurity Performance",
"pubdate": "20100107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-career-predictions-david-foote-on-whats-hot-why-directLink-i-404.mp3",
"title": "Information Security Career Predictions - David Foote on What\"s Hot and Why",
"pubdate": "20091231"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/einstein-citizens-privacy-philip-reitinger-deputy-undersecretary-homeland-security-national-protection-programs-directorate-directLink-i-402.mp3",
"title": "Einstein and Citizens\" Privacy: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate",
"pubdate": "20091229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisco-security-report-malware-social-media-are-top-risks-directLink-i-401.mp3",
"title": "Cisco Security Report: Malware, Social Media are Top Risks",
"pubdate": "20091229"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eliminating-persistent-cyber-threats-against-government-networks-directLink-i-399.mp3",
"title": "Eliminating Persistent Cyber Threats Against Government Networks",
"pubdate": "20091224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/dont-overload-dhs-cybersecurity-tasks-directLink-i-398.mp3",
"title": "Don\"t Overload DHS with Cybersecurity Tasks",
"pubdate": "20091224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marcus-ranum-biggest-security-threats-getting-least-attention-directLink-i-396.mp3",
"title": "Marcus Ranum: The Biggest Security Threats Getting the Least Attention",
"pubdate": "20091222"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rep-david-wu-takes-on-his-allies-conversation-chair-house-technology-innovation-subcommittee-directLink-i-395.mp3",
"title": "Rep. David Wu Takes On His Allies: Conversation with the Chair of the House Technology & Innovation Subcommittee",
"pubdate": "20091219"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/myra-powell-mission-assurance-network-operations-program-disa-directLink-i-394.mp3",
"title": "Myra Powell, Mission Assurance and Network Operations Program, DISA",
"pubdate": "20091218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/id-theft-threats-to-watch-in-2010-directLink-i-393.mp3",
"title": "ID Theft Threats to Watch in 2010",
"pubdate": "20091215"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2010-data-breach-trends-verizon-business-report-update-directLink-i-392.mp3",
"title": "2010 Data Breach Trends: Verizon Business Report Update",
"pubdate": "20091211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-career-trends-barbara-massa-mcafee-directLink-i-391.mp3",
"title": "Information Security Career Trends: Barbara Massa of McAfee",
"pubdate": "20091211"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/human-capital-no-1-infosec-goal-philip-reitinger-deputy-undersecretary-homeland-security-national-protection-programs-directorate-directLink-i-390.mp3",
"title": "Human Capital No. 1 Infosec Goal: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate",
"pubdate": "20091210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-trends-for-2010-james-pajakowski-protiviti-directLink-i-389.mp3",
"title": "Risk Management Trends for 2010: James Pajakowski, Protiviti",
"pubdate": "20091205"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/having-his-subordinates-back-nist-director-patrick-gallagher-directLink-i-387.mp3",
"title": "Having His Subordinate\"s Back: NIST Director Patrick Gallagher",
"pubdate": "20091202"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/well-rounded-security-pro-insights-from-mark-lobel-isaca-directLink-i-384.mp3",
"title": "The Well-Rounded Security Pro: Insights from Mark Lobel, ISACA",
"pubdate": "20091127"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/blurring-bulls-eye-on-federal-it-dickie-george-technical-director-information-assurance-national-security-agency-directLink-i-383.mp3",
"title": "Blurring the Bull\"s Eye on Federal IT: Dickie George, Technical Director of Information Assurance, National Security Agency",
"pubdate": "20091126"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-trends-2010-sue-kerr-bcdr-consultant-directLink-i-382.mp3",
"title": "Business Continuity Trends 2010: Sue Kerr, BC/DR Consultant",
"pubdate": "20091125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/equipping-federal-workforce-for-cyber-age-ruby-demesme-senior-adviser-deloitte-directLink-i-381.mp3",
"title": "Equipping the Federal Workforce for the Cyber Age: Ruby DeMesme, Senior Adviser, Deloitte",
"pubdate": "20091125"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/thinking-like-hacker-dickie-george-technical-director-information-assurance-national-security-agency-directLink-i-378.mp3",
"title": "Thinking Like a Hacker: Dickie George, Technical Director of Information Assurance, National Security Agency",
"pubdate": "20091123"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ron-ross-nists-infosec-guru-on-institutes-latest-transformational-guidance-directLink-i-377.mp3",
"title": "Ron Ross, NIST\"s Infosec Guru, on the Institute\"s Latest Transformational Guidance",
"pubdate": "20091120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-trends-laws-j-trevor-hughes-iapp-directLink-i-376.mp3",
"title": "Privacy Trends and Laws: J. Trevor Hughes of the IAPP",
"pubdate": "20091118"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/user-centric-identity-comes-to-washington-heather-west-center-for-democracy-technology-directLink-i-375.mp3",
"title": "User-Centric Identity Comes to Washington: Heather West of the Center for Democracy and Technology",
"pubdate": "20091117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/community-outreach-need-for-information-security-pros-directLink-i-373.mp3",
"title": "Community Outreach: The Need for Information Security Pros",
"pubdate": "20091117"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/white-house-must-lead-melissa-hathaway-white-house-cybersecurity-policy-review-leader-part-2-directLink-i-372.mp3",
"title": "White House Must Lead: Melissa Hathaway, White House Cybersecurity Policy Review Leader - Part 2",
"pubdate": "20091113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creatively-securing-it-melissa-hathaway-white-house-cybersecurity-policy-review-leader-directLink-i-371.mp3",
"title": "Creatively Securing IT: Melissa Hathaway, White House Cybersecurity Policy Review Leader",
"pubdate": "20091113"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/iris-recognition-nist-computer-scientist-patrick-grother-directLink-i-368.mp3",
"title": "Iris Recognition: NIST Computer Scientist Patrick Grother",
"pubdate": "20091111"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/softer-side-leadership-heidi-kraft-careers-coach-directLink-i-367.mp3",
"title": "The Softer Side of Leadership - Heidi Kraft, Careers Coach",
"pubdate": "20091110"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/career-in-secret-service-what-takes-directLink-i-366.mp3",
"title": "A Career in the Secret Service: What it Takes",
"pubdate": "20091107"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-fraud-allan-bachman-association-certified-fraud-examiners-directLink-i-364.mp3",
"title": "Fighting Fraud - Allan Bachman, Association of Certified Fraud Examiners",
"pubdate": "20091103"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/gartners-john-pescatore-on-2010-threats-trends-directLink-i-361.mp3",
"title": "Gartner\"s John Pescatore on 2010 Threats, Trends",
"pubdate": "20091027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/enterprise-risk-management-how-to-engage-your-board-directors-directLink-i-360.mp3",
"title": "Enterprise Risk Management: How to Engage Your Board of Directors",
"pubdate": "20091027"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/electronic-healthcare-records-impact-on-your-organization-directLink-i-358.mp3",
"title": "Electronic Healthcare Records: The Impact on Your Organization",
"pubdate": "20091024"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-consensus-on-regulating-data-directLink-i-357.mp3",
"title": "Getting a Consensus on Regulating Data",
"pubdate": "20091020"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/strategic-cyber-warfare-shouldnt-be-military-priority-directLink-i-354.mp3",
"title": "Why Strategic Cyber Warfare Shouldn\"t Be a Military Priority",
"pubdate": "20091015"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safe-secure-online-new-outreach-program-from-isc2-directLink-i-353.mp3",
"title": "Safe and Secure Online - New Outreach Program from (ISC)2",
"pubdate": "20091014"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-assurance-community-colleges-erich-spengler-moraine-valley-community-college-directLink-i-351.mp3",
"title": "Information Assurance and Community Colleges - Erich Spengler, Moraine Valley Community College",
"pubdate": "20091008"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/authentication-biometrics-advantage-directLink-i-350.mp3",
"title": "Authentication: The Biometrics Advantage",
"pubdate": "20091003"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-security-much-more-than-guidance-directLink-i-348.mp3",
"title": "NIST and IT Security: Much More Than Guidance",
"pubdate": "20091001"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-from-spies-peter-earnest-international-spy-museum-directLink-i-347.mp3",
"title": "Lessons from Spies -- Peter Earnest of the International Spy Museum",
"pubdate": "20090929"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/biometrics-from-kabul-to-washington-directLink-i-343.mp3",
"title": "Biometrics: From Kabul to Washington",
"pubdate": "20090923"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/training-next-gen-army-brass-on-security-directLink-i-342.mp3",
"title": "Training Next Gen Army Brass on IT Security",
"pubdate": "20090922"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lockheed-martins-point-man-on-fed-cybersecurity-directLink-i-341.mp3",
"title": "Lockheed Martin\"s Point Man on Fed Cybersecurity",
"pubdate": "20090919"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/secure-access-to-sensitive-data-insights-from-john-bordwine-public-sector-cto-symantec-directLink-i-339.mp3",
"title": "Secure Access to Sensitive Data: Insights from John Bordwine, Public Sector CTO, Symantec",
"pubdate": "20090918"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/top-cyber-risks-alan-paller-sans-institute-directLink-i-337.mp3",
"title": "Top Cyber Risks: Alan Paller, SANS Institute",
"pubdate": "20090915"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-law-alysa-hutnik-kelley-drye-directLink-i-336.mp3",
"title": "Privacy and the Law: Alysa Hutnik of Kelley Drye",
"pubdate": "20090912"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/h1n1-update-how-to-prepare-for-flu-season-regina-phelps-pandemic-expert-directLink-i-333.mp3",
"title": "H1N1 Update: How to Prepare for Flu Season - Regina Phelps, Pandemic Expert",
"pubdate": "20090908"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/city-defends-system-from-social-network-threats-directLink-i-332.mp3",
"title": "City Defends IT System from Social Network Threats",
"pubdate": "20090903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-forensics-great-need-new-careers-rob-lee-sans-institute-directLink-i-331.mp3",
"title": "Digital Forensics: Great Need, New Careers - Rob Lee, SANS Institute",
"pubdate": "20090903"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cooperate-regulate-on-cybersecurity-directLink-i-323.mp3",
"title": "Cooperate, Not Regulate, on Cybersecurity",
"pubdate": "20090826"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-breach-trends-mary-monahan-javelin-strategy-research-directLink-i-322.mp3",
"title": "Data Breach Trends - Mary Monahan, Javelin Strategy & Research",
"pubdate": "20090825"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cae-at-10-interview-dickie-george-nsa-directLink-i-320.mp3",
"title": "The CAE at 10: Interview with Dickie George of the NSA",
"pubdate": "20090822"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fisma-misunderstood-law-directLink-i-319.mp3",
"title": "FISMA: The Misunderstood Law",
"pubdate": "20090820"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/wounded-warriors-digital-forensics-training-for-veterans-directLink-i-318.mp3",
"title": "Wounded Warriors: Digital Forensics Training for Veterans",
"pubdate": "20090819"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/hiring-trends-information-security-bucks-recession-david-foote-foote-partners-directLink-i-317.mp3",
"title": "Hiring Trends: Information Security Bucks the Recession - David Foote, Foote Partners",
"pubdate": "20090818"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-massive-decentralized-system-interview-california-ciso-mark-weatherford-directLink-i-315.mp3",
"title": "Safeguarding a Massive, Decentralized IT System - Interview with California CISO Mark Weatherford",
"pubdate": "20090813"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/feds-seen-regulating-industry-directLink-i-314.mp3",
"title": "Feds Seen Regulating IT Industry",
"pubdate": "20090812"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-infosec-occupational-categories-interview-california-ciso-mark-weatherford-directLink-i-313.mp3",
"title": "Creating InfoSec Occupational Categories - Interview with California CISO Mark Weatherford",
"pubdate": "20090806"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/confront-security-challenge-interview-cybersecurity-sage-howard-schmidt-directLink-i-310.mp3",
"title": "Confront the IT Security Challenge - Interview with Cybersecurity Sage Howard Schmidt",
"pubdate": "20090805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/need-for-forensics-interview-keith-barger-kpmg-directLink-i-309.mp3",
"title": "The Need for Forensics - Interview with Keith Barger of KPMG",
"pubdate": "20090805"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-essentials-peter-allor-firstorg-directLink-i-307.mp3",
"title": "Incident Response Essentials - Peter Allor, FIRST.org",
"pubdate": "20090801"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/business-continuity-preparing-for-h1n1-beyond-directLink-i-306.mp3",
"title": "Business Continuity: Preparing for H1N1 and Beyond",
"pubdate": "20090731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unique-programs-information-assurance-at-capella-university-directLink-i-305.mp3",
"title": "Unique Programs: Information Assurance at Capella University",
"pubdate": "20090731"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/valuing-fisma-interview-immigration-customs-enforcement-ciso-gil-vega-directLink-i-304.mp3",
"title": "Valuing FISMA: Interview with Immigration and Customs Enforcement CISO Gil Vega",
"pubdate": "20090729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/we-want-to-be-recognized-as-leading-school-in-world-pradeep-khosla-carnegie-mellon-university-directLink-i-303.mp3",
"title": "\\\"We Want to Be Recognized as the Leading ... School in the World\\\" - Pradeep Khosla, Carnegie Mellon University",
"pubdate": "20090729"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-rhode-island-size-be-deceptive-interview-rhode-island-cio-jack-landers-ciso-ernie-quaglieri-directLink-i-302.mp3",
"title": "In Rhode Island, Size Can be Deceptive - Interview with Rhode Island CIO Jack Landers and CISO Ernie Quaglieri",
"pubdate": "20090727"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/criticality-credentialing-verifying-government-employee-identities-directLink-i-301.mp3",
"title": "Criticality of Credentialing: Verifying Government Employee Identities",
"pubdate": "20090724"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/mastering-information-security-new-graduate-program-debuts-at-esu-directLink-i-299.mp3",
"title": "Mastering Information Security - New Graduate Program Debuts at ESU",
"pubdate": "20090722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-ciso-part-2-directLink-i-298.mp3",
"title": "The CISOs CISO: Part 2",
"pubdate": "20090722"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cisos-ciso-directLink-i-297.mp3",
"title": "The CISOs CISO",
"pubdate": "20090721"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/collaboration-keeping-in-kansas-safe-interview-kansas-ciso-larry-kettlewell-directLink-i-296.mp3",
"title": "Collaboration: Keeping IT in Kansas Safe - Interview with Kansas CISO Larry Kettlewell",
"pubdate": "20090720"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-lures-higher-paid-security-pros-interview-minnesota-ciso-chris-buse-directLink-i-292.mp3",
"title": "State Lures Higher-Paid IT Security Pros - Interview with Minnesota CISO Chris Buse",
"pubdate": "20090717"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-scarce-money-no-excuses-directLink-i-289.mp3",
"title": "IT Security: Scarce Money, No Excuses",
"pubdate": "20090715"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-praise-fisma-directLink-i-287.mp3",
"title": "In Praise of FISMA",
"pubdate": "20090714"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/incident-response-for-data-breaches-shane-sims-pricewaterhousecoopers-directLink-i-284.mp3",
"title": "Incident Response for Data Breaches - Shane Sims, PricewaterhouseCoopers",
"pubdate": "20090711"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-terrorism-exist-interview-jim-harper-cato-institute-directLink-i-283.mp3",
"title": "Can Cyber Terrorism Exist? - Interview with Jim Harper of The Cato Institute",
"pubdate": "20090711"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unique-programs-excellence-in-information-assurance-university-dallas-directLink-i-282.mp3",
"title": "Unique Programs: Excellence in Information Assurance, University of Dallas",
"pubdate": "20090710"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/marrying-physical-virtual-security-interview-honolulu-cio-gordon-bruce-directLink-i-281.mp3",
"title": "Marrying Physical, Virtual Security - Interview with Honolulu CIO Gordon Bruce",
"pubdate": "20090708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-basics-rights-interview-jerry-davis-nasa-deputy-chief-information-officer-for-security-directLink-i-280.mp3",
"title": "Getting the Basics Rights - Interview with Jerry Davis, NASA deputy chief information officer for IT security.",
"pubdate": "20090708"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/unique-programs-enterprise-risk-management-at-nc-state-directLink-i-278.mp3",
"title": "Unique Programs: Enterprise Risk Management at NC State",
"pubdate": "20090706"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/match-game-security-controls-reported-incidents-interview-john-streufert-state-department-deputy-cio-ciso-part-2-directLink-i-277.mp3",
"title": "Match Game: Security Controls and Reported Incidents - Interview with John Streufert, State Department Deputy CIO and CISO, Part 2",
"pubdate": "20090706"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/beyond-fisma-state-depts-next-gen-metric-interview-john-streufert-state-department-deputy-cio-ciso-directLink-i-276.mp3",
"title": "Beyond FISMA: State Dept.\"s Next Gen Metric - Interview with John Streufert, State Department Deputy CIO and CISO",
"pubdate": "20090702"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/4-key-areas-cybersecurity-rd-directLink-i-271.mp3",
"title": "4 Key Areas of Cybersecurity R&D",
"pubdate": "20090625"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/audit-risk-trends-insights-from-david-melnick-deloitte-directLink-i-267.mp3",
"title": "Audit, Risk Trends: Insights from David Melnick of Deloitte",
"pubdate": "20090622"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/yearly-security-awareness-training-isnt-enough-interview-hord-tipton-isc2-directLink-i-266.mp3",
"title": "Yearly Security Awareness Training Isn\"t Enough - Interview with Hord Tipton of (ISC)2",
"pubdate": "20090618"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-pros-collaborate-on-privacy-act-rewrite-interview-ari-schwartz-center-for-democracy-technology-directLink-i-263.mp3",
"title": "IT Security Pros Collaborate on Privacy Act Rewrite - Interview with Ari Schwartz of the Center for Democracy and Technology",
"pubdate": "20090616"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-security-education-expanding-career-opportunities-through-advanced-education-at-regis-university-directLink-i-262.mp3",
"title": "Information Security Education: Expanding Career Opportunities Through Advanced Education at Regis University",
"pubdate": "20090616"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/in-silence-cybersecurity-action-interview-jim-flyzk-former-treasury-cio-directLink-i-261.mp3",
"title": "In Silence, Cybersecurity Action - Interview with Jim Flyzk, former Treasury CIO",
"pubdate": "20090613"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pandemic-update-regina-phelps-on-level-6-what-means-directLink-i-260.mp3",
"title": "Pandemic Update: Regina Phelps on Level 6 and What it Means",
"pubdate": "20090612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/michigans-pass-fail-security-challenge-interview-michigan-cto-dan-lohrmann-directLink-i-257.mp3",
"title": "Michigan\"s Pass-Fail IT Security Challenge - Interview with Michigan CTO Dan Lohrmann",
"pubdate": "20090612"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/red-flags-privacy-ftc-insights-from-joel-winston-directLink-i-256.mp3",
"title": "Red Flags and Privacy: FTC Insights from Joel Winston",
"pubdate": "20090611"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/finding-cybersecurity-talent-interview-tom-stanton-johns-hopkins-university-directLink-i-254.mp3",
"title": "Finding Cybersecurity Talent - Interview with Tom Stanton of Johns Hopkins University",
"pubdate": "20090610"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/obamas-cyber-plan-needs-more-oomph-interview-eugene-spafford-purdue-university-directLink-i-253.mp3",
"title": "Obama\"s Cyber Plan Needs More Oomph - Interview with Eugene Spafford of Purdue University",
"pubdate": "20090609"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/call-for-privacy-act-to-catch-up-interview-dan-chenok-directLink-i-250.mp3",
"title": "Call for Privacy Act to Catch Up with IT - Interview with Dan Chenok",
"pubdate": "20090605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-your-own-guidance-interview-charlotte-ciso-randy-moulton-directLink-i-249.mp3",
"title": "Creating Your Own Guidance - Interview with Charlotte CISO Randy Moulton",
"pubdate": "20090605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-lawmaker-high-rank-for-cyber-czar-interview-rep-james-langevin-directLink-i-247.mp3",
"title": "Key Lawmaker: High Rank for Cyber Czar - Interview with Rep. James Langevin",
"pubdate": "20090603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/so-you-want-to-work-in-cybersecurity-nadia-short-general-dynamics-directLink-i-246.mp3",
"title": "\\\"So, You Want to Work in Cybersecurity?\\\" - Nadia Short of General Dynamics",
"pubdate": "20090603"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/red-team-primer-directLink-i-244.mp3",
"title": "A Red Team Primer",
"pubdate": "20090529"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/if-i-were-starting-my-career-today-interview-steve-katz-directLink-i-241.mp3",
"title": "\\\"If I Were Starting My Career Today...\\\" - Interview with Steve Katz",
"pubdate": "20090523"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/from-audit-guidelines-to-red-team-attacks-interview-former-air-force-cio-john-gilligan-part-2-directLink-i-236.mp3",
"title": "From Audit Guidelines to Red Team Attacks - Interview with Former Air Force CIO John Gilligan, Part 2",
"pubdate": "20090519"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/embezzlement-find-liars-cheaters-thieves-directLink-i-235.mp3",
"title": "Embezzlement: Find the Liars, Cheaters and Thieves",
"pubdate": "20090516"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/securing-off-the-shelf-it-directLink-i-234.mp3",
"title": "Securing Off-The-Shelf IT",
"pubdate": "20090515"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/creating-security-culture-interview-vermont-ciso-kris-rowley-directLink-i-233.mp3",
"title": "Creating an IT Security Culture - Interview with Vermont CISO Kris Rowley",
"pubdate": "20090514"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-opportunities-in-information-security-interview-gerald-masson-director-johns-hopkins-university-information-security-institute-directLink-i-232.mp3",
"title": "New Opportunities in Information Security - Interview with Gerald Masson, Director of Johns Hopkins University Information Security Institute",
"pubdate": "20090514"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/disas-cloud-computing-initiatives-directLink-i-229.mp3",
"title": "DISA\"s Cloud Computing Initiatives",
"pubdate": "20090430"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-you-dont-know-about-worlds-worst-breaches-dr-peter-tippett-on-2009-data-breach-investigations-report-directLink-i-228.mp3",
"title": "What You Don\"t Know About the World\"s Worst Breaches - Dr. Peter Tippett on the 2009 Data Breach Investigations Report",
"pubdate": "20090429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/swine-flu-this-could-be-our-next-pandemic-regina-phelps-emergency-management-expert-directLink-i-227.mp3",
"title": "Swine Flu: \\\"This Could be Our Next Pandemic\\\" - Regina Phelps, Emergency Management Expert",
"pubdate": "20090427"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/future-information-security-interview-john-rossi-national-defense-university-directLink-i-225.mp3",
"title": "The Future of Information Security: Interview with John Rossi, National Defense University",
"pubdate": "20090418"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/safeguarding-new-tech-navy-cio-robert-carey-directLink-i-224.mp3",
"title": "Safeguarding New Tech: Navy CIO Robert Carey",
"pubdate": "20090415"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/federal-security-alignment-navy-cio-robert-carey-directLink-i-223.mp3",
"title": "Federal IT Security Alignment: Navy CIO Robert Carey",
"pubdate": "20090415"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/what-are-you-doing-to-protect-my-information-sidney-pearl-unisys-on-consumer-security-concerns-directLink-i-222.mp3",
"title": "\"What Are You Doing to Protect My Information?\" - Sidney Pearl of Unisys on Consumer Security Concerns",
"pubdate": "20090404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/one-most-generous-scholarships-ive-ever-seen-victor-piotrowski-nsf-on-scholarship-for-service-program-directLink-i-221.mp3",
"title": "\\\"One of the Most Generous Scholarships I\"ve Ever Seen\\\" - Victor Piotrowski of the NSF on the Scholarship for Service Program.",
"pubdate": "20090404"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/privacy-issues-education-peter-kosmala-international-association-privacy-professionals-directLink-i-219.mp3",
"title": "Privacy Issues and Education: Peter Kosmala, International Association of Privacy Professionals",
"pubdate": "20090402"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/whats-happening-at-nist-curtis-barker-directLink-i-218.mp3",
"title": "What\"s Happening at NIST: Curtis Barker",
"pubdate": "20090401"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/data-privacy-trends-randy-sabett-information-security-attorney-directLink-i-216.mp3",
"title": "Data Privacy Trends: Randy Sabett, Information Security Attorney",
"pubdate": "20090327"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/information-resources-management-college-director-robert-childs-directLink-i-207.mp3",
"title": "Information Resources Management College: Director Robert Childs",
"pubdate": "20090314"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/defining-information-security-metrics-ron-ross-nist-directLink-i-205.mp3",
"title": "Defining Information Security Metrics: Ron Ross of NIST",
"pubdate": "20090311"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risk-management-priorities-joe-restoule-president-rims-directLink-i-204.mp3",
"title": "Risk Management Priorities: Joe Restoule, President of RIMS",
"pubdate": "20090310"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/invest-in-your-career-pat-myers-chair-isc2-directLink-i-203.mp3",
"title": "Invest in Your Career: Pat Myers, Chair of (ISC)2",
"pubdate": "20090307"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-education-lawrence-rogers-cert-directLink-i-201.mp3",
"title": "Cybersecurity Education: Lawrence Rogers of CERT",
"pubdate": "20090304"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fisma-author-on-reform-former-rep-tom-davis-directLink-i-200.mp3",
"title": "FISMA Author on Reform: Former Rep. Tom Davis",
"pubdate": "20090303"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/insights-on-insider-threat-randy-trzeciak-carnegie-mellons-cert-directLink-i-197.mp3",
"title": "Insights on the Insider Threat: Randy Trzeciak of Carnegie Mellon\"s CERT",
"pubdate": "20090226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advising-obama-on-cybersecurity-part-2-ret-air-force-lt-gen-harry-raduege-directLink-i-196.mp3",
"title": "Advising Obama on Cybersecurity Part 2: Ret. Air Force Lt. Gen. Harry Raduege",
"pubdate": "20090226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/advising-obama-on-cybersecurity-part-1-ret-air-force-lt-gen-harry-raduege-directLink-i-195.mp3",
"title": "Advising Obama on Cybersecurity Part 1: Ret. Air Force Lt. Gen. Harry Raduege",
"pubdate": "20090226"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/probing-federal-security-programs-gregory-wilshusen-gao-directLink-i-193.mp3",
"title": "Probing Federal IT Security Programs: Gregory Wilshusen, GAO",
"pubdate": "20090224"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-accountability-paul-kurtz-cyber-security-advisor-directLink-i-192.mp3",
"title": "Security & Accountability: Paul Kurtz, Cyber Security Advisor",
"pubdate": "20090220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-earn-masters-in-business-continuity-john-orlando-norwich-university-directLink-i-191.mp3",
"title": "How to Earn a Master\"s in Business Continuity: John Orlando, Norwich University",
"pubdate": "20090220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-earn-masters-in-information-assurance-john-orlando-norwich-university-directLink-i-190.mp3",
"title": "How to Earn a Master\"s in Information Assurance: John Orlando, Norwich University",
"pubdate": "20090220"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/anatomy-data-breach-investigation-alain-sheer-ftc-attorney-directLink-i-187.mp3",
"title": "Anatomy of a Data Breach Investigation: Alain Sheer, FTC Attorney",
"pubdate": "20090218"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fisma-reforms-outlined-senator-tom-carper-directLink-i-186.mp3",
"title": "FISMA Reforms Outlined: Senator Tom Carper",
"pubdate": "20090217"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2009-identity-fraud-report-james-van-dyke-javelin-strategy-research-directLink-i-180.mp3",
"title": "2009 Identity Fraud Report: James Van Dyke, Javelin Strategy & Research",
"pubdate": "20090209"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/heartland-breach-what-means-to-banking-institutions-james-van-dyke-javelin-strategy-research-directLink-i-175.mp3",
"title": "Heartland Breach -- What it Means to Banking Institutions: James Van Dyke, Javelin Strategy & Research",
"pubdate": "20090129"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-education-meeting-business-needs-dr-peter-stephenson-norwich-university-directLink-i-173.mp3",
"title": "Security Education -- Meeting Business Needs: Dr. Peter Stephenson, Norwich University",
"pubdate": "20090120"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/new-face-id-theft-linda-foley-identity-theft-resource-center-directLink-i-166.mp3",
"title": "The New Face of ID Theft: Linda Foley, Identity Theft Resource Center",
"pubdate": "20081210"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/carnegie-mellon-university-survey-insights-boards-directors-dont-get-it-directLink-i-165.mp3",
"title": "Carnegie Mellon University Survey Insights: Why Boards of Directors Don\"t Get it",
"pubdate": "20081206"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/2009-career-trends-in-information-security-w-hord-tipton-isc-directLink-i-162.mp3",
"title": "2009 Career Trends in Information Security: W. Hord Tipton, (ISC)²",
"pubdate": "20081203"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/state-information-security-education-prof-eugene-spafford-directLink-i-132.mp3",
"title": "The State of Information Security Education: Prof. Eugene Spafford",
"pubdate": "20080823"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/lessons-learned-from-tjx-eric-fiterman-cyber-crime-expert-directLink-i-130.mp3",
"title": "Lessons Learned from TJX: Eric Fiterman, Cyber Crime Expert",
"pubdate": "20080814"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/growing-business-role-for-security-leaders-john-pironti-isaca-directLink-i-120.mp3",
"title": "The Growing Business Role for Security Leaders: John Pironti, ISACA",
"pubdate": "20080605"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/workplace-violence-what-you-need-to-know-kim-matlon-crisis-expert-directLink-i-113.mp3",
"title": "Workplace Violence -- What You Need to Know: Kim Matlon, Crisis Expert",
"pubdate": "20080429"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/fighting-mobile-malware-hydra-directLink-9-i-3052.mp3",
"title": "Fighting the Mobile Malware Hydra",
"pubdate": "19700101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/case-for-privileged-id-management-directLink-9-i-2716.mp3",
"title": "The Case for Privileged ID Management",
"pubdate": "19700101"
},
{
"file": "https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brent-williams-directLink-i-1381.mp3",
"title": "Brent Williams",
"pubdate": "19700101"
}
],
"likes": 0,
"updated_at": "2021-02-05 17:00:00",
"title": "Government Information Security Podcast",
"created_at": "2012-02-24 12:53:35",
"thumbnail": "http://img.podbbang.com/img/pb_m/thumb/x150/1780.png?time=202002171501"
}