<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
<!--

      ******************************************************************
      *     This is an RSS feed. It's what makes your podcast work.    *
      *    You can submit it to directories to get your show listed.   *
      *              For guides on how to do this, visit               *
      * https://help.podcast.co/submitting-your-podcast-to-directories *
      ******************************************************************

-->
  <channel>
    <itunes:type>episodic</itunes:type>
<description><![CDATA[<p>Cyber risk made clear for busy leaders. Cyber threats move fast. Your business must move faster. In every episode, Kip Boyle—author of "Fire Doesn’t Innovate" and CISO at Cyber Risk Opportunities—joins cybersecurity attorney and CISSP Jake Bernstein to break down the latest cyber risk. You’ll hear plain-English explanations of what's going on and what you need to do about it. No jargon. No doom. Just clear steps you can use today to save money, win buy-in, and stay out of the headlines.</p>]]></description>
<itunes:subtitle>Cyber risk made clear for busy leaders</itunes:subtitle>
<title>Cyber Risk Management Podcast</title>

<copyright>2025 Cyber Risk Opportunities</copyright>
<itunes:author>Kip Boyle</itunes:author>
<itunes:category text="Technology">
  </itunes:category>
<itunes:category text="Business">
    <itunes:category text="Careers" />
  </itunes:category>
<itunes:explicit>false</itunes:explicit>
<itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
<itunes:owner>
  <itunes:name>Kip Boyle</itunes:name>
  <itunes:email>Kip@CyberRiskOpportunities.com</itunes:email>
</itunes:owner>
<language>en-US</language>
<link>https://www.cr-map.com/podcast</link>

<link rel="hub" href="https://pubsubhubbub.appspot.com/"/>

        
<item>
  <description>
    <![CDATA[<p>What happens when a cybersecurity team designs controls without asking the business what they need? And what role exists specifically to prevent that? Let's find out with our guests Brian Shea and Maggie Amato, former Business Information Security Officers at Salesforce. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>Brian Shea's LinkedIn profile -- <a href="https://www.linkedin.com/in/brianshea/" target="_blank">https://www.linkedin.com/in/brianshea/</a></p>

<p>Maggie Amato's LinkedIn profile -- <a href="https://www.linkedin.com/in/maggie-amato-021624164/" target="_blank">https://www.linkedin.com/in/maggie-amato-021624164/</a></p>]]>
  </description>
  <itunes:title>EP 207: Defend the Business from Cybersecurity</itunes:title>
  <title>EP 207: Defend the Business from Cybersecurity</title>

    <enclosure length="43462873" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/a84b5eca-2ae0-48b2-a77b-4e16a089f194.mp3" />
  <itunes:duration>00:45:16</itunes:duration>
    <guid isPermaLink="false">a84b5eca-2ae0-48b2-a77b-4e16a089f194</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>207</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-207-defend-the-business-from-cybersecurity</link>
    <pubDate>Tue, 07 Apr 2026 15:00:26 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Fire hasn't changed since the dawn of humanity, but our cyber adversaries evolve every single day. What happens when organizations spend $10 on AI transformation for every $1 on cybersecurity? In this special ROCon 2025 keynote replay, Kip shares two stories that changed how he thinks about risk: a "perfect" employee who became an insider threat in four weeks, and a $12M deepfake that defeated every technical control on the dashboard. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>Get Kip's book, "Fire Doesn't Innovate" 2nd Edition -- <a href="https://a.co/d/0bYatohy" target="_blank">https://a.co/d/0bYatohy</a></p>]]>
  </description>
  <itunes:title>EP 206: Fire Doesn&#039;t Innovate. AI Does. Are You Ready?</itunes:title>
  <title>EP 206: Fire Doesn&#039;t Innovate. AI Does. Are You Ready?</title>

    <enclosure length="30248320" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b9d0794c-67aa-45e1-8ebd-596fe648f5f3.mp3" />
  <itunes:duration>00:31:30</itunes:duration>
    <guid isPermaLink="false">b9d0794c-67aa-45e1-8ebd-596fe648f5f3</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>206</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-206-fire-doesn-t-innovate-ai-does-are-you-ready</link>
    <pubDate>Tue, 24 Mar 2026 15:00:25 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Privacy laws keep multiplying, regulations keep changing, and AI is making everything more complex. How do businesses build privacy compliance that actually sticks instead of just checking a box? Let's find out with our guest Jordan Fischer, Founder and Partner at Fischer Law and Cybersecurity Lecturer at UC Berkeley. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>Jordan Fischer's website: <a href="https://jordanfischerlaw.com" target="_blank">https://jordanfischerlaw.com</a></p>

<p> </p>

<p>Shoshana Zuboff's book: <a href="https://en.wikipedia.org/wiki/The_Age_of_Surveillance_Capitalism" target="_blank">https://en.wikipedia.org/wiki/The_Age_of_Surveillance_Capitalism</a></p>]]>
  </description>
  <itunes:title>EP 205: Making Privacy Compliance Sustainable</itunes:title>
  <title>EP 205: Making Privacy Compliance Sustainable</title>

    <enclosure length="40356638" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/1593e21c-5fdb-47cb-b9e2-a3a293d42bc8.mp3" />
  <itunes:duration>00:42:02</itunes:duration>
    <guid isPermaLink="false">1593e21c-5fdb-47cb-b9e2-a3a293d42bc8</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>205</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-205-making-privacy-compliance-sustainable</link>
    <pubDate>Tue, 10 Mar 2026 15:00:22 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Most cybersecurity people talk at CFOs instead of with them. What if there were a simple test to know when a CFO wants to learn about cyber risk versus when they just need someone to trust? Let's find out with our guest James Wheeler, a highly experienced CFO who now runs <a href="http://kept.pro" target="_blank">kept.pro</a>, providing fractional accounting teams to businesses across the country. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>LinkedIn: <a href="https://www.linkedin.com/in/jamesdavidwheeler/" target="_blank">https://www.linkedin.com/in/jamesdavidwheeler/</a></p>

<p> </p>

<p>"Fire Doesn't Innovate" by Kip Boyle: <a href="https://a.co/d/0bYatohy" target="_blank">https://a.co/d/0bYatohy</a></p>]]>
  </description>
  <itunes:title>EP 204: Carpets and Diamonds</itunes:title>
  <title>EP 204: Carpets and Diamonds</title>

    <enclosure length="48083408" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c20fcd40-ac2f-4e50-8e28-9b2f10e4b198.mp3" />
  <itunes:duration>00:50:05</itunes:duration>
    <guid isPermaLink="false">c20fcd40-ac2f-4e50-8e28-9b2f10e4b198</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>204</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-204-carpets-and-diamonds</link>
    <pubDate>Tue, 24 Feb 2026 16:00:24 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Can cyber risk actually be measured in dollars? How do you know if your risk data vendor is any good? And is cyber insurance really worth the investment? Let's find out with our guest Scott Stransky, who leads the Cyber Risk Intelligence Center at Marsh and was named 2023 Cyber Risk Industry Person of the Year. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates. </p>

<p><br /></p>

<p>LinkedIn profile -- <a href="https://www.linkedin.com/in/scott-stransky-92659095/" target="_blank">https://www.linkedin.com/in/scott-stransky-92659095/</a></p>

<p><br /></p>

<p>Top 12 Report -- <a href="https://www.marsh.com/en/services/cyber-risk/insights/cybersecurity-signals.html" target="_blank">https://www.marsh.com/en/services/cyber-risk/insights/cybersecurity-signals.html</a>                       </p>

<p> </p>

<p>Marsh Cyber Risk Intelligence Center -- <a href="https://www.corporate.marsh.com/solutions/cyber-resilience/cyber-risk-intelligence-center.html" target="_blank">https://www.corporate.marsh.com/solutions/cyber-resilience/cyber-risk-intelligence-center.html</a>  </p>]]>
  </description>
  <itunes:title>EP 203: Cyber Risk Quantification</itunes:title>
  <title>EP 203: Cyber Risk Quantification</title>

    <enclosure length="46580002" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/724df1fe-545a-4b47-82f1-b032f574062f.mp3" />
  <itunes:duration>00:48:31</itunes:duration>
    <guid isPermaLink="false">724df1fe-545a-4b47-82f1-b032f574062f</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>203</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-203-guest-scott-stransky</link>
    <pubDate>Tue, 10 Feb 2026 16:00:22 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Why do IT organizations cling to ancient technology like Windows 2003, creating dangerous technical debt they don't even recognize? And how do they get out of this trap? Let's find out with our guest Anton Chuvakin, who advises the biggest customers of Google's Cloud services. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>LinkedIn profile -- <a href="https://www.linkedin.com/in/chuvakin/" target="_blank">https://www.linkedin.com/in/chuvakin/</a></p>

<p> </p>

<p>Podcast -- <a href="https://cloud.withgoogle.com/cloudsecurity/podcast/" target="_blank">https://cloud.withgoogle.com/cloudsecurity/podcast/</a></p>]]>
  </description>
  <itunes:title>EP 202: Why Fortune 500s Still Run on Windows 2003</itunes:title>
  <title>EP 202: Why Fortune 500s Still Run on Windows 2003</title>

    <enclosure length="36733314" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/791e3702-9044-40c3-a11f-048134028c4e.mp3" />
  <itunes:duration>00:38:15</itunes:duration>
    <guid isPermaLink="false">791e3702-9044-40c3-a11f-048134028c4e</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>202</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-202-why-fortune-500s-still-run-on-windows-2003</link>
    <pubDate>Tue, 27 Jan 2026 16:00:26 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>AI-driven attacks aren't coming; they're here. A Chinese state-sponsored group just ran cyber espionage operations that were 80 to 90 percent autonomous. What does this means for defenders? Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>Here's Anthropic's report -- <a href="https://www.anthropic.com/news/disrupting-AI-espionage" target="_blank">https://www.anthropic.com/news/disrupting-AI-espionage</a></p>

<p> </p>]]>
  </description>
  <itunes:title>EP 201: AI Powered Espionage</itunes:title>
  <title>EP 201: AI Powered Espionage</title>

    <enclosure length="43068314" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/cba254c0-e085-4774-9d6e-4b941069aa11.mp3" />
  <itunes:duration>00:44:51</itunes:duration>
    <guid isPermaLink="false">cba254c0-e085-4774-9d6e-4b941069aa11</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>201</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-201-ai-powered-espionage</link>
    <pubDate>Tue, 13 Jan 2026 16:00:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>AI can supercharge your security team. But it can also supercharge attackers. So how do you stay ahead in an AI-powered threat landscape? Let's find out in our special 200th episode! Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>Kip's keynote address -- <a href="https://youtu.be/DNRNbT0IaKM" target="_blank">https://youtu.be/DNRNbT0IaKM</a></p>

<p>"Fire Doesn’t Innovate: Thriving in the Face of Evolving Cyber Risks"</p>

<p>In this ROCon 2025 keynote, Kip Boyle challenges audiences to rethink how they approach modern threats in the age of AI. Using the metaphor of fire — a static risk that hasn’t changed for millennia — Kip explores how cyber adversaries are innovating daily while many organizations remain trapped in outdated mindsets. He closes with a compelling call to action: adapt like firefighters did with fire — or risk being left behind.</p>]]>
  </description>
  <itunes:title>EP200: Future of Cyber Defense</itunes:title>
  <title>EP200: Future of Cyber Defense</title>

    <enclosure length="43487514" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/5126b89a-6321-4671-8572-1a15961c8430.mp3" />
  <itunes:duration>00:45:17</itunes:duration>
    <guid isPermaLink="false">5126b89a-6321-4671-8572-1a15961c8430</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>200</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep200-future-of-cyber-defense</link>
    <pubDate>Tue, 30 Dec 2025 16:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How has GenAI turned phishing Into a speed war? And what should we do about it? Let's find out with your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 199: AI Phishing at SecureWorld Seattle</itunes:title>
  <title>EP 199: AI Phishing at SecureWorld Seattle</title>

    <enclosure length="18837092" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/9b348862-cd90-4e46-b5e2-a675c868698c.mp3" />
  <itunes:duration>00:19:37</itunes:duration>
    <guid isPermaLink="false">9b348862-cd90-4e46-b5e2-a675c868698c</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>199</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-199-ai-phishing-at-secureworld-seattle</link>
    <pubDate>Tue, 16 Dec 2025 16:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What happens when a HIPAA Business Associate Agreement gets tested in court after a ransomware attack? And what can we learn from it? Let's find out with your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>"New HIPAA Security Rule" episode:</p>

<p><a href="https://cr-map.com/podcast/178" target="_blank">https://cr-map.com/podcast/178</a></p>]]>
  </description>
  <itunes:title>EP 198: Breaches within Breaches (Contract Obligations post security incident)</itunes:title>
  <title>EP 198: Breaches within Breaches (Contract Obligations post security incident)</title>

    <enclosure length="41159065" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/08ac3e24-814f-43bd-8707-a9c82e4dfc06.mp3" />
  <itunes:duration>00:42:52</itunes:duration>
    <guid isPermaLink="false">08ac3e24-814f-43bd-8707-a9c82e4dfc06</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>198</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-198-breaches-within-breaches-contract-obligations-post-security-incident</link>
    <pubDate>Tue, 02 Dec 2025 16:00:37 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What happens when critical third-party services go down? What do your vendors actually owe you when that happens? Are new regulations going to make a difference? Let's find out with our guest Dan Bowdan, Global Business CISO with Marsh McLennan. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>"Cyber Incident Reporting for Critical Infrastructure Act” (CIRCIA) episodes:</p>

<p> </p>

<p>https://cr-map.com/podcast/161</p>

<p>https://cr-map.com/podcast/162/</p>]]>
  </description>
  <itunes:title>EP 197: Operational Cyber Resilience</itunes:title>
  <title>EP 197: Operational Cyber Resilience</title>

    <enclosure length="41583752" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/82db2e80-1101-4a0c-9cc4-156e6b095cae.mp3" />
  <itunes:duration>00:43:18</itunes:duration>
    <guid isPermaLink="false">82db2e80-1101-4a0c-9cc4-156e6b095cae</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>197</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-197-operational-cyber-resilience</link>
    <pubDate>Tue, 18 Nov 2025 16:00:18 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>AI agents are everywhere: 91% of organizations already use them. But can we control these autonomous digital workers? And what happens when they go rogue? Let's find out with our guest Matthew Hansen, Regional Chief Security Officer for the Americas with Okta. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>NIST AI RMF episodes:</p>

<p> </p>

<p><a href="https://cr-map.com/podcast/153/" target="_blank">https://cr-map.com/podcast/153/</a></p>

<p><a href="https://cr-map.com/podcast/153/" target="_blank">https://cr-map.com/podcast/154/</a></p>]]>
  </description>
  <itunes:title>EP 196: Rogue AI Agents: What&#039;s Identity Got To Do With It?</itunes:title>
  <title>EP 196: Rogue AI Agents: What&#039;s Identity Got To Do With It?</title>

    <enclosure length="32214729" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/bc208ceb-fd19-477f-992f-a74252f03d02.mp3" />
  <itunes:duration>00:33:33</itunes:duration>
    <guid isPermaLink="false">bc208ceb-fd19-477f-992f-a74252f03d02</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>196</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-196-rogue-ai-agents-whats-identity-got-to-do-with-it</link>
    <pubDate>Tue, 04 Nov 2025 16:00:27 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Boards are getting the wrong cybersecurity information. But, what do boards really need to know? And how do we fix this problem? Let's find out with our guest Dr. Keri Pearlson, MIT Sloan School of Management. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>HBR Article -- <a href="https://hbr.org/2023/10/a-tool-to-help-boards-measure-cyber-resilience" target="_blank">https://hbr.org/2023/10/a-tool-to-help-boards-measure-cyber-resilience</a></p>

<p> </p>

<p>LinkedIn -- <a href="https://www.linkedin.com/in/kpearlson/" target="_blank">https://www.linkedin.com/in/kpearlson/</a></p>

<p> </p>

<p>Register for "Oktane on the Road in Seattle" -- <a href="https://regionalevents.okta.com/seattle-oor-exec-panel-okta" target="_blank">https://regionalevents.okta.com/seattle-oor-exec-panel-okta</a></p>]]>
  </description>
  <itunes:title>EP 195: Board Cyber Reporting: The Right Questions, The Right Data</itunes:title>
  <title>EP 195: Board Cyber Reporting: The Right Questions, The Right Data</title>

    <enclosure length="47978087" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c1fa0db9-02a2-402a-886e-5e94176eecdf.mp3" />
  <itunes:duration>00:49:58</itunes:duration>
    <guid isPermaLink="false">c1fa0db9-02a2-402a-886e-5e94176eecdf</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>195</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-195-board-cyber-reporting-the-right-questions-the-right-data</link>
    <pubDate>Tue, 21 Oct 2025 15:00:29 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Our brains in "autopilot mode" make us sitting ducks for phishing attacks. Why? And what we can do about it? Let's find out with our guest Lisa Petrocchi-Merriman, Executive Coach with "WorksWell Labs Coaching &amp; Training". Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>Email -- <a href="mailto:lisamerriman@workswell.info" target="_blank">lisamerriman@workswell.info</a></p>

<p> </p>

<p>LinkedIn -- <a href="https://www.linkedin.com/in/lisa-merriman/" target="_blank">https://www.linkedin.com/in/lisa-merriman/</a></p>

<p> </p>

<p>Register for "Oktane on the Road in Seattle" -- <a href="https://regionalevents.okta.com/seattle-oor-exec-panel-okta" target="_blank">https://regionalevents.okta.com/seattle-oor-exec-panel-okta</a></p>]]>
  </description>
  <itunes:title>EP 194: Why Are We Sitting Ducks for Phishing Attacks?</itunes:title>
  <title>EP 194: Why Are We Sitting Ducks for Phishing Attacks?</title>

    <enclosure length="38495861" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/651e8591-29ac-4625-8d71-2b14cb7d52b9.mp3" />
  <itunes:duration>00:40:05</itunes:duration>
    <guid isPermaLink="false">651e8591-29ac-4625-8d71-2b14cb7d52b9</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>194</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-194-why-are-we-sitting-ducks-for-phishing-attacks</link>
    <pubDate>Tue, 07 Oct 2025 15:00:25 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Getting full value from AI requires a huge technology transformation. How can leaders navigate AI transformation without losing their teams and their digital assets along the way? Let's find out with our guest Jenny Moshea, former CIO for Sellen Construction. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>LinkedIn profile -- <a href="https://www.linkedin.com/in/jmoshea/" target="_blank">https://www.linkedin.com/in/jmoshea/</a></p>

<p> </p>

<p>Free Guide -- <a href="https://getjennergy.com/" target="_blank">https://getjennergy.com/</a></p>

<p> </p>

<p>Website -- <a href="https://www.kinetiqshift.com/" target="_blank">https://www.kinetiqshift.com/</a></p>]]>
  </description>
  <itunes:title>EP 193: Secure AI Transformation</itunes:title>
  <title>EP 193: Secure AI Transformation</title>

    <enclosure length="39371037" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ac62ca56-a03c-45a5-856f-4375187c578b.mp3" />
  <itunes:duration>00:41:00</itunes:duration>
    <guid isPermaLink="false">ac62ca56-a03c-45a5-856f-4375187c578b</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>193</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-193-secure-ai-transformation</link>
    <pubDate>Tue, 23 Sep 2025 15:18:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How can generative AI transform your cybersecurity work without replacing your expertise? And why should you start experimenting now? Let's explore with our host Kip Boyle, CISO with Cyber Risk Opportunities, as he shares nearly three years of hands-on AI experience and practical strategies for staying ahead of the curve.</p>

<p> </p>

<p>“Delegate Smarter with People and AI: Lead More, Do Less.”</p>

<p><a href="https://maven.com/kipboyle/people-ai?promoCode=KIP50" target="_blank">https://maven.com/kipboyle/people-ai?promoCode=KIP50</a></p>]]>
  </description>
  <itunes:title>EP 192: How I Use AI (And You Can Too)</itunes:title>
  <title>EP 192: How I Use AI (And You Can Too)</title>

    <enclosure length="30070160" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/61740aad-d2fd-475a-9177-be9f892abf43.mp3" />
  <itunes:duration>00:31:19</itunes:duration>
    <guid isPermaLink="false">61740aad-d2fd-475a-9177-be9f892abf43</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>192</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-192-how-i-use-ai-and-you-can-too</link>
    <pubDate>Tue, 09 Sep 2025 15:00:30 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How would you add law enforcement as a valuable resource to your cybersecurity program? And why would you want to? Let's find out with our guest Supervisory Special Agent Douglas Domin of the Federal Bureau of Investigation. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p> </p>

<p>“Cyber Resilience in the Age of AI: Threats, Responses &amp; Human Stories” at MIT April 2025 -- <a href="https://youtu.be/6Jlg4tZV3TU" target="_blank">https://youtu.be/6Jlg4tZV3TU</a></p>

<p><br /></p>

<p> </p>

<p>FBI field office directory -- <a href="https://www.fbi.gov/contact-us/field-offices" target="_blank">https://www.fbi.gov/contact-us/field-offices</a></p>

<p><br /></p>

<p> </p>

<p>CISA/FBI/NSA Joint Advisories -- <a href="https://www.cisa.gov/news-events/cybersecurity-advisories" target="_blank">https://www.cisa.gov/news-events/cybersecurity-advisories</a></p>]]>
  </description>
  <itunes:title>EP 191: How to Make FBI Your Best Ally</itunes:title>
  <title>EP 191: How to Make FBI Your Best Ally</title>

    <enclosure length="30329708" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/773ad190-3323-4798-befb-372e84fbf67a.mp3" />
  <itunes:duration>00:31:35</itunes:duration>
    <guid isPermaLink="false">773ad190-3323-4798-befb-372e84fbf67a</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>191</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-191-how-to-make-fbi-your-best-ally</link>
    <pubDate>Tue, 26 Aug 2025 15:02:17 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How should individuals be thinking about generative artificial intelligence at work and at home? Let's find out with our guest Daniel Miessler, whose mission is “Working towards Human 3.0 so we can survive and thrive as humans after AI". Your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>Website: <a href="https://danielmiessler.com/" target="_blank">https://danielmiessler.com/</a></p>

<p>LinkedIn: <a href="https://www.linkedin.com/in/danielmiessler/" target="_blank">https://www.linkedin.com/in/danielmiessler/</a></p>

<p>X: <a href="https://x.com/DanielMiessler" target="_blank">https://x.com/DanielMiessler</a></p>

<p>Fabric: <a href="https://github.com/danielmiessler/fabric" target="_blank">https://github.com/danielmiessler/fabric</a></p>

<p>Blog Post: <a href="https://danielmiessler.com/p/weve-been-thinking-about-ai-all-wrong" target="_blank">https://danielmiessler.com/p/weve-been-thinking-about-ai-all-wrong</a></p>]]>
  </description>
  <itunes:title>EP 190: Augmented with AI (REPLAY)</itunes:title>
  <title>EP 190: Augmented with AI (REPLAY)</title>

    <enclosure length="43748730" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/6a2d83bf-0aeb-41e8-9067-0da35c8a79ef.mp3" />
  <itunes:duration>00:45:34</itunes:duration>
    <guid isPermaLink="false">6a2d83bf-0aeb-41e8-9067-0da35c8a79ef</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>190</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-190-augmented-with-ai-replay</link>
    <pubDate>Tue, 12 Aug 2025 15:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Unit 42 (Palo Alto Networks) just showed they can use AI to conduct a complete ransomware attack in 25 minutes, a 100x speed increase. What does this mean for defenders? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 189: Agentic AI and Ransomware</itunes:title>
  <title>EP 189: Agentic AI and Ransomware</title>

    <enclosure length="38714841" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c634d724-818b-493e-985f-b453d33762b1.mp3" />
  <itunes:duration>00:40:19</itunes:duration>
    <guid isPermaLink="false">c634d724-818b-493e-985f-b453d33762b1</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>189</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-189-agentic-ai-and-ransomware</link>
    <pubDate>Tue, 29 Jul 2025 15:00:24 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>And, here's part 2 of our annual Verizon Data Breach Investigations Report (DBIR) review! What's in the rest of the 2025 report? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 188: Verizon DBIR 2025 Part 2</itunes:title>
  <title>EP 188: Verizon DBIR 2025 Part 2</title>

    <enclosure length="45693086" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/3c136894-a81b-4ed1-99a4-4cdf75bfb129.mp3" />
  <itunes:duration>00:47:35</itunes:duration>
    <guid isPermaLink="false">3c136894-a81b-4ed1-99a4-4cdf75bfb129</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>188</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/verizon-dbir-2025-part-2</link>
    <pubDate>Tue, 15 Jul 2025 15:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>It's time for part 1 of our annual Verizon Data Breach Investigations Report (DBIR) review! What's new for 2025? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 187: Verizon DBIR 2025 Part 1</itunes:title>
  <title>EP 187: Verizon DBIR 2025 Part 1</title>

    <enclosure length="55718222" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d5793e8e-b167-40bb-b42c-deb82e6a5966.mp3" />
  <itunes:duration>00:58:02</itunes:duration>
    <guid isPermaLink="false">d5793e8e-b167-40bb-b42c-deb82e6a5966</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>187</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-187-verizon-dbir-2025-part-1</link>
    <pubDate>Tue, 01 Jul 2025 15:00:19 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The second edition of "Fire Doesn't Innovate" has dropped. What's new? Why it was updated? How can different types of readers get the most value from it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p> </p>

<p>You can pick up a copy of "Fire Doesn't Innovate" second edition (paperback or Kindle versions) -- <a href="https://a.co/d/64hzmxN" target="_blank">https://a.co/d/64hzmxN</a></p>

<p>See Episode 124 for full details on the “United Structures of America” case -- <a href="https://cr-map.com/podcast/124/" target="_blank">https://cr-map.com/podcast/124/</a></p>

<p>See Episode 136 for full details on the “iRobot lawsuit against Expeditors International” -- <a href="https://cr-map.com/podcast/136/" target="_blank">https://cr-map.com/podcast/136/</a></p>

<p>See Episode 141 for full details on the “NIST Cybersecurity Framework version 2” update -- <a href="https://cr-map.com/podcast/141/" target="_blank">https://cr-map.com/podcast/141/</a></p>]]>
  </description>
  <itunes:title>EP 186: &quot;Fire Doesn&#039;t Innovate&quot; second edition</itunes:title>
  <title>EP 186: &quot;Fire Doesn&#039;t Innovate&quot; second edition</title>

    <enclosure length="30792806" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/9728339c-92f4-42a3-88b1-bccd4971690f.mp3" />
  <itunes:duration>00:32:04</itunes:duration>
    <guid isPermaLink="false">9728339c-92f4-42a3-88b1-bccd4971690f</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>186</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-186-fire-doesn-t-innovate-second-edition</link>
    <pubDate>Tue, 17 Jun 2025 15:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Is evidence from Artificial Intelligence and Quantum Computing devices legally admissible in court? And how are courts actually handling this influx? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 185: Courts and Non-deterministic Computing </itunes:title>
  <title>EP 185: Courts and Non-deterministic Computing </title>

    <enclosure length="47963496" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f6c18e5a-8fac-468c-bb46-8add0acc68c8.mp3" />
  <itunes:duration>00:49:57</itunes:duration>
    <guid isPermaLink="false">f6c18e5a-8fac-468c-bb46-8add0acc68c8</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>185</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-185-courts-and-non-deterministic-computing</link>
    <pubDate>Tue, 03 Jun 2025 15:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Is the so-called "Insider Threat" a big deal? If so, how could you use a honeypot to catch them? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates. </p>

<p> </p>

<p>If you want to know more about honeypots, check out Kip's newest LinkedIn Learning course: “Active Defense: The New Frontier in Cybersecurity” -- <a href="https://www.linkedin.com/learning/active-defense-the-new-frontier-in-cybersecurity/" target="_blank">https://www.linkedin.com/learning/active-defense-the-new-frontier-in-cybersecurity/</a></p>]]>
  </description>
  <itunes:title>EP 184: Spies, Honeypots, and Lawsuits</itunes:title>
  <title>EP 184: Spies, Honeypots, and Lawsuits</title>

    <enclosure length="47335588" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/43c6acd7-ecda-447e-8724-5380ca825c6f.mp3" />
  <itunes:duration>00:39:26</itunes:duration>
    <guid isPermaLink="false">43c6acd7-ecda-447e-8724-5380ca825c6f</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>184</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-184-spies-honeypots-and-lawsuits</link>
    <pubDate>Tue, 20 May 2025 15:00:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The implementation manual for the NIST Cybersecurity Framework gone missing. Can it be found? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates. </p>

<p> </p>

<p>Want a deep discount on Kip's new Udemy course "Implement version 2 of NIST Cybersecurity Framework"? This one is valid until May 31, 2025 -- CRM_PODCAST_FRIEND</p>

<p> </p>

<p><a href="https://www.udemy.com/course/implement-version-2-of-nist-cybersecurity-framework/?couponCode=CRM_PODCAST_FRIEND" target="_blank">https://www.udemy.com/course/implement-version-2-of-nist-cybersecurity-framework/?couponCode=CRM_PODCAST_FRIEND</a></p>

<p> </p>

<p>If you need to quickly get up-to-speed with the changes in NCSF v2 listen to this episode -- <a href="https://cr-map.com/podcast/141/" target="_blank">https://cr-map.com/podcast/141/</a></p>]]>
  </description>
  <itunes:title>EP 183: NIST CSF: The Missing Manual</itunes:title>
  <title>EP 183: NIST CSF: The Missing Manual</title>

    <enclosure length="60665874" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/07011afe-4eb4-48b5-ba77-b41f78b3a64a.mp3" />
  <itunes:duration>00:50:33</itunes:duration>
    <guid isPermaLink="false">07011afe-4eb4-48b5-ba77-b41f78b3a64a</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>183</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-183-nist-csf-the-missing-manual</link>
    <pubDate>Tue, 06 May 2025 15:00:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How much trust should you put in your Endpoint Detection and Response (EDR) solution? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates. </p>

<p> </p>

<p>Want to quickly come up to speed with the Essential Eight (E8)? Listen to this episode:</p>

<p> </p>

<p><a href="https://cr-map.com/podcast/63/" target="_blank">https://cr-map.com/podcast/63/</a></p>]]>
  </description>
  <itunes:title>EP 182: When Webcams Turn Evil</itunes:title>
  <title>EP 182: When Webcams Turn Evil</title>

    <enclosure length="36640498" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/87f485ea-5852-4760-aadb-ee03d341e199.mp3" />
  <itunes:duration>00:38:09</itunes:duration>
    <guid isPermaLink="false">87f485ea-5852-4760-aadb-ee03d341e199</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>182</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-182-when-webcams-turn-evil</link>
    <pubDate>Tue, 22 Apr 2025 15:00:22 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How can businesses securely and privately use AI tools? And, what are the top cyber risks of AI, anyway? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates. </p>

<p>Want to quickly come up to speed with the NIST AI Risk Management Framework? Listen to these two episodes:</p>

<p>Part 1 -- https://cr-map.com/podcast/153</p>

<p>Part 2 -- https://cr-map.com/podcast/154</p>]]>
  </description>
  <itunes:title>EP 181: Deploying AI Securely and Privately</itunes:title>
  <title>EP 181: Deploying AI Securely and Privately</title>

    <enclosure length="40706405" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/905e3c1b-a1cf-47dc-8cb1-85e2867081f3.mp3" />
  <itunes:duration>00:42:24</itunes:duration>
    <guid isPermaLink="false">905e3c1b-a1cf-47dc-8cb1-85e2867081f3</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>181</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-181-deploying-ai-securely-and-privately</link>
    <pubDate>Tue, 08 Apr 2025 15:00:27 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Tired of swinging the “compliance hammer” and hitting people until they submit to you? Would you rather be influential, and not dictatorial? Let's find out how you can with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>See our previous episode on the subject of "buy-in" with our guest Michael Gregg, the CISO of North Dakota -- <a href="https://cr-map.com/podcast/171/" target="_blank">https://cr-map.com/podcast/171/</a></p>]]>
  </description>
  <itunes:title>EP 180: The “Compliance Hammer” Alternative</itunes:title>
  <title>EP 180: The “Compliance Hammer” Alternative</title>

    <enclosure length="53957107" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c6569d9a-e4e9-4dce-9329-4d0b5df1ed6f.mp3" />
  <itunes:duration>00:44:57</itunes:duration>
    <guid isPermaLink="false">c6569d9a-e4e9-4dce-9329-4d0b5df1ed6f</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>180</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-180-the-compliance-hammer-alternative</link>
    <pubDate>Tue, 25 Mar 2025 15:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>You're a recently hired, lone cybersecurity analyst. Your mandate is to pay off on the data and system protection promises your senior decision makers made to an exciting new customer. Plot twist: You have no money. Now what? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 179: Cybersecurity With No Money</itunes:title>
  <title>EP 179: Cybersecurity With No Money</title>

    <enclosure length="43096290" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2ebe134d-5988-4153-a34d-bb4ef65a948b.mp3" />
  <itunes:duration>00:44:53</itunes:duration>
    <guid isPermaLink="false">2ebe134d-5988-4153-a34d-bb4ef65a948b</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>179</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-179-cybersecurity-with-money</link>
    <pubDate>Tue, 11 Mar 2025 15:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The US Government recently released a "notice of proposed rulemaking" to update the Security Standards for the Protection of Electronic Protected Health Information. Yes, this is HIPAA. But what will it mean for covered entities and their business associates? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Show notes:</p>

<p><a href="https://www.ecfr.gov/current/title-45/subtitle-A/subchapter-C/part-164/subpart-C" target="_blank">https://www.ecfr.gov/current/title-45/subtitle-A/subchapter-C/part-164/subpart-C</a></p>]]>
  </description>
  <itunes:title>EP 178: New HIPAA Security Rule</itunes:title>
  <title>EP 178: New HIPAA Security Rule</title>

    <enclosure length="45078253" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ea0a4910-bb94-47ad-95b7-0b0ffe902d14.mp3" />
  <itunes:duration>00:46:57</itunes:duration>
    <guid isPermaLink="false">ea0a4910-bb94-47ad-95b7-0b0ffe902d14</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>178</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-178-new-hipaa-security-rule</link>
    <pubDate>Tue, 25 Feb 2025 16:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How do you protect cybersecurity responders from workplace injuries, particularly PTSD from ransomware attacks? Is that even a thing? Let's find out with our guest Alexander Abney-King, a workplace psychologist and virtual CIO. He helps businesses adapt to world changes. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>LinkedIn profile -- <a href="https://www.linkedin.com/in/alexanderabney-king/" target="_blank">https://www.linkedin.com/in/alexanderabney-king/</a></p>

<p>Website -- <a href="https://www.secureittulsa.com/services/vcio" target="_blank">https://www.secureittulsa.com/services/vcio</a></p>]]>
  </description>
  <itunes:title>EP 177: Workplace Injuries from Ransomware</itunes:title>
  <title>EP 177: Workplace Injuries from Ransomware</title>

    <enclosure length="39032474" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/00587b2f-7731-4bc2-b810-0ddc716f7292.mp3" />
  <itunes:duration>00:40:39</itunes:duration>
    <guid isPermaLink="false">00587b2f-7731-4bc2-b810-0ddc716f7292</guid>
  <itunes:author>Kip Boye</itunes:author>
    <itunes:episode>177</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-177-workplace-injuries-from-ransomware</link>
    <pubDate>Tue, 11 Feb 2025 16:00:26 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>It’s our first time recording an episode LIVE with an audience. We were at the December 2024 the monthly membership meeting of the ISC2 Seattle Chapter. Our topic: What has NIST released in its Special Publication (SP) 800 series that could be of great value to your work? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>List of all SP 800 public releases: <a href="https://csrc.nist.gov/publications/sp800" target="_blank">https://csrc.nist.gov/publications/sp800</a></p>]]>
  </description>
  <itunes:title>EP 176: LIVE! Top 10 NIST SP 800-Series</itunes:title>
  <title>EP 176: LIVE! Top 10 NIST SP 800-Series</title>

    <enclosure length="48222147" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/663ba8e8-552f-413a-a1b5-5ffbad4e4747.mp3" />
  <itunes:duration>00:50:13</itunes:duration>
    <guid isPermaLink="false">663ba8e8-552f-413a-a1b5-5ffbad4e4747</guid>
  <itunes:author>Kip Boyle </itunes:author>
    <itunes:episode>176</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-176-live-top-10-nist-sp-800-series</link>
    <pubDate>Tue, 28 Jan 2025 16:00:24 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What's a "hacker"? Are they good or bad? How do they think? Can their thinking help us in other problem spaces? Let's find out with our guest Ted Harrington, who’s dedicated his career to ethical hacking in order to help organizations build better, more secure systems. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>LinkedIn profile -- <a href="https://www.linkedin.com/in/securityted/" target="_blank">https://www.linkedin.com/in/securityted/</a></p>

<p>Website -- <a href="https://www.tedharrington.com/" target="_blank">https://www.tedharrington.com/</a></p>]]>
  </description>
  <itunes:title>EP 175: What&#039;s a &quot;Hacker&quot;?</itunes:title>
  <title>EP 175: What&#039;s a &quot;Hacker&quot;?</title>

    <enclosure length="39032478" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2491df3c-7ebf-4455-bdb8-25918a08fa12.mp3" />
  <itunes:duration>00:40:39</itunes:duration>
    <guid isPermaLink="false">2491df3c-7ebf-4455-bdb8-25918a08fa12</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>175</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-175-whats-a-hacker</link>
    <pubDate>Tue, 14 Jan 2025 16:00:25 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Have you done a post-mortem of the CrowdStrike IT outage of 2024? What are the major lessons? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Incident background and impacts -- <a href="https://en.wikipedia.org/wiki/2024_CrowdStrike-related_IT_outages" target="_blank">https://en.wikipedia.org/wiki/2024_CrowdStrike-related_IT_outages</a></p>]]>
  </description>
  <itunes:title>EP 174: The CrowdStrike Episode</itunes:title>
  <title>EP 174: The CrowdStrike Episode</title>

    <enclosure length="41989123" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d7b2e764-1fe7-4c80-b8c2-d1131d15d873.mp3" />
  <itunes:duration>00:43:44</itunes:duration>
    <guid isPermaLink="false">d7b2e764-1fe7-4c80-b8c2-d1131d15d873</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>174</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-174-the-crowdstrike-episode</link>
    <pubDate>Tue, 31 Dec 2024 16:00:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What data do modern cars collect, how do they collect it, and why? And what should your company do about it? Let's find out with our guest Andrea Amico, the founder and CEO of Privacy4Cars. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>LinkedIn profile -- <a href="https://www.linkedin.com/in/%F0%9F%9B%A1%EF%B8%8F%F0%9F%9A%98-andrea-amico-a44aa/" target="_blank">https://www.linkedin.com/in/%F0%9F%9B%A1%EF%B8%8F%F0%9F%9A%98-andrea-amico-a44aa/</a></p>

<p>Website -- <a href="https://privacy4cars.com/" target="_blank">https://privacy4cars.com</a></p>

<p>Website – <a href="https://www.vehicleprivacyreport.com/" target="_blank">https://www.vehicleprivacyreport.com</a></p>]]>
  </description>
  <itunes:title>EP 173: Data Privacy in Cars</itunes:title>
  <title>EP 173: Data Privacy in Cars</title>

    <enclosure length="36978186" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/03e97e6e-8c8a-42c5-9324-3676d6ea600a.mp3" />
  <itunes:duration>00:38:31</itunes:duration>
    <guid isPermaLink="false">03e97e6e-8c8a-42c5-9324-3676d6ea600a</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>173</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-173-data-privacy-in-cars</link>
    <pubDate>Tue, 17 Dec 2024 16:00:35 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What does the CISO need to practice everyday in terms of basic legal literacy? Let's answer that question by looking through the lens of data breach and privacy class action litigation. Our guest is Douglas Brush, a court-appointed Special Master and testifying expert in high-profile litigations involving cybersecurity, information governance, data privacy, and eDiscovery. Your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Doug's LinkedIn profile -- <a href="https://www.linkedin.com/in/douglasabrush/" target="_blank">https://www.linkedin.com/in/douglasabrush/</a></p>

<p>Doug's Website -- <a href="https://brushcyber.com/" target="_blank">https://brushcyber.com/</a></p>]]>
  </description>
  <itunes:title>EP 172: Basic Legal Literacy for the CISO</itunes:title>
  <title>EP 172: Basic Legal Literacy for the CISO</title>

    <enclosure length="35243679" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b7e1782d-6f47-4f8b-b5db-7891cdf571df.mp3" />
  <itunes:duration>00:36:42</itunes:duration>
    <guid isPermaLink="false">b7e1782d-6f47-4f8b-b5db-7891cdf571df</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>172</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-172-basic-legal-literacy-for-the-ciso</link>
    <pubDate>Tue, 03 Dec 2024 16:00:26 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How can you get high levels of buy-in for a cybersecurity program at the state level? Let's find out with our guest Michael Gregg, the CISO of North Dakota. Your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>LinkedIn profile -- <a href="https://www.linkedin.com/in/michaelgregg01/" target="_blank">https://www.linkedin.com/in/michaelgregg01/</a></p>

<p>SecureWorld -- <a href="https://www.secureworld.io/events" target="_blank">https://www.secureworld.io/events</a></p>]]>
  </description>
  <itunes:title>EP 171: Getting Buy-In for Cybersecurity</itunes:title>
  <title>EP 171: Getting Buy-In for Cybersecurity</title>

    <enclosure length="37850885" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b322b9b3-e6b5-4539-b0ba-28d1a1e04aa9.mp3" />
  <itunes:duration>00:39:25</itunes:duration>
    <guid isPermaLink="false">b322b9b3-e6b5-4539-b0ba-28d1a1e04aa9</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>171</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-171-getting-buy-in-for-cybersecurity</link>
    <pubDate>Tue, 19 Nov 2024 16:00:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How should individuals be thinking about generative artificial intelligence at work and at home? Let's find out with our guest Daniel Miessler, whose mission is “Working towards Human 3.0 so we can survive and thrive as humans after AI". Your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Website: <a href="https://danielmiessler.com/" target="_blank">https://danielmiessler.com/</a></p>

<p>LinkedIn: <a href="https://www.linkedin.com/in/danielmiessler/" target="_blank">https://www.linkedin.com/in/danielmiessler/</a></p>

<p>X: <a href="https://x.com/DanielMiessler" target="_blank">https://x.com/DanielMiessler</a></p>

<p>Fabric: <a href="https://github.com/danielmiessler/fabric" target="_blank">https://github.com/danielmiessler/fabric</a></p>

<p>Blog Post: <a href="https://danielmiessler.com/p/weve-been-thinking-about-ai-all-wrong" target="_blank">https://danielmiessler.com/p/weve-been-thinking-about-ai-all-wrong</a></p>]]>
  </description>
  <itunes:title>EP 170: Augmented with AI</itunes:title>
  <title>EP 170: Augmented with AI</title>

    <enclosure length="43080415" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ea166f9e-7d94-45de-9f50-b8083f41010b.mp3" />
  <itunes:duration>00:44:52</itunes:duration>
    <guid isPermaLink="false">ea166f9e-7d94-45de-9f50-b8083f41010b</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>170</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-170-augmented-with-ai</link>
    <pubDate>Tue, 05 Nov 2024 16:00:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What's the current cybersecurity hiring manager’s perspective on hiring? Talent scouting, employer reputation, etc.? Let's find out with our guest Reanna Schultz. Your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Reanna Schultz’s LinkedIn profile -- <a href="https://www.linkedin.com/in/reanna-schultz/" target="_blank">https://www.linkedin.com/in/reanna-schultz/</a></p>

<p>Reanna's company "CyberSpeak Labs LLC" -- <a href="https://www.cyberspeaklabs.com/" target="_blank">https://www.cyberspeaklabs.com/</a></p>

<p>"Cybersecurity Hiring Manager Handbook" -- <a href="https://cybersecurity-hiring-manager-handbook.netlify.app/" target="_blank">https://cybersecurity-hiring-manager-handbook.netlify.app/</a></p>

<p>"Your Cyber Path" podcast -- <a href="https://www.yourcyberpath.com/" target="_blank">https://www.YourCyberPath.com</a></p>

<p>"IRRESISTIBLE" cybersecurity job hunter’s course on Udemy -- <a href="https://www.udemy.com/course/irresistible-cybersecurity" target="_blank">https://www.udemy.com/course/irresistible-cybersecurity</a></p>]]>
  </description>
  <itunes:title>EP 169: Cybersecurity Hiring Manager Insights</itunes:title>
  <title>EP 169: Cybersecurity Hiring Manager Insights</title>

    <enclosure length="37680383" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/adf69e34-104c-4995-a147-e3646a42e593.mp3" />
  <itunes:duration>00:39:14</itunes:duration>
    <guid isPermaLink="false">adf69e34-104c-4995-a147-e3646a42e593</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>169</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-169-cybersecurity-hiring-manager-insights</link>
    <pubDate>Tue, 22 Oct 2024 15:00:15 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How can cybersecurity practitioners easily keep up with the changes in the "big picture" of cyber risk management? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 168: Staying Ahead of Cyber Risk Management Trends</itunes:title>
  <title>EP 168: Staying Ahead of Cyber Risk Management Trends</title>

    <enclosure length="13131541" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/12c25a99-02ad-4a68-b8df-3895316c58db.mp3" />
  <itunes:duration>00:13:40</itunes:duration>
    <guid isPermaLink="false">12c25a99-02ad-4a68-b8df-3895316c58db</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>168</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-168-staying-ahead-of-cyber-risk-management-trends</link>
    <pubDate>Tue, 08 Oct 2024 15:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Want to expand your cybersecurity tream? Do it with a ""Security Champions"" program. Let's find out how with our guest Bonnie Viteri. Your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>""How to Really Make Sure that Cybersecurity is Everyone’s Job"" (pt 1 &amp; 2)</p>

<p><a href="" target="_blank">&lt;https://cr-map.com/podcast/88/&gt;</a></p>

<p><a href="" target="_blank">&lt;https://cr-map.com/podcast/89/&gt;</a></p>

<p><br /></p>

<p>Bonnie Viteri’s LinkedIn profile:</p>

<p><a href="https://www.linkedin.com/in/bonnie-b-242a0b11b/" target="_blank">https://www.linkedin.com/in/bonnie-b-242a0b11b/</a></p>

<p><br /></p>

<p>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 167: Security Champions Program</itunes:title>
  <title>EP 167: Security Champions Program</title>

    <enclosure length="40733157" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/11fc5ded-4918-4b41-8b1e-4d59def6fcc7.mp3" />
  <itunes:duration>00:42:25</itunes:duration>
    <guid isPermaLink="false">11fc5ded-4918-4b41-8b1e-4d59def6fcc7</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>167</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-167-security-champions-program</link>
    <pubDate>Tue, 24 Sep 2024 15:00:16 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Let's conclude our look at the 2024 Verizon DBIR report. Today we'll review the data by industry and some other tidbits with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 166: The 2024 Verizon Data Breach Investigations Report (DBIR) Part 2</itunes:title>
  <title>EP 166: The 2024 Verizon Data Breach Investigations Report (DBIR) Part 2</title>

    <enclosure length="56154590" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2d4ac110-3bff-4207-a71c-d7a2a5ee4259.mp3" />
  <itunes:duration>00:58:29</itunes:duration>
    <guid isPermaLink="false">2d4ac110-3bff-4207-a71c-d7a2a5ee4259</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>166</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-166-the-2024-verizon-data-breach-investigations-report-dbir-part-2</link>
    <pubDate>Tue, 10 Sep 2024 15:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Have you read the Verizon DBIR report for 2024? Find out what it contains in the first of two episodes on this extremely useful report with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>""Can you trust the Verizon Data Breach Investigations Report (DBIR) to help you run your Cyber Risk Program?"" -- <a href="https://www.cr-map.com/91" target="_blank">https://www.cr-map.com/91</a>"</p>]]>
  </description>
  <itunes:title>EP 165: The 2024 Verizon Data Breach Investigations Report (DBIR) Part 1</itunes:title>
  <title>EP 165: The 2024 Verizon Data Breach Investigations Report (DBIR) Part 1</title>

    <enclosure length="52103711" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c1efc57f-ce7e-4d03-8c40-e1bd5f1bbed5.mp3" />
  <itunes:duration>00:54:16</itunes:duration>
    <guid isPermaLink="false">c1efc57f-ce7e-4d03-8c40-e1bd5f1bbed5</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>165</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-165-the-2024-verizon-data-breach-investigations-report-dbir-part-1</link>
    <pubDate>Tue, 27 Aug 2024 15:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Vulnerability management is really difficult, especially at scale. And after 20+ years that's still true. Our guest Alex Wood, who's the CISO of Uplight, will help us understand why and consider practical suggestions for getting better. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Alex Wood's LinkedIn Profile -- <a href="https://www.linkedin.com/in/alexbwood/" target="_blank">https://www.linkedin.com/in/alexbwood/</a></p>

<p><br /></p>

<p>Colorado = Security -- <a href="https://www.colorado-security.com/" target="_blank">https://www.colorado-security.com/</a></p>

<p>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 164: Why are we so bad at vulnerability management?</itunes:title>
  <title>EP 164: Why are we so bad at vulnerability management?</title>

    <enclosure length="34569513" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/6d5eaf17-c6f1-4dbe-8978-f00c52231b1e.mp3" />
  <itunes:duration>00:36:00</itunes:duration>
    <guid isPermaLink="false">6d5eaf17-c6f1-4dbe-8978-f00c52231b1e</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>164</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-164-why-are-we-so-bad-at-vulnerability-management</link>
    <pubDate>Mon, 12 Aug 2024 15:00:10 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Self-care is a crucial yet seldom discussed topic. Why is that? How should we be taking care of ourselves and why? Let's find out with our guest Chris Roberts, who most recently was the CISO of Boom Supersonic. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Chris Roberts' LinkedIn Profile -- <a href="https://www.linkedin.com/in/sidragon1/" target="_blank">https://www.linkedin.com/in/sidragon1/"</a></p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 163: Self-Care</itunes:title>
  <title>EP 163: Self-Care</title>

    <enclosure length="38158946" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c938c4b8-d624-4329-afbb-11873b983ccc.mp3" />
  <itunes:duration>00:39:44</itunes:duration>
    <guid isPermaLink="false">c938c4b8-d624-4329-afbb-11873b983ccc</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>163</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-163-self-care</link>
    <pubDate>Tue, 30 Jul 2024 15:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Let's continue unpacking the "Cyber Incident Reporting for Critical Infrastructure Act". What else do you need to know? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 162: Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), part 2</itunes:title>
  <title>EP 162: Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), part 2</title>

    <enclosure length="46079250" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/7ad4632a-c5c7-40d8-b5f4-0addba202cad.mp3" />
  <itunes:duration>00:47:59</itunes:duration>
    <guid isPermaLink="false">7ad4632a-c5c7-40d8-b5f4-0addba202cad</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>162</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-162-cyber-incident-reporting-for-critical-infrastructure-act-circia-part-2</link>
    <pubDate>Tue, 16 Jul 2024 15:00:08 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>CIRCIA stands for the "Cyber Incident Reporting for Critical Infrastructure Act". But what does it really mean? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 161: Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA)</itunes:title>
  <title>EP 161: Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA)</title>

    <enclosure length="46347184" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/27eef1b0-766a-4e8e-96e4-fe6b80485a44.mp3" />
  <itunes:duration>00:48:16</itunes:duration>
    <guid isPermaLink="false">27eef1b0-766a-4e8e-96e4-fe6b80485a44</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>161</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-161-cyber-incident-reporting-for-critical-infrastructure-act-circia</link>
    <pubDate>Tue, 02 Jul 2024 15:00:22 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"You can find your top 5 cyber risks using a “top down” approach with the NIST Cybersecurity Framework. Along the way, you can shift your organization towards better practice of reasonable cybersecurity. Know how? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>You can see our ""zero through ten"" scale scorecard here -- <a href="https://b.link/scorekey" target="_blank">https://b.link/scorekey</a></p>

<p><br /></p>

<p>You can watch our interview prep video here --<a href="https://b.link/interview" target="_blank"> https://b.link/interview"</a></p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 160: How to Find Your Top 5 Cyber Risks</itunes:title>
  <title>EP 160: How to Find Your Top 5 Cyber Risks</title>

    <enclosure length="44515662" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/6e552308-ee1c-494b-a3b7-6c8d7cb84672.mp3" />
  <itunes:duration>00:46:22</itunes:duration>
    <guid isPermaLink="false">6e552308-ee1c-494b-a3b7-6c8d7cb84672</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>160</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-160-how-to-find-your-top-5-cyber-risks</link>
    <pubDate>Tue, 18 Jun 2024 15:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What kinds of unfair trade practices does the FTC look for when it comes to privacy and data security? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 159: FTC 2023 Privacy and Data Security Update</itunes:title>
  <title>EP 159: FTC 2023 Privacy and Data Security Update</title>

    <enclosure length="48084199" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/6bcc0665-a188-4fb8-865c-01ddfbce3de3.mp3" />
  <itunes:duration>00:50:05</itunes:duration>
    <guid isPermaLink="false">6bcc0665-a188-4fb8-865c-01ddfbce3de3</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>159</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-159-ftc-2023-privacy-and-data-security-update</link>
    <pubDate>Tue, 04 Jun 2024 15:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Is overnight viral success is a kind of disruption that the business continuity (BC) discipline can help preapre you for? Let's find out with our guest Erika Andresen, the Founder and Owner of EaaS Consulting, LLC. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Erika's Book, ""How to Not Kill Your Business"" -- https://www.amazon.com/gp/product/199018538X</p>

<p><br /></p>

<p>Website -- <a href="https://www.eaasc.com/" target="_blank">https://www.eaasc.com/</a></p>

<p><br /></p>

<p>LinkedIn Profile -- <a href="https://www.linkedin.com/in/erika-andresen/" target="_blank">https://www.linkedin.com/in/erika-andresen/</a>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 158: Business Continuity as a Revenue Generator?</itunes:title>
  <title>EP 158: Business Continuity as a Revenue Generator?</title>

    <enclosure length="45244585" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c74c4456-193d-40f9-993e-0235fd5f6f0d.mp3" />
  <itunes:duration>00:47:07</itunes:duration>
    <guid isPermaLink="false">c74c4456-193d-40f9-993e-0235fd5f6f0d</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>158</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-158-business-continuity-as-a-revenue-generator</link>
    <pubDate>Tue, 21 May 2024 15:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"What's the definitive method for assessing cyber risk? Does it exist? How do you do it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>If you want to know more, Kip has a course on LinkedIn Learning you can check out:</p>

<p><br /></p>

<p>""IT and Cybersecurity Risk Management Essential Training"" -- <a href="https://www.linkedin.com/learning/it-and-cybersecurity-risk-management-%20essential-training/" target="_blank">https://www.linkedin.com/learning/it-and-cybersecurity-risk-management- essential-training/ </a></p>

<p><br /></p>

<p>Kip also has a Udemy course that describes our semi-quantitative approach:</p>

<p><br /></p>

<p>""Implementing NIST Cybersecurity Framework"" -- <a href="https://www.udemy.com/course/nist-cybersecurity-framework/" target="_blank">https://www.udemy.com/course/nist-cybersecurity-framework/ </a></p>

<p>"</p>]]>
  </description>
  <itunes:title>EP 157: How To Assess Cyber Risk (REPLAY)</itunes:title>
  <title>EP 157: How To Assess Cyber Risk (REPLAY)</title>

    <enclosure length="47523717" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ef09fb8f-364b-425d-9d83-0e9d72134b4d.mp3" />
  <itunes:duration>00:49:30</itunes:duration>
    <guid isPermaLink="false">ef09fb8f-364b-425d-9d83-0e9d72134b4d</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>157</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-157-how-to-assess-cyber-risk-replay</link>
    <pubDate>Tue, 07 May 2024 15:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What happened in the Change Healthcare cyberattack? What are the impacts and how can cyber resilience be a competitive advantage? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 156: Change Healthcare</itunes:title>
  <title>EP 156: Change Healthcare</title>

    <enclosure length="40981401" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f24fc760-6d08-4b42-a0fa-f249190a513c.mp3" />
  <itunes:duration>00:42:41</itunes:duration>
    <guid isPermaLink="false">f24fc760-6d08-4b42-a0fa-f249190a513c</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>156</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-156-change-healthcare</link>
    <pubDate>Tue, 23 Apr 2024 15:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The role of cybersecurity and data privacy due diligence when buying or selling a company has gone way up compared to five years ago. Why? And, what's at stake? Let's find out with our guest Brian Levine. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 155: Cybersecurity and data privacy in M&amp;A transactions</itunes:title>
  <title>EP 155: Cybersecurity and data privacy in M&amp;A transactions</title>

    <enclosure length="40731879" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b48e836f-c23f-4e34-bbc3-43cd18a71aa6.mp3" />
  <itunes:duration>00:42:25</itunes:duration>
    <guid isPermaLink="false">b48e836f-c23f-4e34-bbc3-43cd18a71aa6</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>155</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-155-cybersecurity-and-data-privacy-in-m-a-transactions</link>
    <pubDate>Tue, 09 Apr 2024 15:00:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Here's part 2 of what's in the NIST Artificial Intelligence Risk Management Framework (NIST AT-RMF)? And, how do you use it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 154: NIST AI Risk Management Framework, part 2</itunes:title>
  <title>EP 154: NIST AI Risk Management Framework, part 2</title>

    <enclosure length="46188335" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/13c958f5-fdc9-4883-bee8-1c242a924864.mp3" />
  <itunes:duration>00:48:06</itunes:duration>
    <guid isPermaLink="false">13c958f5-fdc9-4883-bee8-1c242a924864</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>154</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-154-nist-ai-risk-management-framework-part-2</link>
    <pubDate>Tue, 26 Mar 2024 15:00:17 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What's in the NIST Artificial Intelligence Risk Management Framework (NIST AT-RMF)? And, how do you use it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 153: NIST AI Risk Management Framework, part 1</itunes:title>
  <title>EP 153: NIST AI Risk Management Framework, part 1</title>

    <enclosure length="39196312" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/07afd67f-6e56-4c66-a1fc-326f4c75a2b7.mp3" />
  <itunes:duration>00:40:49</itunes:duration>
    <guid isPermaLink="false">07afd67f-6e56-4c66-a1fc-326f4c75a2b7</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>153</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-153-nist-ai-risk-management-framework-part-1</link>
    <pubDate>Tue, 12 Mar 2024 15:00:07 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The SEC says that Boards of Directors need cybersecurity expertise. But how exactly does that work? Let's find out with our guest Vanessa Pegueros, former CISO of DocuSign. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 152: Boards of Directors and Cybersecurity</itunes:title>
  <title>EP 152: Boards of Directors and Cybersecurity</title>

    <enclosure length="45360354" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ea64d91c-5742-4366-9f1c-f3ee6ff530c9.mp3" />
  <itunes:duration>00:47:14</itunes:duration>
    <guid isPermaLink="false">ea64d91c-5742-4366-9f1c-f3ee6ff530c9</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>152</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-152-boards-of-directors-and-cybersecurity</link>
    <pubDate>Tue, 27 Feb 2024 16:00:15 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Is there any reliable evidence that sick people die at a higher rate when their hospital is disabled by ransomware? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>“Hacked to Pieces? The Effects of Ransomware Attacks on Hospitals and Patients”</p>

<p>University of Minnesota - Twin Cities - School of Public Health</p>

<p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4579292" target="_blank">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4579292</a></p>

<p><br /></p>

<p>""Killware"" -- <a href="https://www.cr-map.com/97" target="_blank">https://www.cr-map.com/97</a>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 151: Does Ransomware Kill Sick People?</itunes:title>
  <title>EP 151: Does Ransomware Kill Sick People?</title>

    <enclosure length="39945316" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f37a9e49-c815-41a9-a3d1-323fb01778c9.mp3" />
  <itunes:duration>00:41:36</itunes:duration>
    <guid isPermaLink="false">f37a9e49-c815-41a9-a3d1-323fb01778c9</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>151</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-151-does-ransomware-kill-sick-people</link>
    <pubDate>Tue, 13 Feb 2024 16:00:17 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Twelve US states now have major privacy laws, up from only five last year. How is that driving demand for cybersecurity? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 150: Privacy Laws Driving Demand for Cybersecurity</itunes:title>
  <title>EP 150: Privacy Laws Driving Demand for Cybersecurity</title>

    <enclosure length="38902089" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b1cf3b3e-f19c-4939-9e96-34042a09b3c0.mp3" />
  <itunes:duration>00:40:31</itunes:duration>
    <guid isPermaLink="false">b1cf3b3e-f19c-4939-9e96-34042a09b3c0</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>150</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-150-privacy-laws-driving-demand-for-cybersecurity</link>
    <pubDate>Tue, 30 Jan 2024 16:00:07 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How do you take a very important, yet ethereal, idea like digital trust and make it more concrete and actionable? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 149: The Tools and Rules of Digital Trust</itunes:title>
  <title>EP 149: The Tools and Rules of Digital Trust</title>

    <enclosure length="47098268" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2884649b-f7b8-4d3a-9ec9-ef1c4f6f9eea.mp3" />
  <itunes:duration>00:49:03</itunes:duration>
    <guid isPermaLink="false">2884649b-f7b8-4d3a-9ec9-ef1c4f6f9eea</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>149</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-149-the-tools-and-rules-of-digital-trust</link>
    <pubDate>Tue, 16 Jan 2024 16:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What are the SEC’s new rules for cybersecurity disclosures, including cyber incidents AND annually about cybersecurity risk management and governance? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 148: SEC Disclosure Rules on Cybersecurity</itunes:title>
  <title>EP 148: SEC Disclosure Rules on Cybersecurity</title>

    <enclosure length="37437526" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/e1e65d7f-7a06-41a2-b12f-a171e39f556c.mp3" />
  <itunes:duration>00:38:59</itunes:duration>
    <guid isPermaLink="false">e1e65d7f-7a06-41a2-b12f-a171e39f556c</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>148</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-148-sec-disclosure-rules-on-cybersecurity</link>
    <pubDate>Tue, 02 Jan 2024 16:00:08 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"What can we learn about the SEC Complaint against SolarWinds Corporation and Timothy G. Brown? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>EP 96: ""Normalizing Greater Accountability For Cybersecurity Fraud""</p>

<p><a href="" target="_blank">&lt;https://cr-map.com/podcast/96/&gt;</a></p>

<p><br /></p>

<p>EP 109: ""FTC’s Strange Action Against Cafe Press""</p>

<p><a href="" target="_blank">&lt;https://cr-map.com/podcast/109/&gt;"</a></p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 147: SEC Complaint against SolarWinds Corporation</itunes:title>
  <title>EP 147: SEC Complaint against SolarWinds Corporation</title>

    <enclosure length="47079469" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/8a2a54f1-d18b-460f-a972-2c323127b095.mp3" />
  <itunes:duration>00:49:02</itunes:duration>
    <guid isPermaLink="false">8a2a54f1-d18b-460f-a972-2c323127b095</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>147</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-147-sec-complaint-against-solarwinds-corporation</link>
    <pubDate>Tue, 19 Dec 2023 16:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"How can we measure success with cybersecurity? Let's find out with our guest Jared Pfost. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>See Jared's ""Security Metrics Reference"" here --<a href="https://www.cr-map.com/metrics" target="_blank"> https://www.cr-map.com/metrics</a>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 146: Security Metrics</itunes:title>
  <title>EP 146: Security Metrics</title>

    <enclosure length="46403169" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/0c273b63-4282-4c07-8459-cc29423e1f42.mp3" />
  <itunes:duration>00:48:20</itunes:duration>
    <guid isPermaLink="false">0c273b63-4282-4c07-8459-cc29423e1f42</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>146</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-146-security-metrics</link>
    <pubDate>Tue, 05 Dec 2023 16:00:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Why do employees keep ignoring workplace cybersecurity rules? And, what should cyber risk managers to do about it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 145: Why Do Employees Keep Ignoring Workplace Cybersecurity Rules?</itunes:title>
  <title>EP 145: Why Do Employees Keep Ignoring Workplace Cybersecurity Rules?</title>

    <enclosure length="37284135" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/7d6ef564-906b-49e3-a4b0-b5370b27c109.mp3" />
  <itunes:duration>00:38:50</itunes:duration>
    <guid isPermaLink="false">7d6ef564-906b-49e3-a4b0-b5370b27c109</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>145</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-145-why-do-employees-keep-ignoring-workplace-cybersecurity-rules</link>
    <pubDate>Tue, 21 Nov 2023 16:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Have you heard of a regional cybersecurity conference in the US called SecureWorld? We really like it. So we invited Brad Graver, who’s the president of SecureWorld, to tell us what makes them different from all the other conferences we could go to. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 144: SecureWorld</itunes:title>
  <title>EP 144: SecureWorld</title>

    <enclosure length="38583594" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/da289f54-3329-4b59-abb9-26a6343d1443.mp3" />
  <itunes:duration>00:40:11</itunes:duration>
    <guid isPermaLink="false">da289f54-3329-4b59-abb9-26a6343d1443</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>144</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-144-secureworld</link>
    <pubDate>Tue, 07 Nov 2023 16:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Let's conclude our look at the 2023 Verizon DBIR report. Today we'll review the data by industry and some other tidbits with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 143: The 2023 Verizon Data Breach Investigations Report (DBIR) Part 2</itunes:title>
  <title>EP 143: The 2023 Verizon Data Breach Investigations Report (DBIR) Part 2</title>

    <enclosure length="48180329" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/60b6c8c5-c499-4629-a7c8-f9799074a34c.mp3" />
  <itunes:duration>00:50:11</itunes:duration>
    <guid isPermaLink="false">60b6c8c5-c499-4629-a7c8-f9799074a34c</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>143</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-143-the-2023-verizon-data-breach-investigations-report-dbir-part-2</link>
    <pubDate>Tue, 24 Oct 2023 15:00:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Have you read the Verizon DBIR report for 2023? Find out what it contains in the first of two episodes on this extremely useful report with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 142: The 2023 Verizon Data Breach Investigations Report (DBIR) Part 1</itunes:title>
  <title>EP 142: The 2023 Verizon Data Breach Investigations Report (DBIR) Part 1</title>

    <enclosure length="45634609" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/13fe0952-3236-4e2b-aec5-2802ef7206a2.mp3" />
  <itunes:duration>00:47:32</itunes:duration>
    <guid isPermaLink="false">13fe0952-3236-4e2b-aec5-2802ef7206a2</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>142</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-142-the-2023-verizon-data-breach-investigations-report-dbir-part-1</link>
    <pubDate>Tue, 10 Oct 2023 15:00:08 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What’s going to be in version 2 of the NIST Cybersecurity Framework? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 141: What&#039;s New in NIST CSF v2</itunes:title>
  <title>EP 141: What&#039;s New in NIST CSF v2</title>

    <enclosure length="38022736" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b0096837-3430-4bf1-9c13-107f7a4e21f3.mp3" />
  <itunes:duration>00:39:36</itunes:duration>
    <guid isPermaLink="false">b0096837-3430-4bf1-9c13-107f7a4e21f3</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>141</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/whats-new-in-nist-csf-v2</link>
    <pubDate>Tue, 26 Sep 2023 15:00:16 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Entry level IT and Cybersecurity certifications cost too much and produce too many "paper tigers". How do we fix that? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 140: Entry Level IT &amp; Cybersecurity Certifications Are Broken</itunes:title>
  <title>EP 140: Entry Level IT &amp; Cybersecurity Certifications Are Broken</title>

    <enclosure length="35233277" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/90686a9b-28f0-45e5-a7d7-ae45ebafcb55.mp3" />
  <itunes:duration>00:36:42</itunes:duration>
    <guid isPermaLink="false">90686a9b-28f0-45e5-a7d7-ae45ebafcb55</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>140</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-140-entry-level-it-cybersecurity-certifications-are-broken</link>
    <pubDate>Tue, 12 Sep 2023 15:00:10 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How does an attorney think about using cyber insurance to manage cyber and privacy risks? Let's find out with our guest Jane Petoskey. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 139: How to Use Cyber Insurance as a Cyber and Privacy Risk Management Tool</itunes:title>
  <title>EP 139: How to Use Cyber Insurance as a Cyber and Privacy Risk Management Tool</title>

    <enclosure length="37795363" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/07e9062f-52e8-4f20-b27e-d459b18f12a8.mp3" />
  <itunes:duration>00:39:22</itunes:duration>
    <guid isPermaLink="false">07e9062f-52e8-4f20-b27e-d459b18f12a8</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>139</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-139-how-to-use-cyber-insurance-as-a-cyber-and-privacy-risk-management-tool</link>
    <pubDate>Tue, 29 Aug 2023 15:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How is Revision 3 of NIST Special Publication 800-171 and the Cybersecurity Maturity Model Certification (CMMC) related to each other? Let's find out with our guest Jacob Horne. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 138: What&#039;s With NIST Special Publication 800-171, Revision 3 and CMMC</itunes:title>
  <title>EP 138: What&#039;s With NIST Special Publication 800-171, Revision 3 and CMMC</title>

    <enclosure length="41788552" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/6e50dc35-b3a7-4eca-b85c-f6a011bf8a66.mp3" />
  <itunes:duration>00:43:31</itunes:duration>
    <guid isPermaLink="false">6e50dc35-b3a7-4eca-b85c-f6a011bf8a66</guid>
  <itunes:author>KIP BOYLE</itunes:author>
    <itunes:episode>138</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-138-whats-with-nist-special-publication-800-171-revision-3-and-cmmc</link>
    <pubDate>Tue, 15 Aug 2023 15:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Traditional incident response exercises are often boring and awkward. That's why we don't do them, even though we should. Want a new way to get people excited about doing one? Let's learn about a proven innovation with our guest Glen Sorensen. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 137: How to Make Tabletop Exercises (TTX) Fun!</itunes:title>
  <title>EP 137: How to Make Tabletop Exercises (TTX) Fun!</title>

    <enclosure length="32558388" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/13fa9d59-7ce5-43ec-8c54-205ca5d605c8.mp3" />
  <itunes:duration>00:33:54</itunes:duration>
    <guid isPermaLink="false">13fa9d59-7ce5-43ec-8c54-205ca5d605c8</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>137</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-137-how-to-make-tabletop-exercises-ttx-fun</link>
    <pubDate>Tue, 01 Aug 2023 15:00:16 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"An $8 billion company was hit by ransomware and then was sued in court by one of its best customers. What's the connection with cyber resilience? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>""Case Study for Cyber as a Material Business Risk"" -- <a href="https://www.cr-map.com/124" target="_blank">https://www.cr-map.com/124"</a></p>

<p><br /></p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 136: Why Cyber Resilience is a Business Advantage </itunes:title>
  <title>EP 136: Why Cyber Resilience is a Business Advantage </title>

    <enclosure length="43899590" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/33c1eb2d-e41f-4399-ab0e-80f69f1072e4.mp3" />
  <itunes:duration>00:45:43</itunes:duration>
    <guid isPermaLink="false">33c1eb2d-e41f-4399-ab0e-80f69f1072e4</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>136</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-136-why-cyber-resilience-is-a-business-advantage</link>
    <pubDate>Tue, 18 Jul 2023 15:00:17 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Is the idea of measuring cyber risk ""hooey!"" as one of the InfoSec godfathers once said? Let's find out with our guest Ryan Leirvik. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Ryan's book ""Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program"" -- <a href="https://www.amazon.com/Understand-Manage-Measure-Cyber-Risk/dp/1484278208/" target="_blank">https://www.amazon.com/Understand-Manage-Measure-Cyber-Risk/dp/1484278208/</a></p>

<p><br /></p>

<p><a href="Website%20--%20https%3A//www.neuvik.com/" target="_blank">Website -- https://www.neuvik.com/</a></p>

<p><br /></p>

<p>LinkedIn Profile -- <a href="https://www.linkedin.com/in/leirvik/" target="_blank">https://www.linkedin.com/in/leirvik/</a>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 135: Measuring Cyber Risk</itunes:title>
  <title>EP 135: Measuring Cyber Risk</title>

    <enclosure length="47479831" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/bf45901c-e34d-41b9-8355-6e3abee98320.mp3" />
  <itunes:duration>00:49:27</itunes:duration>
    <guid isPermaLink="false">bf45901c-e34d-41b9-8355-6e3abee98320</guid>
  <itunes:author> Kip Boyle</itunes:author>
    <itunes:episode>135</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-135-measuring-cyber-risk</link>
    <pubDate>Tue, 04 Jul 2023 15:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Is there any business value in “business continuity”? If so, how can we explain it so anyone can understand? Our guest is Erika Andresen, the Founder and Owner of EaaS Consulting, LLC. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Erika's Book, ""How to Not Kill Your Business"" -- <a href="https://www.amazon.com/gp/product/199018538X" target="_blank">https://www.amazon.com/gp/product/199018538X</a></p>

<p><br /></p>

<p>Website -- <a href="https://www.eaasc.com/" target="_blank">https://www.eaasc.com/</a></p>

<p><br /></p>

<p>LinkedIn Profile -- <a href="https://www.linkedin.com/in/erika-andresen/" target="_blank">https://www.linkedin.com/in/erika-andresen/</a>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 134: The Business Value of Business Continuity</itunes:title>
  <title>EP 134: The Business Value of Business Continuity</title>

    <enclosure length="43018534" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/528550ec-b187-405e-b27d-cca2ff73e201.mp3" />
  <itunes:duration>00:44:48</itunes:duration>
    <guid isPermaLink="false">528550ec-b187-405e-b27d-cca2ff73e201</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>134</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-134-the-business-value-of-business-continuity</link>
    <pubDate>Tue, 20 Jun 2023 15:00:18 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Can ChatGPT help us manage Cyber Risk? Can any generative artificial intelligence be helpful? If so, how? And are there any limitations? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Suggested ""ChatGPT Prompt Engineering"" course by Sean Melis:</p>

<p><br /></p>

<p><a href="https://www.udemy.com/course/chatgpt-101-supercharge-your-work-life-500-prompts-inc/" target="_blank">https://www.udemy.com/course/chatgpt-101-supercharge-your-work-life-500-prompts-inc/</a>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 133: ChatGPT and Cyber Risk Management</itunes:title>
  <title>EP 133: ChatGPT and Cyber Risk Management</title>

    <enclosure length="41185016" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/7a11d881-e6b7-40c3-b100-59981bb286a6.mp3" />
  <itunes:duration>00:42:54</itunes:duration>
    <guid isPermaLink="false">7a11d881-e6b7-40c3-b100-59981bb286a6</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>133</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-133-chatgpt-and-cyber-risk-management</link>
    <pubDate>Tue, 06 Jun 2023 15:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How would you help political and human rights activists stay safe while using digital communications as they live under a repressive regime? One of us has been doing it for almost a year and he'll tell you. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 132: Helping Activists Operating Under a Repressive Regime</itunes:title>
  <title>EP 132: Helping Activists Operating Under a Repressive Regime</title>

    <enclosure length="39372259" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b16ffa30-0a28-442b-b70d-23c1052332dc.mp3" />
  <itunes:duration>00:41:00</itunes:duration>
    <guid isPermaLink="false">b16ffa30-0a28-442b-b70d-23c1052332dc</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>132</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-132-helping-activists-operating-under-a-repressive-regime</link>
    <pubDate>Tue, 23 May 2023 15:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"What does identity on the Internet mean? What does the failure of identity cost us? Do we need to make any changes to the way we do digital identity? Let's find out with our guest our guest, Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA). Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p><a href="https://www.idsalliance.org/" target="_blank">https://www.idsalliance.org/</a></p>

<p><a href="https://www.linkedin.com/in/jreich/" target="_blank">https://www.linkedin.com/in/jreich/</a>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 131: How Identity Really Works on the Internet Today</itunes:title>
  <title>EP 131: How Identity Really Works on the Internet Today</title>

    <enclosure length="43436076" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d4fac4b9-9392-42db-b184-6a1ba12afa3a.mp3" />
  <itunes:duration>00:45:14</itunes:duration>
    <guid isPermaLink="false">d4fac4b9-9392-42db-b184-6a1ba12afa3a</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>131</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-131-how-identity-really-works-on-the-internet-today</link>
    <pubDate>Tue, 09 May 2023 15:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"What's the definitive method for assessing cyber risk? Does it exist? How do you do it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>If you want to know more, Kip has a course on LinkedIn Learning you can check out:</p>

<p><br /></p>

<p>""IT and Cybersecurity Risk Management Essential Training"" -- <a href="https://www.linkedin.com/learning/it-and-cybersecurity-risk-management-%20essential-training/" target="_blank">https://www.linkedin.com/learning/it-and-cybersecurity-risk-management- essential-training/ </a></p>

<p><br /></p>

<p>Kip also has a Udemy course that describes our semi-quantitative approach:</p>

<p><br /></p>

<p>""Implementing NIST Cybersecurity Framework"" -- <a href="https://www.udemy.com/course/nist-cybersecurity-framework/" target="_blank">https://www.udemy.com/course/nist-cybersecurity-framework/ </a></p>

<p>"</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 130: How To Assess Cyber Risk</itunes:title>
  <title>EP 130: How To Assess Cyber Risk</title>

    <enclosure length="47359459" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/498b0d03-0f99-413d-a704-5194ba3455f3.mp3" />
  <itunes:duration>00:49:19</itunes:duration>
    <guid isPermaLink="false">498b0d03-0f99-413d-a704-5194ba3455f3</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>130</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-130-how-to-assess-cyber-risk</link>
    <pubDate>Tue, 25 Apr 2023 15:00:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Beyond this podcast, I've made a lot of resources (most are free) to help you. In fact, you can now download a six page list of them all. Let me quickly skim through that list with you in this episode. I'm your host, Kip Boyle, CISO with Cyber Risk Opportunities.</p>

<p><br /></p>

<p>You can download ""the list"" here -- <a href="https://www.cr-map.com/thelist" target="_blank">https://www.cr-map.com/thelist</a> "</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 129: Some Other Things I&#039;ve Made for You</itunes:title>
  <title>EP 129: Some Other Things I&#039;ve Made for You</title>

    <enclosure length="28518278" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2c232abf-c259-4088-bfe8-39a9c7ee6cb8.mp3" />
  <itunes:duration>00:29:42</itunes:duration>
    <guid isPermaLink="false">2c232abf-c259-4088-bfe8-39a9c7ee6cb8</guid>
  <itunes:author>Kyp Boyle</itunes:author>
    <itunes:episode>129</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-129-some-other-things-i-ve-made-for-you</link>
    <pubDate>Tue, 11 Apr 2023 14:32:06 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Are non-profits at risk for cyber exploitation? If so, why? And what should they do about it? Let's find out with our guest, Lew Bader, the Finance Director at "Counseling In Schools". Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 128: Secrets of Cyber Risk Management at Non-Profits</itunes:title>
  <title>EP 128: Secrets of Cyber Risk Management at Non-Profits</title>

    <enclosure length="32524420" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/137aafd5-4f80-404e-a169-aef7f0bcee55.mp3" />
  <itunes:duration>00:33:52</itunes:duration>
    <guid isPermaLink="false">137aafd5-4f80-404e-a169-aef7f0bcee55</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>128</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-128-secrets-of-cyber-risk-management-at-non-profits</link>
    <pubDate>Tue, 28 Mar 2023 15:00:15 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"How do you proactively protect your #1 digital asset, which is your reputation? Let's find out with our guest, Sameer Somal, the CEO of Blue Ocean Global Technology. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Mentioned during this episode: </p>

<p><br /></p>

<p>""The effects of cyberattacks on corporate reputation and consumer confidence with Casey Boggs"" -- <a href="https://www.cr-map.com/48" target="_blank">https://www.cr-map.com/48</a></p>

<p><br /></p>

<p>""Normalizing Greater Accountability For Cybersecurity Fraud"" -- <a href="https://www.cr-map.com/96" target="_blank">https://www.cr-map.com/96</a></p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 127: Proactively Protect Your Reputation (#1 digital asset)</itunes:title>
  <title>EP 127: Proactively Protect Your Reputation (#1 digital asset)</title>

    <enclosure length="39274038" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/482e4d15-2d1b-4eb7-9620-92d4f6e64fac.mp3" />
  <itunes:duration>00:40:54</itunes:duration>
    <guid isPermaLink="false">482e4d15-2d1b-4eb7-9620-92d4f6e64fac</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>127</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-127-proactively-protect-your-reputation-1-digital-asset</link>
    <pubDate>Tue, 14 Mar 2023 15:00:10 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"Can you “demonstrate due diligence to a defensible standard of care” as your risk management approach? This would replace ""red/yellow/green"" approaches or advanced statistics. Let's find out with our guest, Karen Worstell, who is a “Senior Cybersecurity Strategist” and a “CxO Security Advisor” with VMware. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>If you want to learn more about DOCRA (The Duty of Care Risk Analysis Standard) check out our previous episode -- <a href="https://cr-map.com/59" target="_blank">https://cr-map.com/59</a></p>

<p><br /></p>

<p>""Risk-Based Security is the Emperor's New Clothes""</p>

<p><a href="https://taosecurity.blogspot.com/2006/06/risk-based-security-is-emperors-new.html" target="_blank">https://taosecurity.blogspot.com/2006/06/risk-based-security-is-emperors-new.html</a></p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 126: Due diligence as a Risk Management Approach</itunes:title>
  <title>EP 126: Due diligence as a Risk Management Approach</title>

    <enclosure length="43866574" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2029961a-56dc-4ed9-9c21-18c5a4c706cb.mp3" />
  <itunes:duration>00:45:41</itunes:duration>
    <guid isPermaLink="false">2029961a-56dc-4ed9-9c21-18c5a4c706cb</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>126</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-126-due-diligence-as-a-risk-management-approach</link>
    <pubDate>Tue, 28 Feb 2023 16:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>There are many security design principles we can use to build and evaluate products and services. Can we use them to understand the LastPass incidents from late 2022? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 125: Applied Security Design Principles</itunes:title>
  <title>EP 125: Applied Security Design Principles</title>

    <enclosure length="48733708" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/8ba94b09-035e-4509-9bbd-f05e210879f8.mp3" />
  <itunes:duration>00:50:45</itunes:duration>
    <guid isPermaLink="false">8ba94b09-035e-4509-9bbd-f05e210879f8</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>125</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-125-applied-security-design-principles</link>
    <pubDate>Tue, 14 Feb 2023 16:00:25 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>"A $100 million Texas company called “United Structures of America” got struck by ransomware in 2019. You'll be surprised at what happened next. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>“Cyber Extortion of Patients”--<a href="https://cr-map.com/podcast/51/" target="_blank">https://cr-map.com/podcast/51/</a></p>

<p>“Quick Look at the ‘Essential Eight’ mitigations”--<a href="https://cr-map.com/podcast/63/" target="_blank">https://cr-map.com/podcast/63/</a></p>

<p>""How to Really Make Sure that Cybersecurity is Everyone’s Job"" (pt 1 &amp; 2)</p>

<p><a href="https://cr-map.com/podcast/88/" target="_blank">https://cr-map.com/podcast/88/</a></p>

<p><a href="https://cr-map.com/podcast/89/" target="_blank">https://cr-map.com/podcast/89/</a></p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 124: Case Study for Cyber as a Material Business Risk</itunes:title>
  <title>EP 124: Case Study for Cyber as a Material Business Risk</title>

    <enclosure length="44496018" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/74f43c4c-6853-46c9-a3da-b934dfbb40d5.mp3" />
  <itunes:duration>00:46:20</itunes:duration>
    <guid isPermaLink="false">74f43c4c-6853-46c9-a3da-b934dfbb40d5</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>124</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-124-case-study-for-cyber-as-a-material-business-risk</link>
    <pubDate>Tue, 31 Jan 2023 16:00:16 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What can we learn from a recently released research report called “Phishing in Organizations: Findings from a Large-Scale and Long-Term Study”? Let’s find out with our guest, Jason Rebholz, the CISO of Corvus Insurance. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Jason Rebholz prior guest appearance–<a href="https://cr-map.com/podcast/114/" target="_blank">https://cr-map.com/podcast/114/</a></p>

<p>“Some Workgroups Deserve More Protection Against Malware”–<a href="https://cr-map.com/podcast/108/" target="_blank">https://cr-map.com/podcast/108/</a></p>

<p>“How to Really Make Sure that Cybersecurity is Everyone’s Job” (pt 1 &amp; 2)</p>

<p><a href="https://cr-map.com/podcast/88/" target="_blank">https://cr-map.com/podcast/88/</a></p>

<p><a href="https://cr-map.com/podcast/89/" target="_blank">https://cr-map.com/podcast/89/</a></p>]]>
  </description>
  <itunes:title>EP 123: How to Really Reduce the Risk of People Falling for Phishing</itunes:title>
  <title>EP 123: How to Really Reduce the Risk of People Falling for Phishing</title>

    <enclosure length="39651455" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/3d040693-a7ec-42cb-9512-7427cd7ea241.mp3" />
  <itunes:duration>00:41:18</itunes:duration>
    <guid isPermaLink="false">3d040693-a7ec-42cb-9512-7427cd7ea241</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>123</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-123-how-to-really-reduce-the-risk-of-people-falling-for-phishing</link>
    <pubDate>Tue, 17 Jan 2023 16:00:08 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What's our "best episode" of 2022? This one had the highest number of downloads. Let's find out which one it was with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 122: Best Episode of 2022</itunes:title>
  <title>EP 122: Best Episode of 2022</title>

    <enclosure length="40886943" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/e26b9c8d-8b68-4df4-aaf2-bfacd339f96f.mp3" />
  <itunes:duration>00:42:35</itunes:duration>
    <guid isPermaLink="false">e26b9c8d-8b68-4df4-aaf2-bfacd339f96f</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>122</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-122-best-episode-of-2022</link>
    <pubDate>Tue, 03 Jan 2023 16:00:16 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What are the biggest, yet wrong, ideas that float around all the time and often cause senior decision makers to make poor decisions? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>“Compliance Versus Practicing Cybersecurity” <a href="https://www.cr-map.com/12" target="_blank">https://www.cr-map.com/12</a></p>

<p>“Busted: The Truth about Cloud Security” <a href="https://www.cr-map.com/77" target="_blank">https://www.cr-map.com/77</a></p>

<p>“Your IT Person is Not Your Cybersecurity Person” <a href="https://www.cr-map.com/105" target="_blank">https://www.cr-map.com/105</a></p>]]>
  </description>
  <itunes:title>EP 121: The Myth Busters Episode</itunes:title>
  <title>EP 121: The Myth Busters Episode</title>

    <enclosure length="41935208" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/e347a02a-d07c-481f-ba46-c5d1e70bbe4b.mp3" />
  <itunes:duration>00:43:40</itunes:duration>
    <guid isPermaLink="false">e347a02a-d07c-481f-ba46-c5d1e70bbe4b</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>121</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-121-best-episode-of-2022</link>
    <pubDate>Tue, 20 Dec 2022 16:00:10 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Let's conclude our look at the 2022 Verizon DBIR report. Today we'll review the data by industry and some other tidbits with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 120: The 2022 Verizon Data Breach Investigations Report (DBIR) Part 2</itunes:title>
  <title>EP 120: The 2022 Verizon Data Breach Investigations Report (DBIR) Part 2</title>

    <enclosure length="36011865" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/db279888-15ad-4397-969a-0985edb13f74.mp3" />
  <itunes:duration>00:37:30</itunes:duration>
    <guid isPermaLink="false">db279888-15ad-4397-969a-0985edb13f74</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>120</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-120-the-2022-verizon-data-breach-investigations-report-dbir-part-2</link>
    <pubDate>Tue, 06 Dec 2022 16:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Have you read the Verizon DBIR report for 2022? Find out what it contains in the first of two episodes on this extremely useful report with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 119: The 2022 Verizon Data Breach Investigations Report (DBIR) Part 1</itunes:title>
  <title>EP 119: The 2022 Verizon Data Breach Investigations Report (DBIR) Part 1</title>

    <enclosure length="48644681" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/705e6a79-d426-40fb-838a-2be28e96190f.mp3" />
  <itunes:duration>00:50:40</itunes:duration>
    <guid isPermaLink="false">705e6a79-d426-40fb-838a-2be28e96190f</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>119</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-119-the-2022-verizon-data-breach-investigations-report-dbir-part-1</link>
    <pubDate>Tue, 22 Nov 2022 16:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What if your Chief Operating Officer was also your Chief Information Security Officer? What would that be like? And, who would do it? Let's find out with our guest, Peter Hitschler the COO of Tri Tech Manufacturing. Your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 118: Chief Operating Officer is also CISO</itunes:title>
  <title>EP 118: Chief Operating Officer is also CISO</title>

    <enclosure length="35103221" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/99b2357a-5629-43ba-8c1f-ae964e0cdcf5.mp3" />
  <itunes:duration>00:36:33</itunes:duration>
    <guid isPermaLink="false">99b2357a-5629-43ba-8c1f-ae964e0cdcf5</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>118</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-118-chief-operating-officer-is-also-ciso</link>
    <pubDate>Tue, 08 Nov 2022 16:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How can Deal Teams and M&amp;A Teams understand and manage cyber risk so they can make better business decisions during the company acquisition process? Let's find out with our guest, Shay Colson, the Managing Partner at Coastal Cyber Risk Advisors, LLC. Your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 117: Cyber Risk Management During Company Acquisition</itunes:title>
  <title>EP 117: Cyber Risk Management During Company Acquisition</title>

    <enclosure length="42414581" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/3f66802a-d9de-4ebd-a65b-6742aaf0cbdc.mp3" />
  <itunes:duration>00:44:10</itunes:duration>
    <guid isPermaLink="false">3f66802a-d9de-4ebd-a65b-6742aaf0cbdc</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>117</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-117-cyber-risk-management-during-company-acquisition</link>
    <pubDate>Tue, 25 Oct 2022 15:00:10 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Did you know there’s an avalanche of state and federal privacy laws and regulations that are either being actively debated or have been passed and will soon take effect starting in January 2023? Let’s find out which ones matter most with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 116: Update of State Data Security Laws</itunes:title>
  <title>EP 116: Update of State Data Security Laws</title>

    <enclosure length="39596701" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/280b84d5-3f8b-41bc-9b17-140d1e6a52bd.mp3" />
  <itunes:duration>00:41:14</itunes:duration>
    <guid isPermaLink="false">280b84d5-3f8b-41bc-9b17-140d1e6a52bd</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>116</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-116-update-of-state-data-security-lawscrm-116</link>
    <pubDate>Tue, 11 Oct 2022 15:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Can the insurance industry find a way to reduce the rate of major cyber incidents like it did by promoting airbags to reduce highway death rates or sprinklers for buildings reducing fires deaths? Let's find out with our guest Andy Anderson, CEO of DataStream Cyber Insurance. Your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Andy's podcast "The Cyber Crime Lab" -- &lt;https://www.thecybercrimelab.com/&gt;</p>]]>
  </description>
  <itunes:title>EP 115: Insurance Companies as Cybersecurity Leaders</itunes:title>
  <title>EP 115: Insurance Companies as Cybersecurity Leaders</title>

    <enclosure length="41577829" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/cb495599-99f5-4801-bae1-654a6a0c4431.mp3" />
  <itunes:duration>00:43:18</itunes:duration>
    <guid isPermaLink="false">cb495599-99f5-4801-bae1-654a6a0c4431</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>115</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-115-insurance-companies-as-cybersecurity-leaders</link>
    <pubDate>Tue, 27 Sep 2022 15:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Can small-medium-sized businesses benefit from cyber insurance even if they don't buy a policy? How? Let's find out with my guest Jason Rebholz, CISO at Corvus Insurance. Your host is Kip Boyle, vCISO with Cyber Risk Opportunities.</p>]]>
  </description>
  <itunes:title>EP 114: Cyber Insurance Drives Security Beyond Your Cyber Policy</itunes:title>
  <title>EP 114: Cyber Insurance Drives Security Beyond Your Cyber Policy</title>

    <enclosure length="36072469" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/232ebf1e-ae1a-4b5c-bac3-e801ebdbaf35.mp3" />
  <itunes:duration>00:37:34</itunes:duration>
    <guid isPermaLink="false">232ebf1e-ae1a-4b5c-bac3-e801ebdbaf35</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>114</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-114-cyber-insurance-drives-security-beyond-your-cyber-policy</link>
    <pubDate>Tue, 13 Sep 2022 08:00:07 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Cybersecurity is intertwining with D&amp;O litigation and more companies are self-insuring for cyber risks. Why? Our guest is Rachel Jenkins, the Managing Director for Customer Success at Founder Shield. Your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>]]>
  </description>
  <itunes:title>EP 113: Self-Insuring for Cyber Risks </itunes:title>
  <title>EP 113: Self-Insuring for Cyber Risks </title>

    <enclosure length="36701497" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/6223ca71-c099-4bf3-a204-c57acd8d5d7b.mp3" />
  <itunes:duration>00:38:13</itunes:duration>
    <guid isPermaLink="false">6223ca71-c099-4bf3-a204-c57acd8d5d7b</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>113</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-113-self-insuring-for-cyber-risks</link>
    <pubDate>Tue, 30 Aug 2022 08:00:08 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>You’re going to need the CFO’s support to be successful managing cybersecurity. Why? If for no other reason than the CFO controls the purse strings! So how do you do it? Let's find out with your host Kip Boyle, vCISO with Cyber Risk Opportunities.</p>]]>
  </description>
  <itunes:title>EP112: How to Work With CFOs on Cyber Risk Management</itunes:title>
  <title>EP112: How to Work With CFOs on Cyber Risk Management</title>

    <enclosure length="29222118" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f95d1d2a-aefd-42be-ae25-d3c79b3cf2a2.mp3" />
  <itunes:duration>00:30:26</itunes:duration>
    <guid isPermaLink="false">f95d1d2a-aefd-42be-ae25-d3c79b3cf2a2</guid>
  <itunes:author></itunes:author>
    <itunes:episode>112</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep112-how-to-work-with-cfos-on-cyber-risk-management</link>
    <pubDate>Tue, 16 Aug 2022 15:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How do you run a successful anti-phishing program that will actually reduce your risk without sacrificing employee goodwill? Our guest, Ean Meyer, knows how. Ean is Associate Director of Security Testing and Assurance at Marriott Vacations Worldwide. Your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>"How to Really Make Sure that Cybersecurity is Everyone’s Job" (pt 1 &amp; 2)</p>

<p>&lt;https://cr-map.com/podcast/88/&gt;</p>

<p>&lt;https://cr-map.com/podcast/89/&gt;</p>]]>
  </description>
  <itunes:title>EP 111: Ethical Phisheries</itunes:title>
  <title>EP 111: Ethical Phisheries</title>

    <enclosure length="39493047" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/90c0d23b-9fe1-48c0-b97a-9d856c51f7d4.mp3" />
  <itunes:duration>00:41:08</itunes:duration>
    <guid isPermaLink="false">90c0d23b-9fe1-48c0-b97a-9d856c51f7d4</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>111</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-111-ethical-phisheries</link>
    <pubDate>Tue, 02 Aug 2022 08:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Cyber insurance, once so easy to get, is now scarce and expensive. Why did this happen? How long will it last? What can you do until sanity returns? Find out with our guest Jennifer Cohen, the Cyber &amp; Governance Director at HUB International. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 110: Thriving in this Crazy Cyber Insurance Market</itunes:title>
  <title>EP 110: Thriving in this Crazy Cyber Insurance Market</title>

    <enclosure length="43709839" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d0443ded-3fa8-46b8-a4cd-bc7d280419a5.mp3" />
  <itunes:duration>00:45:31</itunes:duration>
    <guid isPermaLink="false">d0443ded-3fa8-46b8-a4cd-bc7d280419a5</guid>
  <itunes:author></itunes:author>
    <itunes:episode>110</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-110-thriving-in-this-crazy-cyber-insurance-market</link>
    <pubDate>Tue, 19 Jul 2022 09:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The Federal Trade Commission unusually took action against the current AND former owners of CafePress over the February 2019 customer data breach. Why and what does it mean? Also, an update on the False Claims Act from Episode 96. Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>EP 96: "Normalizing Greater Accountability For Cybersecurity Fraud"</p>

<p>&lt;https://cr-map.com/podcast/96/&gt;</p>]]>
  </description>
  <itunes:title>EP 109: FTC’s Strange Action Against Cafe Press</itunes:title>
  <title>EP 109: FTC’s Strange Action Against Cafe Press</title>

    <enclosure length="29794832" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/be42d540-958c-43e0-a83f-3d429ee9472c.mp3" />
  <itunes:duration>00:35:28</itunes:duration>
    <guid isPermaLink="false">be42d540-958c-43e0-a83f-3d429ee9472c</guid>
  <itunes:author></itunes:author>
    <itunes:episode>109</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/title</link>
    <pubDate>Tue, 05 Jul 2022 08:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Due to the way some workgroups must work, they deserve more protection against malware. But how can you do that in a minimum viable way? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>EP 63: Quick look at the “Essential Eight” mitigations </p>

<p>&lt;https://cr-map.com/podcast/63/&gt;</p>

<p><br /></p>

<p>"Implementing the NIST Cybersecurity Framework"</p>

<p>&lt;https://www.udemy.com/course/nist-cybersecurity-framework/&gt;</p>]]>
  </description>
  <itunes:title>EP 108: Some Workgroups Deserve More Protection Against Malware</itunes:title>
  <title>EP 108: Some Workgroups Deserve More Protection Against Malware</title>

    <enclosure length="36180948" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ac613715-1083-4cd1-8742-6f7823f0a7ef.mp3" />
  <itunes:duration>00:37:41</itunes:duration>
    <guid isPermaLink="false">ac613715-1083-4cd1-8742-6f7823f0a7ef</guid>
  <itunes:author></itunes:author>
    <itunes:episode>108</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-108-some-workgroups-deserve-more-protection-against-malware</link>
    <pubDate>Tue, 21 Jun 2022 08:00:08 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What are the challenges of smaller vendors responding to due diligence requests from their large customers? And what can they do about them? Let's find out with our guest Caroline McCaffery of ClearOPS. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>&lt;https://www.clearops.io/&gt;</p>]]>
  </description>
  <itunes:title>EP 107: Response Side of Vendor Due Diligence</itunes:title>
  <title>EP 107: Response Side of Vendor Due Diligence</title>

    <enclosure length="41464788" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/53b5d82d-11bc-4b58-9c96-09e28bcf2866.mp3" />
  <itunes:duration>00:43:11</itunes:duration>
    <guid isPermaLink="false">53b5d82d-11bc-4b58-9c96-09e28bcf2866</guid>
  <itunes:author></itunes:author>
    <itunes:episode>107</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-107-response-side-of-vendor-due-diligence</link>
    <pubDate>Tue, 07 Jun 2022 08:00:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What are the Pandora Papers? Where did they come from? What's the impact of the Pandora Papers on the legal industry? What are the practical cybersecurity lessons for everyone? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 106: Anatomy of a Hack: Pandora Papers</itunes:title>
  <title>EP 106: Anatomy of a Hack: Pandora Papers</title>

    <enclosure length="50060244" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/a17b890e-103a-4c5e-a348-8fdbf47e6be9.mp3" />
  <itunes:duration>00:52:08</itunes:duration>
    <guid isPermaLink="false">a17b890e-103a-4c5e-a348-8fdbf47e6be9</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>106</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-106-anatomy-of-a-hack-pandora-papers</link>
    <pubDate>Tue, 24 May 2022 08:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>IT and cybersecurity actually have very little overlap. The people performing them have similar skills but they have very different goals and very different ways of thinking. Let's find out how different with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 105: Your IT Person is Not Your Cybersecurity Person</itunes:title>
  <title>EP 105: Your IT Person is Not Your Cybersecurity Person</title>

    <enclosure length="41014356" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ec6e9516-2f1d-4297-bfd7-27efc3ff8c3d.mp3" />
  <itunes:duration>00:42:43</itunes:duration>
    <guid isPermaLink="false">ec6e9516-2f1d-4297-bfd7-27efc3ff8c3d</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>105</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-105-your-it-person-is-not-your-cybersecurity-person</link>
    <pubDate>Tue, 10 May 2022 08:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Can an identity crisis make organizations an easy target for cyber-criminals? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 104: Easy Target due to Corporate Identity Crisis</itunes:title>
  <title>EP 104: Easy Target due to Corporate Identity Crisis</title>

    <enclosure length="35050958" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2449c032-c508-4712-996f-ee2db0355f13.mp3" />
  <itunes:duration>00:36:35</itunes:duration>
    <guid isPermaLink="false">2449c032-c508-4712-996f-ee2db0355f13</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>104</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-104-easy-target-due-to-corporate-identity-crisis</link>
    <pubDate>Tue, 26 Apr 2022 08:00:08 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What's in the Security Exchange Commission’s proposal for new cybersecurity risk management rules for investment advisers and investment companies? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>You can find the SEC's Fact Sheet and proposed Rules here -- https://www.sec.gov/news/press-release/2022-20</p>]]>
  </description>
  <itunes:title>EP 103: SEC&#039;s Proposed Rules for Cyber Risk Management</itunes:title>
  <title>EP 103: SEC&#039;s Proposed Rules for Cyber Risk Management</title>

    <enclosure length="38878184" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/5b2d8ae1-ecd1-4e14-b02b-478ecaec4b8d.mp3" />
  <itunes:duration>00:40:35</itunes:duration>
    <guid isPermaLink="false">5b2d8ae1-ecd1-4e14-b02b-478ecaec4b8d</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>103</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-103-secs-proposed-rules-for-cyber-risk-management</link>
    <pubDate>Tue, 12 Apr 2022 08:00:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Do you want to attract and retain top tier talent for your InfoSec team? To work “on your program” instead of working “in your program”? Learn how with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Get the Handbook for free here -- https://b.link/hiring-handbook</p>

<p>Register for training here -- https://www.antisyphontraining.com/hiring-handbook-how-to-build-an-infosec-team-that-gets-stuff-done-w-kip-boyle/</p>]]>
  </description>
  <itunes:title>EP 102: Cybersecurity Hiring Manager Handbook</itunes:title>
  <title>EP 102: Cybersecurity Hiring Manager Handbook</title>

    <enclosure length="33824987" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f26a5aaf-43a2-4351-b3a4-3ff505c52bf6.mp3" />
  <itunes:duration>00:35:18</itunes:duration>
    <guid isPermaLink="false">f26a5aaf-43a2-4351-b3a4-3ff505c52bf6</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>102</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-102-cybersecurity-hiring-manager-handbook</link>
    <pubDate>Tue, 29 Mar 2022 08:00:15 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Is your business “significantly engaged” in providing financial products or services of any kind? Then you need to know about the updates to the Safeguards Rule. Let's see what they are with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Join us for our next CLE at noon Pacific time on Wednesday, March 30th where we'll explore the impact of the Pandora Papers on the legal industry and the practical, cybersecurity lessons for attorneys and their clients.</p>

<p>https://www.eventbrite.com/e/anatomy-of-a-hack-pandora-papers-tickets-255528421387</p>]]>
  </description>
  <itunes:title>EP 101: FTC&#039;s Major Updates to GLBA Safeguards Rule</itunes:title>
  <title>EP 101: FTC&#039;s Major Updates to GLBA Safeguards Rule</title>

    <enclosure length="33958010" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/fd53c99e-7542-4c24-a812-6f352e7aaf8f.mp3" />
  <itunes:duration>00:35:27</itunes:duration>
    <guid isPermaLink="false">fd53c99e-7542-4c24-a812-6f352e7aaf8f</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>101</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-101-ftcs-major-updates-to-glba-safeguards-rule</link>
    <pubDate>Tue, 15 Mar 2022 08:00:15 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>When we first started this podcast, we weren't thinking about 50 episodes, let alone 100. How did we make it this far? What's next? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p><br /></p>

<p>Join us for our next CLE at noon Pacific time on Wednesday, March 30th where we'll explore the impact of the Pandora Papers on the legal industry and the practical, cybersecurity lessons for attorneys and their clients.</p>

<p><br /></p>

<p>https://www.eventbrite.com/e/anatomy-of-a-hack-pandora-papers-tickets-255528421387</p>]]>
  </description>
  <itunes:title>EP 100: Celebrating our One Hundredth Episode!</itunes:title>
  <title>EP 100: Celebrating our One Hundredth Episode!</title>

    <enclosure length="49802759" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/66cc7bd5-f975-4e68-a9e7-85d11c5dc5bb.mp3" />
  <itunes:duration>00:51:59</itunes:duration>
    <guid isPermaLink="false">66cc7bd5-f975-4e68-a9e7-85d11c5dc5bb</guid>
  <itunes:author></itunes:author>
    <itunes:episode>100</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ep-100-celebrating-our-one-hundredth-episode</link>
    <pubDate>Thu, 03 Mar 2022 00:45:04 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Here’s the latest in the evolution of dynamic cyber risks: A metamorphic malware called Tardigrade. What does it mean? How do you deal with it? Let’s find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Join us for our next CLE at noon Pacific time on Wednesday, March 30th where we’ll explore the impact of the Pandora Papers on the legal industry and the practical, cybersecurity lessons for attorneys and their clients.</p>

<p>https://www.eventbrite.com/e/anatomy-of-a-hack-pandora-papers-tickets-255528421387</p>]]>
  </description>
  <itunes:title>EP 99: Metamorphic Malware Called Tardigrade</itunes:title>
  <title>EP 99: Metamorphic Malware Called Tardigrade</title>

    <enclosure length="30215625" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/525a969b-a834-4462-b0be-6c4a85b11298.mp3" />
  <itunes:duration>00:31:28</itunes:duration>
    <guid isPermaLink="false">525a969b-a834-4462-b0be-6c4a85b11298</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>99</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/metamorphic-malware-called-tardigrade</link>
    <pubDate>Sun, 20 Feb 2022 20:26:27 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Today's episode is a replay of the free online continuing legal education session that Jake and I delivered back on December 15, 2021. You'll learn how to conduct meaningful cyber risk assessments and create ransomware-proof data backups.</p>

<p>Join us for our next CLE at noon Pacific time on Wednesday, March 30th where we'll explore the impact of the Pandora Papers on the legal industry and the practical, cybersecurity lessons for attorneys and their clients.</p>

<p><a href="https://www.eventbrite.com/e/anatomy-of-a-hack-pandora-papers-tickets-255528421387" target="_blank">https://www.eventbrite.com/e/anatomy-of-a-hack-pandora-papers-tickets-255528421387</a></p>]]>
  </description>
  <itunes:title>EP 98: Minimum Viable Risk Assessment and Data Backups</itunes:title>
  <title>EP 98: Minimum Viable Risk Assessment and Data Backups</title>

    <enclosure length="59616056" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b12754a8-d2b8-41db-b510-a3decf8f987b.mp3" />
  <itunes:duration>01:02:05</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7214</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>98</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/minimum-viable-risk-assessment-and-data-backups</link>
    <pubDate>Tue, 01 Feb 2022 08:00:35 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What's happening at the convergence of cyber-attacks and the loss of human life? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 97: Killware</itunes:title>
  <title>EP 97: Killware</title>

    <enclosure length="48885845" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/67d488cf-5295-4420-9a5a-8c5f6f2479b4.mp3" />
  <itunes:duration>00:50:55</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7204</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>97</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/killware</link>
    <pubDate>Tue, 18 Jan 2022 21:13:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What is the False Claims Act and how will the Department of Justice start using it to help keep the nation safe from cyber criminals and adversaries? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 96: Normalizing Greater Accountability For Cybersecurity Fraud</itunes:title>
  <title>EP 96: Normalizing Greater Accountability For Cybersecurity Fraud</title>

    <enclosure length="38005070" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ec14f2d5-b326-495f-9687-e555e5487064.mp3" />
  <itunes:duration>00:39:35</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7175</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>96</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/normalizing-greater-accountability-for-cybersecurity-fraud</link>
    <pubDate>Tue, 04 Jan 2022 08:00:20 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>There is a massive insider threat in all our organizations according to the Verizon Data Breach Investigations Report (DBIR). Why is that and what should we do about it? Our guest, John Grim, one of the long-time authors of the report, will tell us. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 95: What To Do about the Massive Insider Threat?</itunes:title>
  <title>EP 95: What To Do about the Massive Insider Threat?</title>

    <enclosure length="38156372" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/4cc08438-4f42-447e-adce-19bb124aced0.mp3" />
  <itunes:duration>00:39:49</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7158</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>95</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/what-to-do-about-the-massive-insider-threat</link>
    <pubDate>Tue, 21 Dec 2021 08:00:01 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What can the Poly Network hack tell us about the state of cyber risk in the world of blockchain and smart contracts? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>You’ll find more details about the hack here: </p>

<p><a href="https://research.kudelskisecurity.com/2021/08/12/the-poly-network-hack-explained/" target="_blank">https://research.kudelskisecurity.com/2021/08/12/the-poly-network-hack-explained/</a></p>

<p> and here: <a href="https://slowmist.medium.com/the-root-cause-of-poly-network-being-hacked-ec2ee1b0c68f/" target="_blank">https://slowmist.medium.com/the-root-cause-of-poly-network-being-hacked-ec2ee1b0c68f/</a></p>

<p>Sign up for our free ethics CLE on December 15, 2021: <a href="https://www.eventbrite.com/e/1-hour-cutting-edge-cle-on-december-15th-at-12-pm-pacific-tickets-187700476177" target="_blank">https://www.eventbrite.com/e/1-hour-cutting-edge-cle-on-december-15th-at-12-pm-pacific-tickets-187700476177</a></p>

<p>Want to better understand crypto currency? Check this out: <a href="https://youtu.be/rYQgy8QDEBI" target="_blank">https://youtu.be/rYQgy8QDEBI</a></p>]]>
  </description>
  <itunes:title>EP 94: Inside the Poly Network Hack</itunes:title>
  <title>EP 94: Inside the Poly Network Hack</title>

    <enclosure length="31571092" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/6b473f2b-ba6e-4912-b64a-6a2f4fc2716e.mp3" />
  <itunes:duration>00:32:57</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7154</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>94</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/inside-the-poly-network-hack</link>
    <pubDate>Tue, 07 Dec 2021 08:00:01 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Is there anything helpful in the US President's “Improving the Nation’s Cybersecurity” Executive Order and the follow-on Ransomware Memo from the White House? Let's find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Sign up for our free ethics CLE on December 15, 2021: <a href="https://www.eventbrite.com/e/1-hour-cutting-edge-cle-on-december-15th-at-12-pm-pacific-tickets-187700476177" target="_blank">https://www.eventbrite.com/e/1-hour-cutting-edge-cle-on-december-15th-at-12-pm-pacific-tickets-187700476177</a></p>]]>
  </description>
  <itunes:title>EP 93: Executive Order on Ransomware and Cybersecurity</itunes:title>
  <title>EP 93: Executive Order on Ransomware and Cybersecurity</title>

    <enclosure length="33004643" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/cdea8c69-4b17-4560-9bf0-451d70a70a0a.mp3" />
  <itunes:duration>00:39:21</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7149</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>93</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/executive-order-on-ransomware-and-cybersecurity</link>
    <pubDate>Tue, 23 Nov 2021 08:00:44 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>If you’re not listening to the <a href="https://darknetdiaries.com/" target="_blank">Darknet Diaries</a>, you’re missing out on some relatable stories that will help you better tell your own cyber risk story to your senior decision makers. Find out how with the host of Darknet Diaries, Jack Rhysider, along with Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>Sign up for our free ethics CLE on December 15, 2021 at noon Pacific Time: <a href="https://www.eventbrite.com/e/1-hour-cutting-edge-cle-on-december-15th-at-12-pm-pacific-tickets-187700476177" target="_blank">https://www.eventbrite.com/e/1-hour-cutting-edge-cle-on-december-15th-at-12-pm-pacific-tickets-187700476177</a></p>]]>
  </description>
  <itunes:title>EP 92: Going Behind the Darknet Diaries…</itunes:title>
  <title>EP 92: Going Behind the Darknet Diaries…</title>

    <enclosure length="33636446" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/56db5aab-214c-4c93-a8f5-517c9f84854b.mp3" />
  <itunes:duration>00:40:06</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7139</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>92</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/going-behind-the-darknet-diaries</link>
    <pubDate>Tue, 09 Nov 2021 08:00:39 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Is the Verizon Data Breach Investigations Report (DBIR) trustworthy enough for cyber risk managers to use it to choose new or improved mitigations? Our guest Suzanne Widup, one of the long-time authors of the report, will tell us how the report is made and why you can trust it. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 91: Can you trust the Verizon Data Breach Investigations Report (DBIR) to help you run your Cyber Risk Program?</itunes:title>
  <title>EP 91: Can you trust the Verizon Data Breach Investigations Report (DBIR) to help you run your Cyber Risk Program?</title>

    <enclosure length="28456073" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/21ff81ce-cab0-441f-a37f-063b1cdc2122.mp3" />
  <itunes:duration>00:33:56</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7081</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>91</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/can-you-trust-the-verizon-data-breach-investigations-report-dbir-to-help-you-run-your-cyber-risk-program</link>
    <pubDate>Tue, 26 Oct 2021 08:00:39 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Cyber insurance coverages are going down and prices are going up. Not everyone who wants to buy a policy will be able to get one. Why? Our guest Chris Brumfield, cyber insurance expert from brokerage Alliant, will explain. And if you're an attorney, Jake Bernstein, Partner with K&amp;L Gates explains why this matters to your firm and your clients (and you'll get an ethics CLE if you listen to the end). This episode was originally broadcast as “The Ethics of Cybersecurity: How to Buy Cyber Insurance for Your Law Practice”.</p>]]>
  </description>
  <itunes:title>EP 90: How to Buy Cyber Insurance in this Turbulent Market</itunes:title>
  <title>EP 90: How to Buy Cyber Insurance in this Turbulent Market</title>

    <enclosure length="50853877" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/93e6ddec-74a4-4ae4-bd52-3fb0e8ec8125.mp3" />
  <itunes:duration>01:00:39</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7127</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>90</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-to-buy-cyber-insurance-in-this-turbulent-market</link>
    <pubDate>Tue, 12 Oct 2021 08:00:41 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What if you could intensionally build a cybersecurity subculture inside your orgnaization? You can! Learn how to pull the right levers with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 89: How to Really Make Sure that Cybersecurity is Everyone’s Job (Part 2)</itunes:title>
  <title>EP 89: How to Really Make Sure that Cybersecurity is Everyone’s Job (Part 2)</title>

    <enclosure length="38533685" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/a0a1ca10-ac56-4c26-b2a7-9aea28f39728.mp3" />
  <itunes:duration>00:45:57</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7074</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>89</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-to-really-make-sure-that-cybersecurity-is-everyones-job-part-2</link>
    <pubDate>Fri, 01 Oct 2021 08:00:37 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What if you could intensionally build a cybersecurity subculture inside your orgnaization? You can! Learn how to pull the right levers with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 88: How to Really Make Sure that Cybersecurity is Everyone’s Job (Part 1)</itunes:title>
  <title>EP 88: How to Really Make Sure that Cybersecurity is Everyone’s Job (Part 1)</title>

    <enclosure length="38216500" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/039c6086-c7e2-4fb2-aff7-1020a6d3f8e3.mp3" />
  <itunes:duration>00:45:34</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7057</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>88</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-to-really-make-sure-that-cybersecurity-is-everyones-job-part-1</link>
    <pubDate>Tue, 14 Sep 2021 08:00:36 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What are the best options for small and medium-sized businesses when it comes to cybersecurity? Let's look at the common barriers what and options they have with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates. Check out the CR-MAP that Kip mentions here: https://www.cr-map.com/</p>]]>
  </description>
  <itunes:title>EP 87: Cybersecurity for Small Companies</itunes:title>
  <title>EP 87: Cybersecurity for Small Companies</title>

    <enclosure length="35577514" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/e7f4ec27-b461-4164-beee-41d86d21ce1c.mp3" />
  <itunes:duration>00:42:25</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7054</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>87</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cybersecurity-for-small-companies</link>
    <pubDate>Tue, 31 Aug 2021 08:00:32 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Let's conclude our look at the 2021 Verizon DBIR report. Today we'll review the data by industry and the revised attack patterns with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 86: The 2021 edition of the Verizon Data Breach Investigations Report (DBIR) Part 2</itunes:title>
  <title>EP 86: The 2021 edition of the Verizon Data Breach Investigations Report (DBIR) Part 2</title>

    <enclosure length="32522510" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f0757568-c4aa-42f0-8e9e-6e7aaa5e12a0.mp3" />
  <itunes:duration>00:38:47</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7027</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>86</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-2021-edition-of-the-verizon-data-breach-investigations-report-dbir-part-2</link>
    <pubDate>Tue, 17 Aug 2021 08:00:07 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Have you read the Verizon DBIR report for 2021? Find out what it contains in the first of two episodes on this extremely useful report with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 85: The 2021 edition of the Verizon Data Breach Investigations Report (DBIR) Part 1</itunes:title>
  <title>EP 85: The 2021 edition of the Verizon Data Breach Investigations Report (DBIR) Part 1</title>

    <enclosure length="39235955" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c39c0d7a-40bd-46c9-9b36-6bf8a05fc32e.mp3" />
  <itunes:duration>00:46:47</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7024</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>85</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-2021-edition-of-the-verizon-data-breach-investigations-report-dbir-part-1</link>
    <pubDate>Tue, 03 Aug 2021 08:00:43 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Do you have a minimum viable plan for a major business disruption in the age of ransomware and other intense cyber risks? Learn how to make one with our guest Dan Weedin. We're your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 84: Minimum Viable Planning for a Cyber Business Disruption</itunes:title>
  <title>EP 84: Minimum Viable Planning for a Cyber Business Disruption</title>

    <enclosure length="31011751" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/aeb51f43-5726-491b-8d46-97133854ac9f.mp3" />
  <itunes:duration>00:36:59</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7021</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>84</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/minimum-viable-planning-for-a-cyber-business-disruption</link>
    <pubDate>Tue, 20 Jul 2021 08:00:34 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>The FBI is publicly releasing details about their active defense of the U.S. Is this a good thing? Find out your with hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>]]>
  </description>
  <itunes:title>EP 83: FBI on the Cyber Offensive</itunes:title>
  <title>EP 83: FBI on the Cyber Offensive</title>

    <enclosure length="30420057" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ae9cdd31-03df-4367-a739-a3d1cf09bd18.mp3" />
  <itunes:duration>00:36:16</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7018</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>83</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/fbi-on-the-cyber-offensive</link>
    <pubDate>Tue, 06 Jul 2021 08:00:53 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Ransomware is a big problem that's getting bigger. Learn about a new set of recommendations released by the Institute for Security + Technology’s Ransomware Task Force for dealing with the growing threat of ransomware with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>AND: Will all attorneys please join us online for a free, one-hour CLE on June 23, 2021 at 12 pm Pacific where Kip and Jake will teach you how to answer client questions about ransomware?</p>

<p>Sign up here: b.link/cle</p>]]>
  </description>
  <itunes:title>EP 82: Recommendations from the Ransomware Task Force</itunes:title>
  <title>EP 82: Recommendations from the Ransomware Task Force</title>

    <enclosure length="34672435" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2e26c1d7-aff3-4779-823a-29df1e3f53d1.mp3" />
  <itunes:duration>00:41:16</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=7009</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>82</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/recommendations-from-the-ransomware-task-force</link>
    <pubDate>Tue, 22 Jun 2021 08:00:15 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What can you learn from the latest NYDFS Consent Order? A lot. Learn with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&amp;L Gates.</p>

<p>AND: Will all attorneys please join us online for a free, one-hour CLE on June 23, 2021 at 12 pm Pacific where Kip and Jake will teach you how to answer client questions about ransomware?</p>

<p>Sign up here: b.link/cle</p>]]>
  </description>
  <itunes:title>EP 81: Something for everyone in latest NYDFS Consent Order</itunes:title>
  <title>EP 81: Something for everyone in latest NYDFS Consent Order</title>

    <enclosure length="32548398" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/0ad53d3a-3563-420a-9424-5230e1b66f1e.mp3" />
  <itunes:duration>00:38:49</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6970</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>81</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/something-for-everyone-in-latest-nydfs-consent-order</link>
    <pubDate>Tue, 08 Jun 2021 08:00:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Cyber insurance companies are starting to figure out what practices actually reduce the risk of a major cyber incident. Walk through an insurance application with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead.</p>

<p>AND: Will all attorneys please join us online for a free, one-hour CLE on June 23, 2021 at 12 pm Pacific where Kip and Jake will teach you how to answer client questions about ransomware?</p>

<p>Sign up here: b.link/cle</p>]]>
  </description>
  <itunes:title>EP 80: Cybersecurity Insurance makes progress in the right direction</itunes:title>
  <title>EP 80: Cybersecurity Insurance makes progress in the right direction</title>

    <enclosure length="31396467" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/97835971-80c7-4610-8947-f4df3c4972ab.mp3" />
  <itunes:duration>00:37:26</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6958</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>80</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cybersecurity-insurance-makes-progress-in-the-right-direction</link>
    <pubDate>Tue, 25 May 2021 08:00:06 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Our guest is Michael Garcia, who co-authored a report for the US government, entitled “A Roadmap to Strengthen US Cyber Enforcement: Where Do We Go From Here?” Find out his top 3 recommendations with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead.</p>

<p>AND: Will all attorneys please join us online for a free, one-hour CLE on June 23, 2021 at 12 pm Pacific where Kip and Jake will teach you how to answer client questions about ransomware?</p>

<p>Sign up here: b.link/cle</p>]]>
  </description>
  <itunes:title>EP 79: What should the US government do about rampant cyber crime?</itunes:title>
  <title>EP 79: What should the US government do about rampant cyber crime?</title>

    <enclosure length="33588548" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/25b1c6b2-a2a1-46d7-8200-d789dc4984b4.mp3" />
  <itunes:duration>00:35:02</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6934</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>79</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/what-should-the-us-government-do-about-rampant-cyber-crime</link>
    <pubDate>Tue, 11 May 2021 08:36:15 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Do you know how Internal Audit Teams can assist a CISO?! Take a look from an Internal Audit teams perspective and learn more on important of an role they play in your Cyber Risk Management, with hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 78: Importance of Internal Audit Teams</itunes:title>
  <title>EP 78: Importance of Internal Audit Teams</title>

    <enclosure length="43580729" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/05958201-60d5-488d-ab80-7999fd582f9a.mp3" />
  <itunes:duration>00:45:28</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6894</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>78</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/importance-of-internal-audit-teams</link>
    <pubDate>Tue, 27 Apr 2021 08:00:17 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What do you know about Cloud Security Marketing?! In today's episode, we do some mythbusting, specifically targeting common cloud security marketing messages, with the help of our guest, Paul Rich. To see more about Paul Rich check out his LinkedIn Profile: https://www.linkedin.com/in/parich/</p>]]>
  </description>
  <itunes:title>EP 77: Busted: The Truth about Cloud Security</itunes:title>
  <title>EP 77: Busted: The Truth about Cloud Security</title>

    <enclosure length="52653266" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/3a7fe03d-7df4-4a11-9364-a2d7e0fa81c9.mp3" />
  <itunes:duration>01:02:47</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6884</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>77</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/busted-the-truth-about-cloud-security</link>
    <pubDate>Tue, 13 Apr 2021 08:00:01 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>What does it mean for cybersecurity professionals trying to create defensibly reasonable cybersecurity programs if a data breach lawsuit is filed against their employer and it fails to gain class certification? Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 76: Implications of denial of class certification in data breach cases</itunes:title>
  <title>EP 76: Implications of denial of class certification in data breach cases</title>

    <enclosure length="31925583" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/8ebb898f-e14f-4c4a-bdd1-8ccdf6e4a270.mp3" />
  <itunes:duration>00:38:03</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6852</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>76</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/implications-of-denial-of-class-certification-in-data-breach-cases</link>
    <pubDate>Tue, 30 Mar 2021 08:00:42 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How do you prepare for the CISSP exam and what should you expect? Listen to Jake and Kip tell you how to prep for the exam using a 3-point plan. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 75: How to Pass your CISSP Exam</itunes:title>
  <title>EP 75: How to Pass your CISSP Exam</title>

    <enclosure length="32427294" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d35ce106-ecc9-4f60-a569-33f12df0b2df.mp3" />
  <itunes:duration>00:38:39</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6849</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>75</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-to-pass-your-cissp-exam</link>
    <pubDate>Tue, 16 Mar 2021 08:00:26 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>By reviewing a recent ransomware response case let's see what we can learn so our listeners can prevent their own ransomware disasters. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 74: Lessons Learned from Ransomware Attack</itunes:title>
  <title>EP 74: Lessons Learned from Ransomware Attack</title>

    <enclosure length="33628510" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/fe751dc5-c65c-4a54-a5e5-c6512140a15d.mp3" />
  <itunes:duration>00:40:05</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6844</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>74</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/lessons-learned-from-ransomware-attack</link>
    <pubDate>Tue, 02 Mar 2021 08:00:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>How do you prepare for the negotiation process when you’re staring at your customer’s new data security addendum? Learn how with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 73: Negotiating the Data Security Addendum</itunes:title>
  <title>EP 73: Negotiating the Data Security Addendum</title>

    <enclosure length="37045444" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c8d71ba4-6f84-4df1-acc2-aef66fac3bb0.mp3" />
  <itunes:duration>00:44:10</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6836</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>73</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/negotiating-the-data-security-addendum</link>
    <pubDate>Tue, 16 Feb 2021 08:00:35 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>We're collectively spending $100 billion each year to manage cyber risks and still the damages are going up. It's due to a big disfunction in the marketplace. But there's a cure! Learn more with Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 72: The Failure of the Cybersecurity Market</itunes:title>
  <title>EP 72: The Failure of the Cybersecurity Market</title>

    <enclosure length="35805623" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/716b3cc6-594e-4d39-a59f-f833bb54698d.mp3" />
  <itunes:duration>00:41:51</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6774</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>72</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-failure-of-the-cybersecurity-market</link>
    <pubDate>Tue, 02 Feb 2021 08:01:00 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>A new cyber insurance claims study of smaller businesses shows the top types of cyber-attacks, as well as their causes, for the first half of 2020. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 71: Learning from Latest in Cyber Insurance Claims</itunes:title>
  <title>EP 71: Learning from Latest in Cyber Insurance Claims</title>

    <enclosure length="33749943" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b70d7e29-c2d9-4c2a-a563-2d58c3165061.mp3" />
  <itunes:duration>00:39:24</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6771</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>71</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/learning-from-latest-in-cyber-insurance-claims</link>
    <pubDate>Fri, 18 Jan 2019 11:28:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>We take a look at cyber insurance coverage (and exposure) from a litigator’s perspective with the help of our guest, Josh Franklin. Learn with Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 70: A Trial Attorney Tells You How to Get the Most from your Cyber Insurance</itunes:title>
  <title>EP 70: A Trial Attorney Tells You How to Get the Most from your Cyber Insurance</title>

    <enclosure length="29886771" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/e841e485-0ea5-44a5-ab3e-a3c7edab21de.mp3" />
  <itunes:duration>00:34:48</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6768</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>70</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/a-trial-attorney-tells-you-how-to-get-the-most-from-your-cyber-insurance</link>
    <pubDate>Tue, 05 Jan 2021 08:00:03 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>We have some insightful updates on ransomware trends, along with an OFAC reminder from the US government, to give you yet more reasons not to pay cyber-attackers who encrypt your data. Learn with Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group.</p>]]>
  </description>
  <itunes:title>EP 69: More Reasons to Not Pay Ransomware Demands</itunes:title>
  <title>EP 69: More Reasons to Not Pay Ransomware Demands</title>

    <enclosure length="32572516" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/8bdd1d7a-29e9-482f-9d0a-77df9ea71f6c.mp3" />
  <itunes:duration>00:38:00</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6762</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>69</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/more-reasons-to-not-pay-ransomware-demands</link>
    <pubDate>Fri, 18 Dec 2020 08:00:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, turns the tables and puts Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, in the guest chair to ask him about the role of general counsel in cyber risk management.</p>]]>
  </description>
  <itunes:title>EP 68: Role of General Counsel in Cyber Risk Management</itunes:title>
  <title>EP 68: Role of General Counsel in Cyber Risk Management</title>

    <enclosure length="30555322" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/9c922855-ce41-4282-bef0-3767f8442dce.mp3" />
  <itunes:duration>00:35:36</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6601</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>68</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/role-of-general-counsel-in-cyber-risk-management</link>
    <pubDate>Tue, 08 Dec 2020 08:00:14 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, discuss the “lessons learned” from the Capital One Consumer Data Security Breach litigation ruling relating to the attorney-client privilege for data breach reports.</p>]]>
  </description>
  <itunes:title>EP 67: New Rules for Attorney-Client Privilege over Data Breach Reports</itunes:title>
  <title>EP 67: New Rules for Attorney-Client Privilege over Data Breach Reports</title>

    <enclosure length="31530575" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/1dbac103-33d1-43c8-9206-8f51144f83f2.mp3" />
  <itunes:duration>00:36:41</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6598</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>67</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/new-rules-for-attorney-client-privilege-over-data-breach-reports</link>
    <pubDate>Tue, 24 Nov 2020 08:00:28 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, talk with our guest, Dan Blum, about the challenges posed by the COVID-19 shutdown specifically for the cybersecurity professional. Dan will also share information about his new book, "Rational Cybersecurity for Business".</p>]]>
  </description>
  <itunes:title>EP 66: Challenges for Cybersecurity Pros of Sudden “Work From Home” requirements due to COVID-19</itunes:title>
  <title>EP 66: Challenges for Cybersecurity Pros of Sudden “Work From Home” requirements due to COVID-19</title>

    <enclosure length="36005737" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/1a2b3819-226c-42c3-8bb4-c7aaf609253b.mp3" />
  <itunes:duration>00:36:46</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6595</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>66</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/challenges-for-cybersecurity-pros-of-sudden-work-from-home-requirements-due-to-covid-19</link>
    <pubDate>Tue, 10 Nov 2020 08:00:28 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, explore cyber exploitation through supply chains with our guest, Steven Carnovale, Assistant Professor of Supply Chain Management at the Rochester Institute of Technology.</p>]]>
  </description>
  <itunes:title>EP 65: Cyber Exploitation Through Supply Chains</itunes:title>
  <title>EP 65: Cyber Exploitation Through Supply Chains</title>

    <enclosure length="30806419" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b6123e10-efff-491e-85d4-f3839753049a.mp3" />
  <itunes:duration>00:32:05</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6592</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>65</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cyber-exploitation-through-supply-chains</link>
    <pubDate>Tue, 27 Oct 2020 08:00:10 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, review trends in Internet Freedom with our guest, Harold Li, Vice President of ExpressVPN.</p>]]>
  </description>
  <itunes:title>EP 64: Current trends in Internet Freedom</itunes:title>
  <title>EP 64: Current trends in Internet Freedom</title>

    <enclosure length="33906416" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b570b64a-d74d-4663-8317-673f2ae8267c.mp3" />
  <itunes:duration>00:35:19</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6589</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>64</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/current-trends-in-internet-freedom</link>
    <pubDate>Tue, 13 Oct 2020 08:00:25 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, do a quick review of the Essential Eight mitigations published by the Australian Signals Directorate.</p>]]>
  </description>
  <itunes:title>EP 63: Quick look at the “Essential Eight” mitigations</itunes:title>
  <title>EP 63: Quick look at the “Essential Eight” mitigations</title>

    <enclosure length="37124715" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/28eb0edb-8d80-4790-b4b0-e02b29e1f94a.mp3" />
  <itunes:duration>00:38:40</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6585</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>63</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/quick-look-at-the-essential-eight-mitigations</link>
    <pubDate>Tue, 29 Sep 2020 08:00:49 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, go deeper into the 2020 edition of the Verizon Data Breach Investigations Report (DBIR).</p>]]>
  </description>
  <itunes:title>EP 62: Going deeper into the 2020 edition of the DBIR</itunes:title>
  <title>EP 62: Going deeper into the 2020 edition of the DBIR</title>

    <enclosure length="41458271" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f657b91d-b631-4ecc-9e91-619d2a0f7e26.mp3" />
  <itunes:duration>00:42:26</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6561</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>62</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/going-deeper-into-the-2020-edition-of-the-dbir</link>
    <pubDate>Tue, 15 Sep 2020 08:00:00 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, do a quick analysis of the 2020 edition of the Verizon Data Breach Investigations Report.</p>]]>
  </description>
  <itunes:title>EP 61: The 2020 edition of the Verizon Data Breach Investigations Report (DBIR)</itunes:title>
  <title>EP 61: The 2020 edition of the Verizon Data Breach Investigations Report (DBIR)</title>

    <enclosure length="35401245" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/8af7286e-df18-4b17-b625-637f7ed5adcb.mp3" />
  <itunes:duration>00:36:13</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6535</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>61</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-2020-edition-of-the-verizon-data-breach-investigations-report-dbir</link>
    <pubDate>Tue, 01 Sep 2020 08:00:26 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, explain how 3rd-party cybersecurity failures have resulted in a shareholder derivative lawsuit that names senior decision makers as defendants.</p>]]>
  </description>
  <itunes:title>EP 60: LabCorp shareholder sues senior decision makers over cybersecurity failures</itunes:title>
  <title>EP 60: LabCorp shareholder sues senior decision makers over cybersecurity failures</title>

    <enclosure length="33368671" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/9a293d8b-12d5-4e1c-a1c7-027c3745fc83.mp3" />
  <itunes:duration>00:34:01</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6505</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>60</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/labcorp-shareholder-sues-senior-decision-makers-over-cybersecurity-failures</link>
    <pubDate>Tue, 18 Aug 2020 08:00:19 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discusses DoCRA – Duty of Care Risk Analysis. It’s an approach that helps organizations figure out whether their cybersecurity controls are reasonable. And we'll do that with the help of our guest, Chris Cronin.</p>]]>
  </description>
  <itunes:title>EP 59: Can DoCRA (Duty of Care Risk Analysis) tell you if your cybersecurity controls are reasonable?</itunes:title>
  <title>EP 59: Can DoCRA (Duty of Care Risk Analysis) tell you if your cybersecurity controls are reasonable?</title>

    <enclosure length="74930838" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/024f7fe2-8c94-4474-86be-ae752fe32962.mp3" />
  <itunes:duration>00:52:02</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6458</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>59</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/can-docra-duty-of-care-risk-analysis-tell-you-if-your-cybersecurity-controls-are-reasonable</link>
    <pubDate>Tue, 04 Aug 2020 08:00:39 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss why some companies are so intense about managing cyber risk in their supply chains.</p>]]>
  </description>
  <itunes:title>EP 58: Why some companies are so intense about managing  supply chain cyber risk</itunes:title>
  <title>EP 58: Why some companies are so intense about managing  supply chain cyber risk</title>

    <enclosure length="46323605" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d7fb3c58-a33b-45e9-90e2-67e5f30b41e9.mp3" />
  <itunes:duration>00:32:10</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6446</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>58</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/why-some-companies-are-so-intense-about-managing-supply-chain-cyber-risk</link>
    <pubDate>Tue, 21 Jul 2020 08:00:04 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss the FTC’s new “at a minimum” language in its cybersecurity decisions and what that means for cyber risk managers.</p>]]>
  </description>
  <itunes:title>EP 57: The new “At a Minimum” FTC standard</itunes:title>
  <title>EP 57: The new “At a Minimum” FTC standard</title>

    <enclosure length="58170202" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b1e278df-2c08-42df-a42d-642898e09b62.mp3" />
  <itunes:duration>00:40:23</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6275</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>57</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-new-at-a-minimum-ftc-standard</link>
    <pubDate>Tue, 07 Jul 2020 08:00:35 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss the three steps business leaders should follow to overcome pre-sales cybersecurity due diligence sales hurdles with prospective customers.</p>]]>
  </description>
  <itunes:title>EP 56: How to quickly and profitably close deals with your cybersecurity intensive customers</itunes:title>
  <title>EP 56: How to quickly and profitably close deals with your cybersecurity intensive customers</title>

    <enclosure length="46063437" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/de987b41-aa8b-41ed-aa10-c2f2efe43ff8.mp3" />
  <itunes:duration>00:31:59</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6272</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>56</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-to-quickly-and-profitably-close-deals-with-your-cybersecurity-intensive-customers</link>
    <pubDate>Mon, 22 Jun 2020 08:00:50 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss how the Prelude Institute is helping to make up the shortfall in qualified cybersecurity professionals with our guest, Ted Ipsen.</p>]]>
  </description>
  <itunes:title>EP 55: How to graduate skilled cybersecurity analysts in only six months</itunes:title>
  <title>EP 55: How to graduate skilled cybersecurity analysts in only six months</title>

    <enclosure length="32826859" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/260e0a01-b0c8-4c51-b43d-eae9a4daaddd.mp3" />
  <itunes:duration>00:22:47</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6269</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>55</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-to-graduate-skilled-cybersecurity-analysts-in-only-six-months</link>
    <pubDate>Tue, 09 Jun 2020 08:00:34 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss how liability and blame is a serious obstacle to keeping the internet secure with our guest, professor and published author, Josephine Wolff.</p>]]>
  </description>
  <itunes:title>EP 54: The legal and economic aftermath of cybersecurity breaches</itunes:title>
  <title>EP 54: The legal and economic aftermath of cybersecurity breaches</title>

    <enclosure length="46012001" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c7b63e8c-510e-4baf-b642-ffd16bc1c4e1.mp3" />
  <itunes:duration>00:31:57</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6266</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>54</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-legal-and-economic-aftermath-of-cybersecurity-breaches</link>
    <pubDate>Tue, 26 May 2020 08:00:58 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss ABA Formal Opinion 483, which sets out requirements for law firms who suffer breaches of client data.</p>]]>
  </description>
  <itunes:title>EP 53: Post data breach requirements for law firms</itunes:title>
  <title>EP 53: Post data breach requirements for law firms</title>

    <enclosure length="45678852" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/a24fb68b-ebe1-4a82-a673-3d33b6865953.mp3" />
  <itunes:duration>00:31:43</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6262</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>53</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/post-data-breach-requirements-for-law-firms</link>
    <pubDate>Tue, 12 May 2020 08:00:34 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, reveal how people with privileged accounts are managing bigger risks to their organization than ever before. In the world of CCPA, GDPR, and SHIELD, not carefully setting permissions on those data lakes will lead to massive penalties for some organizations.</p>]]>
  </description>
  <itunes:title>EP 52: SysAdmins and the multi-million dollar privacy violations they will cause</itunes:title>
  <title>EP 52: SysAdmins and the multi-million dollar privacy violations they will cause</title>

    <enclosure length="33104601" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/809f95e0-26cb-4e43-90a1-3640c7b5d2bc.mp3" />
  <itunes:duration>00:22:59</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6239</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>52</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/sysadmins-and-the-multi-million-dollar-privacy-violations-they-will-cause</link>
    <pubDate>Tue, 28 Apr 2020 08:00:50 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss how cyber criminals are sending ransom demands to the people in the records they steal.</p>]]>
  </description>
  <itunes:title>EP 51: Cyber Extortion of Patients</itunes:title>
  <title>EP 51: Cyber Extortion of Patients</title>

    <enclosure length="31205684" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c943e5a9-5037-4fd2-b683-88d68eaf55fe.mp3" />
  <itunes:duration>00:21:40</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6183</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>51</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cyber-extortion-of-patients</link>
    <pubDate>Tue, 14 Apr 2020 08:00:00 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss the results of the annual listener survey.</p>]]>
  </description>
  <itunes:title>EP 50: Results of annual listener survey</itunes:title>
  <title>EP 50: Results of annual listener survey</title>

    <enclosure length="16679392" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/3a1aa651-9431-4eaf-8e85-ce4bcc3fc582.mp3" />
  <itunes:duration>00:11:34</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6150</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>50</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/results-of-annual-listener-survey</link>
    <pubDate>Tue, 31 Mar 2020 08:00:02 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss how organizations using Office 365 and G Suite should be using the many "hidden" but very affordable cybersecurity functions. Their availability is changing the definition of "reasonable cybersecurity".</p>]]>
  </description>
  <itunes:title>EP 49: Utility computing for cybersecurity is “reasonable”</itunes:title>
  <title>EP 49: Utility computing for cybersecurity is “reasonable”</title>

    <enclosure length="28275896" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c95df1a2-d117-428c-8ea9-8bc02391f1d6.mp3" />
  <itunes:duration>00:19:38</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6124</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>49</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/utility-computing-for-cybersecurity-is-reasonable</link>
    <pubDate>Tue, 17 Mar 2020 08:00:02 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss the effects of cyberattacks on corporate reputation and consumer confidence with the help of our friend and public relations expert, Casey Boggs.</p>]]>
  </description>
  <itunes:title>EP 48: The effects of cyberattacks on corporate reputation and consumer confidence</itunes:title>
  <title>EP 48: The effects of cyberattacks on corporate reputation and consumer confidence</title>

    <enclosure length="46585484" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b33fbabb-1a86-436a-80f7-84b2e90cb376.mp3" />
  <itunes:duration>00:32:21</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6054</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>48</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-effects-of-cyberattacks-on-corporate-reputation-and-consumer-confidence</link>
    <pubDate>Tue, 03 Mar 2020 09:51:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss California's new "Internet of Things" security law and its intersection with reasonable cybersecurity.</p>]]>
  </description>
  <itunes:title>EP 47: California’s IoT Security Law: Why It Matters</itunes:title>
  <title>EP 47: California’s IoT Security Law: Why It Matters</title>

    <enclosure length="32479814" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/28baaf1a-4ea1-482e-9961-e5a53d6df49e.mp3" />
  <itunes:duration>00:22:33</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6052</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>47</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/californias-iot-security-law-why-it-matters</link>
    <pubDate>Tue, 18 Feb 2020 09:50:33 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, share what is was like for each of them to work with FBI and Secret Service on two recent cyber crime cases.</p>]]>
  </description>
  <itunes:title>EP 46: Experiences with Law Enforcement on Cyber Crime Cases</itunes:title>
  <title>EP 46: Experiences with Law Enforcement on Cyber Crime Cases</title>

    <enclosure length="52577038" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/cb66bbd8-20c3-441c-98b8-c4fb7f3fcaeb.mp3" />
  <itunes:duration>00:36:30</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=6050</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>46</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/experiences-with-law-enforcement-on-cyber-crime-cases</link>
    <pubDate>Tue, 04 Feb 2020 11:49:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, give an update on CCPA and the New York SHIELD Act.</p>]]>
  </description>
  <itunes:title>EP 45: CCPA regulations and the New York SHIELD Act</itunes:title>
  <title>EP 45: CCPA regulations and the New York SHIELD Act</title>

    <enclosure length="51067333" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/33495fcd-cde7-4541-86fe-342ba18c1a6d.mp3" />
  <itunes:duration>00:35:27</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5919</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>45</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ccpa-regulations-and-the-new-york-shield-act</link>
    <pubDate>Tue, 21 Jan 2020 09:00:49 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss why entrepreneurs need special guidance on cybersecurity.</p>]]>
  </description>
  <itunes:title>EP 44: Cybersecurity for entrepreneurs (and their employees)</itunes:title>
  <title>EP 44: Cybersecurity for entrepreneurs (and their employees)</title>

    <enclosure length="33249352" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2ed3afe6-d133-4a37-9f75-5f9d1872a4b0.mp3" />
  <itunes:duration>00:23:05</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5913</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>44</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cybersecurity-for-entrepreneurs-and-their-employees</link>
    <pubDate>Tue, 07 Jan 2020 09:00:09 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss why the FTC tends to setting their cybersecurity cases instead of going to trial.</p>]]>
  </description>
  <itunes:title>EP 43: Why does the FTC settle on cybersecurity cases?</itunes:title>
  <title>EP 43: Why does the FTC settle on cybersecurity cases?</title>

    <enclosure length="42073100" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f3dd4d8f-4f11-4e91-8819-c65a0132a0d8.mp3" />
  <itunes:duration>00:29:13</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5907</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>43</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/why-does-the-ftc-settle-on-cybersecurity-cases</link>
    <pubDate>Tue, 24 Dec 2019 09:00:52 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, discuss how cyber-attackers are abusing the trusted relationship between IT service providers and their customers.</p>]]>
  </description>
  <itunes:title>EP 42: Exploiting IT Service Providers and their Customers</itunes:title>
  <title>EP 42: Exploiting IT Service Providers and their Customers</title>

    <enclosure length="47625166" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/ff67af54-f0c5-44fe-bb9f-4dd3e31d673e.mp3" />
  <itunes:duration>00:33:04</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5901</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>42</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/exploiting-it-service-providers-and-their-customers</link>
    <pubDate>Tue, 10 Dec 2019 09:00:47 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss Security Outsourcing: Vendor Selection and Management.</p>]]>
  </description>
  <itunes:title>EP 41: Security Outsourcing: Vendor Selection and Management</itunes:title>
  <title>EP 41: Security Outsourcing: Vendor Selection and Management</title>

    <enclosure length="49235662" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/9e88d0c1-709e-4079-ab54-ce55496833ae.mp3" />
  <itunes:duration>00:34:11</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5856</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>41</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/security-outsourcing-vendor-selection-and-management</link>
    <pubDate>Tue, 26 Nov 2019 09:31:21 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, discuss a recent Dark Reading article by Sara Peters: "It Saved Our Community: 16 Realistic Ransomware Defenses for Cities"</p>]]>
  </description>
  <itunes:title>EP 40: Ransomware Defenses for cities</itunes:title>
  <title>EP 40: Ransomware Defenses for cities</title>

    <enclosure length="37844087" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/cef8d1e7-c2fa-4bb3-97a4-50904a2c887f.mp3" />
  <itunes:duration>00:26:16</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5839</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>40</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/ransomware-defenses-for-cities</link>
    <pubDate>Tue, 12 Nov 2019 16:26:59 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, review the rise and fall of Colorado Timberline, a one-time porfolio company of Frontenac and Charter Oak Equity.</p>]]>
  </description>
  <itunes:title>EP 39: The Major Cyber Risk of Private Equity Firms</itunes:title>
  <title>EP 39: The Major Cyber Risk of Private Equity Firms</title>

    <enclosure length="45754309" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/9414b201-497f-4a9e-99c5-11659f92d7e9.mp3" />
  <itunes:duration>00:31:46</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5804</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>39</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-major-cyber-risk-of-private-equity-firms</link>
    <pubDate>Tue, 29 Oct 2019 08:00:27 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal PLLP, discuss the revised Washington State data breach notification law and why it matters to all our listeners.</p>]]>
  </description>
  <itunes:title>EP 38: The new data breach notification law in Washington</itunes:title>
  <title>EP 38: The new data breach notification law in Washington</title>

    <enclosure length="43492939" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/86087a73-2cb0-47f2-a00f-01be50bf4dae.mp3" />
  <itunes:duration>00:30:12</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5733</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>38</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-new-data-breach-notification-law-in-washington</link>
    <pubDate>Tue, 15 Oct 2019 09:00:36 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talk with guest Casey Boggs about how to manage cyber risk with good public relations.</p>]]>
  </description>
  <itunes:title>EP 37: Cyber risk and public relations</itunes:title>
  <title>EP 37: Cyber risk and public relations</title>

    <enclosure length="45260664" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f5fb6d36-65d7-4f3a-8b7b-d36ef8d682f4.mp3" />
  <itunes:duration>00:31:25</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5727</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>37</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cyber-risk-and-public-relations</link>
    <pubDate>Tue, 01 Oct 2019 08:00:28 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, discuss "The Sedona Conference Draft Commentary on Reasonable Security Test"</p>]]>
  </description>
  <itunes:title>EP 36: The emerging “Reasonableness Test” for cybersecurity</itunes:title>
  <title>EP 36: The emerging “Reasonableness Test” for cybersecurity</title>

    <enclosure length="53039565" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/1b799c99-77dc-4bd1-9698-5c5a7bb80ede.mp3" />
  <itunes:duration>00:36:49</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5721</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>36</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-emerging-reasonableness-test-for-cybersecurity</link>
    <pubDate>Tue, 17 Sep 2019 09:00:12 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, talk with guest Peter Marchel about the current state of the wholesale cyber insurance market.</p>]]>
  </description>
  <itunes:title>EP 35: Wholesaler perspective in cyber insurance</itunes:title>
  <title>EP 35: Wholesaler perspective in cyber insurance</title>

    <enclosure length="49298434" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/a73ac2c6-c9a7-4b1a-a0bb-ca0c9e599ba1.mp3" />
  <itunes:duration>00:34:14</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5591</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>35</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/wholesaler-perspective-in-cyber-insurance</link>
    <pubDate>Tue, 03 Sep 2019 00:01:01 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about what cyber risk managers can learn from the ASUS supply chain cyberattack.</p>]]>
  </description>
  <itunes:title>EP 34: Why The ASUS Supply Chain Cyberattack Is a Big Deal</itunes:title>
  <title>EP 34: Why The ASUS Supply Chain Cyberattack Is a Big Deal</title>

    <enclosure length="36185804" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d700fdcf-2fb9-46be-a5dc-194fd6f10f40.mp3" />
  <itunes:duration>00:25:07</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5585</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>34</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/why-the-asus-supply-chain-cyberattack-is-a-big-deal</link>
    <pubDate>Tue, 20 Aug 2019 00:01:54 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about what cyber risk managers can still learn from the 2012 data breach at the South Carolina Department of Revenue.</p>]]>
  </description>
  <itunes:title>EP 33: How the blame game that follows big data breaches affects defenders</itunes:title>
  <title>EP 33: How the blame game that follows big data breaches affects defenders</title>

    <enclosure length="49649820" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/23da06dd-f4a4-43bd-911b-28f20e4e5110.mp3" />
  <itunes:duration>00:34:28</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5573</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>33</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-the-blame-game-that-follows-big-data-breaches-affects-defenders</link>
    <pubDate>Tue, 06 Aug 2019 09:01:10 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, talk with guest Chris Brumfield about the current state of the cyber insurance market.</p>]]>
  </description>
  <itunes:title>EP 32: Independent broker’s perspective on cyber insurance</itunes:title>
  <title>EP 32: Independent broker’s perspective on cyber insurance</title>

    <enclosure length="46170766" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/13d0258e-416e-4e00-98df-5e6e008914af.mp3" />
  <itunes:duration>00:32:03</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5543</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>32</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/independent-brokers-perspective-on-cyber-insurance</link>
    <pubDate>Tue, 23 Jul 2019 15:11:38 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, talk with guest Debra Richarson about how finance professionals should protect their company from common financial cyber fraud.</p>]]>
  </description>
  <itunes:title>EP 31: Protecting your accounts payable function from cyberattack</itunes:title>
  <title>EP 31: Protecting your accounts payable function from cyberattack</title>

    <enclosure length="50142291" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/526022e2-8c45-4aaa-b0ed-0018c3f83033.mp3" />
  <itunes:duration>00:34:49</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5529</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>31</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/protecting-your-accounts-payable-function-from-cyberattack</link>
    <pubDate>Tue, 09 Jul 2019 04:01:27 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about a company that sued its employee for being phished out of $260,000.</p>]]>
  </description>
  <itunes:title>EP 30: Company Sues Employee For Being Phished</itunes:title>
  <title>EP 30: Company Sues Employee For Being Phished</title>

    <enclosure length="45591296" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/88254328-b2f2-4cbf-9744-41e41d0c57e0.mp3" />
  <itunes:duration>00:31:39</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5512</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>30</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/company-sues-employee-for-being-phished</link>
    <pubDate>Tue, 25 Jun 2019 00:01:00 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, talk with guest Melissa Van Buhler about what the military can teach the private sector about incident response.</p>]]>
  </description>
  <itunes:title>EP 29: What the Private Sector Can Learn about Incident Response from the Military</itunes:title>
  <title>EP 29: What the Private Sector Can Learn about Incident Response from the Military</title>

    <enclosure length="46807844" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c1c27d76-b4cc-4fd5-9a90-8403756ae692.mp3" />
  <itunes:duration>00:32:30</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5502</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>29</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/what-the-private-sector-can-learn-about-incident-response-from-the-military</link>
    <pubDate>Tue, 11 Jun 2019 00:06:11 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about how some people believe that by using webapps, they are more secure than when using traditional software.</p>]]>
  </description>
  <itunes:title>EP 28: The Rise of WebApps and Their Impact on Cybersecurity</itunes:title>
  <title>EP 28: The Rise of WebApps and Their Impact on Cybersecurity</title>

    <enclosure length="44950411" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/7e356b7d-3807-4d7e-b00b-c6b320eff6dd.mp3" />
  <itunes:duration>00:31:12</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5461</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>28</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-rise-of-webapps-and-their-impact-on-cybersecurity</link>
    <pubDate>Tue, 28 May 2019 00:01:07 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about three things that cyber risk managers will find at the intersection of artificial intelligence and cybersecurity.</p>]]>
  </description>
  <itunes:title>EP 27: What’s at the intersection of AI and cybersecurity?</itunes:title>
  <title>EP 27: What’s at the intersection of AI and cybersecurity?</title>

    <enclosure length="42219404" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/893ceebc-3181-490f-b890-3b36c6d1bf5e.mp3" />
  <itunes:duration>00:29:19</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5431</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>27</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/whats-at-the-intersection-of-ai-and-cybersecurity</link>
    <pubDate>Tue, 14 May 2019 00:01:44 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about how the 35-year-old Computer Fraud and Abuse Act (CFAA) is a useful tool for today's cyber risk managers.</p>]]>
  </description>
  <itunes:title>EP 26: Computer Fraud and Abuse Act (Revisited)</itunes:title>
  <title>EP 26: Computer Fraud and Abuse Act (Revisited)</title>

    <enclosure length="40680896" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f8f160ee-ee0e-458b-bb8b-055eb003488f.mp3" />
  <itunes:duration>00:28:15</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5416</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>26</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/computer-fraud-and-abuse-act-revisited</link>
    <pubDate>Tue, 30 Apr 2019 15:15:01 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about his new book, Fire Doesn’t Innovate, on sale January 15, 2019. It includes a free, online Cyber Risk Workbook that automates Part 2 of the book: The creation of your Cyber Risk Management Game Plan.</p>]]>
  </description>
  <itunes:title>EP 25: BONUS: New book: “Fire Doesn’t Innovate” on sale now</itunes:title>
  <title>EP 25: BONUS: New book: “Fire Doesn’t Innovate” on sale now</title>

    <enclosure length="46334917" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2360f850-f709-419d-aa67-31e3797fa8b7.mp3" />
  <itunes:duration>00:32:10</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4961</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>25</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/bonus-new-book-fire-doesnt-innovate-on-sale-now</link>
    <pubDate>Mon, 14 Jan 2019 00:01:03 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about how new techniques for automating ad fraud will probably lead to other types of cybercrime.</p>]]>
  </description>
  <itunes:title>EP 24: How fake advertising fuels other cybercrimes</itunes:title>
  <title>EP 24: How fake advertising fuels other cybercrimes</title>

    <enclosure length="46334917" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c2a79992-d2df-4153-8f2f-32a2eeb179a3.mp3" />
  <itunes:duration>00:32:10</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5399</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>24</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-fake-advertising-fuels-other-cybercrimes</link>
    <pubDate>Tue, 16 Apr 2019 15:06:05 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about what the next 30 years of cyber risks will look like.</p>]]>
  </description>
  <itunes:title>EP 23: What the last 30 years of cyber risks tells us about what’s ahead</itunes:title>
  <title>EP 23: What the last 30 years of cyber risks tells us about what’s ahead</title>

    <enclosure length="53834458" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/91295919-e87a-42ef-9079-a56162929bbb.mp3" />
  <itunes:duration>00:37:23</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5368</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>23</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/what-the-last-30-years-of-cyber-risks-tells-us-about-whats-ahead</link>
    <pubDate>Tue, 02 Apr 2019 00:01:45 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about the cyber risks of autonomous vehicles.</p>]]>
  </description>
  <itunes:title>EP 22: Cyber risks of autonomous vehicles</itunes:title>
  <title>EP 22: Cyber risks of autonomous vehicles</title>

    <enclosure length="55660347" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/931ae9e8-32c5-4516-b76a-d4c1787fdbd6.mp3" />
  <itunes:duration>00:38:39</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5366</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>22</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cyber-risks-of-autonomous-vehicles</link>
    <pubDate>Tue, 19 Mar 2019 00:01:41 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, today we talked about how germs can teach us a lot about how to deal with cyber-attacks.</p>]]>
  </description>
  <itunes:title>EP 21: What germs can teach us about dealing with cyber-attacks</itunes:title>
  <title>EP 21: What germs can teach us about dealing with cyber-attacks</title>

    <enclosure length="45675191" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/d1ed293c-e08e-4b3b-808b-720513e6eee9.mp3" />
  <itunes:duration>00:31:42</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4857</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>21</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/what-germs-can-teach-us-about-dealing-with-cyber-attacks</link>
    <pubDate>Tue, 27 Nov 2018 16:18:07 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, provide a preview of a new book to help executives thrive as cyber risk managers.</p>]]>
  </description>
  <itunes:title>EP 20: New book: “Fire Doesn’t Innovate”</itunes:title>
  <title>EP 20: New book: “Fire Doesn’t Innovate”</title>

    <enclosure length="36339055" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/976d93f3-dbf3-4f9b-96a4-5d3ea5bf7d53.mp3" />
  <itunes:duration>00:25:13</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4798</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>20</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/new-book-fire-doesnt-innovate</link>
    <pubDate>Tue, 30 Oct 2018 00:01:33 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, discuss how cyber risk management is actually a fiduciary duty of corporate directors and officers.</p>]]>
  </description>
  <itunes:title>EP 19: Business Judgment Rule</itunes:title>
  <title>EP 19: Business Judgment Rule</title>

    <enclosure length="43665135" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/39dda9a3-01ee-46fd-af5c-43a7577b14ab.mp3" />
  <itunes:duration>00:30:19</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5341</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>19</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/business-judgment-rule</link>
    <pubDate>Tue, 05 Mar 2019 00:01:27 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, discuss six "must read" non-technical books for cyber risk managers.</p>]]>
  </description>
  <itunes:title>EP 18: Six “must read” non-technical books for cyber risk managers</itunes:title>
  <title>EP 18: Six “must read” non-technical books for cyber risk managers</title>

    <enclosure length="52079380" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/f0dd7283-dc76-4994-98bb-7148151edb0b.mp3" />
  <itunes:duration>00:36:09</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5317</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>18</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/six-must-read-non-technical-books-for-cyber-risk-managers</link>
    <pubDate>Wed, 20 Feb 2019 00:00:06 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about why this is a golden age for cyber criminals.</p>]]>
  </description>
  <itunes:title>EP 17: The golden age for cyber-criminals</itunes:title>
  <title>EP 17: The golden age for cyber-criminals</title>

    <enclosure length="48446523" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/08862bcb-efef-499f-8e9f-0169f05b3b5f.mp3" />
  <itunes:duration>00:33:38</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=5292</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>17</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-golden-age-for-cyber-criminals</link>
    <pubDate>Tue, 05 Feb 2019 00:01:16 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about how executives should think about threat intelligence: What it is, where to get it, how to use it, and how to get started. They also discuss how artificial intelligence and machine learning can help make threat intelligence more useful.</p>]]>
  </description>
  <itunes:title>EP 16: Threat Intelligence</itunes:title>
  <title>EP 16: Threat Intelligence</title>

    <enclosure length="42744108" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/a04aaf3c-cc49-4262-9e5f-4f4ded04ca07.mp3" />
  <itunes:duration>00:29:40</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4963</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>16</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/threat-intelligence</link>
    <pubDate>Wed, 23 Jan 2019 00:01:32 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about talk about the new California Consumer Privacy Act or CCPA and how executives should be thinking about this new cyber risk.</p>]]>
  </description>
  <itunes:title>EP 15: California Consumer Privacy Act (CCPA)</itunes:title>
  <title>EP 15: California Consumer Privacy Act (CCPA)</title>

    <enclosure length="49191991" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/a4e4730e-71bf-4f59-8b72-e09db29bb54f.mp3" />
  <itunes:duration>00:34:09</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4599</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>15</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/california-consumer-privacy-act-ccpa</link>
    <pubDate>Tue, 21 Aug 2018 00:01:40 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about how executives can create strong contractual firewalls between themselves and their vendors and customers to guard against excessive financial loss due to cybersecurity failures.</p>]]>
  </description>
  <itunes:title>EP 14: Contractual Firewalls</itunes:title>
  <title>EP 14: Contractual Firewalls</title>

    <enclosure length="48250094" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/374f6627-6ff8-447b-9ad5-3b392aad3379.mp3" />
  <itunes:duration>00:33:30</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4957</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>14</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/contractual-firewalls</link>
    <pubDate>Tue, 08 Jan 2019 00:01:18 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about how smaller companies struggle to respond to cybersecurity questionnaires from bigger customers.</p>]]>
  </description>
  <itunes:title>EP 13: Small Companies Struggle with Big Company Cybersecurity Questionnaires</itunes:title>
  <title>EP 13: Small Companies Struggle with Big Company Cybersecurity Questionnaires</title>

    <enclosure length="39293919" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/84f32e37-c92e-4492-9f3c-03017546c3de.mp3" />
  <itunes:duration>00:27:17</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4908</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>13</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/small-companies-struggle-with-big-company-cybersecurity-questionnaires</link>
    <pubDate>Wed, 26 Dec 2018 00:01:47 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, on the difference between focusing on compliance with cybersecurity laws and regulations versus practicing cybersecurity.</p>]]>
  </description>
  <itunes:title>EP 12: Compliance Versus Practicing Cybersecurity</itunes:title>
  <title>EP 12: Compliance Versus Practicing Cybersecurity</title>

    <enclosure length="37370653" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/fd5741f7-fe88-4095-8bd2-ae10f05906ec.mp3" />
  <itunes:duration>00:25:56</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4890</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>12</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/compliance-versus-practicing-cybersecurity</link>
    <pubDate>Tue, 11 Dec 2018 16:26:23 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle talks with Jake Bernstein on the need for law firms to have reasonable cyber security. They also discuss how law firms can provide Attorney Client Privilege (ACP) to their clients who conduct Cyber Risk Assessments.</p>]]>
  </description>
  <itunes:title>EP 11: Cyber Risk and Law Firms</itunes:title>
  <title>EP 11: Cyber Risk and Law Firms</title>

    <enclosure length="32751129" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/7098d337-53e8-4ffe-967d-6c8f7d438f7e.mp3" />
  <itunes:duration>00:22:44</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4684</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>11</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cyber-risk-and-law-firms</link>
    <pubDate>Tue, 13 Nov 2018 00:01:34 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle and Jake Bernstein describe "active defense" as an emerging technique for dealing with cyber-attackers and the legality of the various methods.</p>]]>
  </description>
  <itunes:title>EP 10: Methods and Legality of “Active Defense”</itunes:title>
  <title>EP 10: Methods and Legality of “Active Defense”</title>

    <enclosure length="46056729" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/2c9966b3-7b6e-44ab-b380-dd1f4bb19fec.mp3" />
  <itunes:duration>00:31:58</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4680</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>10</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/methods-and-legality-of-active-defense</link>
    <pubDate>Tue, 16 Oct 2018 00:01:59 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle and Jake Bernstein explain how you need to use people, process, and management (in addition to technology) in order to have reasonable cybersecurity.</p>]]>
  </description>
  <itunes:title>EP 9: Non-Technical Ways to Manage Cyber Risk</itunes:title>
  <title>EP 9: Non-Technical Ways to Manage Cyber Risk</title>

    <enclosure length="42227481" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/8185b270-e750-448b-9d81-71738fa56421.mp3" />
  <itunes:duration>00:29:19</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4682</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>9</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/non-technical-ways-to-manage-cyber-risk</link>
    <pubDate>Tue, 02 Oct 2018 00:01:28 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle and Jake Bernstein discuss whether organizations should pay a ransom to regain control over their data and systems.</p>]]>
  </description>
  <itunes:title>EP 8: How to deal with Ransomware</itunes:title>
  <title>EP 8: How to deal with Ransomware</title>

    <enclosure length="35251545" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/787acd7d-a009-4b5c-ade5-8ea172eb61fd.mp3" />
  <itunes:duration>00:24:28</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4485</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>8</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-to-deal-with-ransomware</link>
    <pubDate>Tue, 18 Sep 2018 00:01:20 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, summarize the European Union's General Data Protection Regulation or, GDPR.</p>]]>
  </description>
  <itunes:title>EP 7: What is GDPR?</itunes:title>
  <title>EP 7: What is GDPR?</title>

    <enclosure length="44467737" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/b15dd32b-9453-443e-8bc3-11c4e05720db.mp3" />
  <itunes:duration>00:30:51</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4483</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>7</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/what-is-gdpr</link>
    <pubDate>Wed, 08 Aug 2018 00:01:43 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, describe how Attorney Client Privilege (ACP) and Attorney Work Product (AWP) doctrine can increase the quality of your cyber risk management practices.</p>]]>
  </description>
  <itunes:title>EP 6: Cyber Risk Management and Attorney Client Privilege</itunes:title>
  <title>EP 6: Cyber Risk Management and Attorney Client Privilege</title>

    <enclosure length="41529361" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/c1041457-d0d3-481d-8fcd-4997f4bb2510.mp3" />
  <itunes:duration>00:28:50</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4480</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>6</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/cyber-risk-management-and-attorney-client-privilege</link>
    <pubDate>Tue, 04 Sep 2018 00:01:28 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about how the FTC has been working since 2010 to define "Reasonable Cybersecurity" standard.</p>]]>
  </description>
  <itunes:title>EP 5: How the FTC Defines “Reasonable Cybersecurity”</itunes:title>
  <title>EP 5: How the FTC Defines “Reasonable Cybersecurity”</title>

    <enclosure length="54280857" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/7fdafbb3-0149-43b0-bf6c-26c738db1a3c.mp3" />
  <itunes:duration>00:37:41</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4478</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>5</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/how-the-ftc-defines-reasonable-cybersecurity</link>
    <pubDate>Tue, 24 Jul 2018 00:01:42 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about the emerging "Reasonable Cybersecurity" standard: Where it's coming from and what how it should affect the decisions made by cyber risk managers.</p>]]>
  </description>
  <itunes:title>EP 4: The “Reasonable Cybersecurity” Standard</itunes:title>
  <title>EP 4: The “Reasonable Cybersecurity” Standard</title>

    <enclosure length="44041861" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/0e8ed03d-a110-48e8-91e3-39e51dc1977b.mp3" />
  <itunes:duration>00:30:35</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4476</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>4</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/the-reasonable-cybersecurity-standard</link>
    <pubDate>Tue, 10 Jul 2018 21:32:41 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about why every company needs good cyber risk management.</p>]]>
  </description>
  <itunes:title>EP 3: Why Your Company Needs Cyber Risk Management</itunes:title>
  <title>EP 3: Why Your Company Needs Cyber Risk Management</title>

    <enclosure length="39357258" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/89070287-4555-4afc-bc87-fcfabbb3b5cd.mp3" />
  <itunes:duration>00:27:19</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4428</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>3</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/why-your-company-needs-cyber-risk-management</link>
    <pubDate>Fri, 15 Jun 2018 22:23:56 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about who is really driving the over $6 trillion in damage expected in 2021 due to cyber failures.</p>]]>
  </description>
  <itunes:title>EP 2: Your Newest Competitor Creates Most of Your Cyber Risk</itunes:title>
  <title>EP 2: Your Newest Competitor Creates Most of Your Cyber Risk</title>

    <enclosure length="53270548" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/499aa571-e249-4e19-8816-8065427cdcf8.mp3" />
  <itunes:duration>00:36:59</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4425</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>2</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/your-newest-competitor-creates-most-of-your-cyber-risk</link>
    <pubDate>Fri, 15 Jun 2018 22:21:13 +0000</pubDate>
</item>
        
<item>
  <description>
    <![CDATA[<p>Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice Lead at Newman DuWors LLP, about who we are, what we do, and why we do it.</p>]]>
  </description>
  <itunes:title>EP 1: Introducing Cyber Risk Management Podcast</itunes:title>
  <title>EP 1: Introducing Cyber Risk Management Podcast</title>

    <enclosure length="25115443" type="audio/mpeg" url="https://downloads.pod.co/467d5193-e285-48f8-a684-08501c82ee2b/8f98ce62-ac25-46de-821c-1868e130c151.mp3" />
  <itunes:duration>00:17:26</itunes:duration>
    <guid isPermaLink="false">https://www.cyberriskopportunities.com/?p=4405</guid>
  <itunes:author>Kip Boyle</itunes:author>
    <itunes:episode>1</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
  <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://images.pod.co/X7QovDdAnefyOQdhbEUSNfSBGOBOcOzQDHy6kx1Uu1Y/resize:fill:3000:3000/plain/artwork/ab8b488c-a3b0-4ea0-96f1-6cf83a8ac2da/cyber-risk-management-podcast-2.jpg" />
      <link>https://pod.co/cyber-risk-management-podcast-2/introducing-cyber-risk-management-podcast</link>
    <pubDate>Thu, 07 Jun 2018 21:19:46 +0000</pubDate>
</item>
      </channel>
</rss>
