<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
<channel>
  <atom:link href="https://feeds.cohostpodcasting.com/DOQjfpdu" rel="self" title="MP3 Audio" type="application/atom+xml"/>
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <generator>https://cohostpodcasting.com</generator>
  <title><![CDATA[Authenticate This! The Cybersecurity Leadership Podcast]]></title>
  <description><![CDATA[“Authenticate This!: The Cybersecurity Leadership Podcast” uncovers what shapes the digital landscape, exploring not only the technical side of cybersecurity, but how identity shapes security strategies, influences organizational dynamics and drives leadership decisions in this high-stakes field. We discuss real-world challenges and actionable strategies to empower listeners to become stronger leaders and more effective defenders against the ever-evolving landscape of cyber threats. 

“Authenticate This!” brings you insights and inspiration to stay one step ahead in safeguarding our digital future.]]></description>
  <itunes:summary><![CDATA[“Authenticate This!: The Cybersecurity Leadership Podcast” uncovers what shapes the digital landscape, exploring not only the technical side of cybersecurity, but how identity shapes security strategies, influences organizational dynamics and drives leadership decisions in this high-stakes field. We discuss real-world challenges and actionable strategies to empower listeners to become stronger leaders and more effective defenders against the ever-evolving landscape of cyber threats. 

“Authenticate This!” brings you insights and inspiration to stay one step ahead in safeguarding our digital future.]]></itunes:summary>
  <language>en</language>
  <copyright><![CDATA[Copyright 2025]]></copyright>
<podcast:guid>667f900c-844d-487d-9721-ffce8bfb5376</podcast:guid>
  <pubDate>Tue, 28 Jan 2025 08:03:42 -0500</pubDate>
  <lastBuildDate>Wed, 28 Jan 2026 09:10:24 -0500</lastBuildDate>
  <image>
    <link>https://ic-consult.com/en/</link>
    <title><![CDATA[Authenticate This! The Cybersecurity Leadership Podcast]]></title>
    <url>https://files.cohostpodcasting.com/quill-file-prod/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/cover-art/original_eb2510f1b5f07a1e6f32223909bb31c6.jpg</url>
  </image>
  <link>https://ic-consult.com/en/</link>
  <itunes:type>episodic</itunes:type>
  <itunes:author><![CDATA[iC Consult]]></itunes:author>
  <itunes:explicit>false</itunes:explicit>
  <itunes:image href="https://files.cohostpodcasting.com/quill-file-prod/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/cover-art/original_eb2510f1b5f07a1e6f32223909bb31c6.jpg"/>
  <itunes:new-feed-url>https://feeds.cohostpodcasting.com/DOQjfpdu</itunes:new-feed-url>
      <itunes:keywords><![CDATA[Cybersecurity,Cybersecurity Strategy,Identity Management,Information Security,Data Security,Data Privacy,Data Breach,Cyber Attack,Cyber Threat,Ethical Hacking,Threat Intelligence,CTO,CIO,CISO]]></itunes:keywords>
  
  <itunes:owner>
    <itunes:name><![CDATA[Authenticate This!]]></itunes:name>
    <itunes:email>icconspodcast@gmail.com</itunes:email>
  </itunes:owner>
  <itunes:category text="Technology"/>
<item>
  <guid isPermaLink="false">53212deb-d7e2-40f0-9ed3-612746976037</guid>
  <title><![CDATA[Securing  Millions of  Lives Through Identity-First Strategy with Richard Henderson of Alberta Health Services]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">In this episode, we talk to </span><a href="https://www.linkedin.com/in/richsentme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Richard Henderson</a><span style="background-color: transparent;">, Executive Director and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/alberta-health-services" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a><span style="background-color: transparent;">, about leading cybersecurity across one of the largest hospital networks in North America. Richard explains how clinical operations, digital safety and human-centered leadership converge in high-stakes environments where downtime can directly impact patient care.</span></p><p><br></p><p><span style="background-color: transparent;">He also shares how his background across public and private sectors informs his approach to team development, why he prioritizes continuous learning and rest, and how his perspective as a parent shapes his views on safe technology exposure and foundational digital skills.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">07:13 Limiting screen time improves children's reading abilities.</span></p><p><span style="background-color: transparent;">13:19 Mandatory learning plans prevent burnout and enable growth.</span></p><p><span style="background-color: transparent;">22:30 Setting boundaries and reducing false urgency helps prevent burnout in security teams.</span></p><p><span style="background-color: transparent;">27:53 Saying yes enables business success and collaboration.</span></p><p><span style="background-color: transparent;">32:21 MFA and single sign-on form baseline security.</span></p><p><span style="background-color: transparent;">37:19 Architectural safeguards protect legacy medical devices with minimal risk tolerance.</span></p><p><span style="background-color: transparent;">43:16 Mind maps help clearly visualize all CISO responsibilities.</span></p><p><span style="background-color: transparent;">47:16 Building organizational resilience matters more than prevention.</span></p><p><span style="background-color: transparent;">53:10 AI cannot replace human intuition.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/richsentme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Richard Henderson</a></p><p>https://www.linkedin.com/in/richsentme</p><p><br></p><p><a href="https://www.linkedin.com/company/alberta-health-services" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a> | LinkedIn</p><p>https://www.linkedin.com/company/alberta-health-services</p><p><br></p><p><a href="https://www.albertahealthservices.ca" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a> | Website</p><p>https://www.albertahealthservices.ca</p><p><br></p><p><a href="https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">The Cuckoo’s Egg by Cliff Stoll</a></p><p>https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787</p><p><br></p><p><a href="https://www.youtube.com/@primitivetechnology9550" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Primitive Technology YouTube channel</a></p><p>https://www.youtube.com/@primitivetechnology9550</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/df735234-740b-490c-b82b-a7c6ad45e44c/29a123698d.jpg" />
  <pubDate>Wed, 17 Dec 2025 08:46:35 -0500</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="53976583" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/df735234-740b-490c-b82b-a7c6ad45e44c/episode.mp3" />
  <itunes:title><![CDATA[Securing  Millions of  Lives Through Identity-First Strategy with Richard Henderson of Alberta Health Services]]></itunes:title>
  <itunes:duration>56:13</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">In this episode, we talk to </span><a href="https://www.linkedin.com/in/richsentme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Richard Henderson</a><span style="background-color: transparent;">, Executive Director and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/alberta-health-services" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a><span style="background-color: transparent;">, about leading cybersecurity across one of the largest hospital networks in North America. Richard explains how clinical operations, digital safety and human-centered leadership converge in high-stakes environments where downtime can directly impact patient care.</span></p><p><br></p><p><span style="background-color: transparent;">He also shares how his background across public and private sectors informs his approach to team development, why he prioritizes continuous learning and rest, and how his perspective as a parent shapes his views on safe technology exposure and foundational digital skills.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">07:13 Limiting screen time improves children's reading abilities.</span></p><p><span style="background-color: transparent;">13:19 Mandatory learning plans prevent burnout and enable growth.</span></p><p><span style="background-color: transparent;">22:30 Setting boundaries and reducing false urgency helps prevent burnout in security teams.</span></p><p><span style="background-color: transparent;">27:53 Saying yes enables business success and collaboration.</span></p><p><span style="background-color: transparent;">32:21 MFA and single sign-on form baseline security.</span></p><p><span style="background-color: transparent;">37:19 Architectural safeguards protect legacy medical devices with minimal risk tolerance.</span></p><p><span style="background-color: transparent;">43:16 Mind maps help clearly visualize all CISO responsibilities.</span></p><p><span style="background-color: transparent;">47:16 Building organizational resilience matters more than prevention.</span></p><p><span style="background-color: transparent;">53:10 AI cannot replace human intuition.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/richsentme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Richard Henderson</a></p><p>https://www.linkedin.com/in/richsentme</p><p><br></p><p><a href="https://www.linkedin.com/company/alberta-health-services" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a> | LinkedIn</p><p>https://www.linkedin.com/company/alberta-health-services</p><p><br></p><p><a href="https://www.albertahealthservices.ca" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a> | Website</p><p>https://www.albertahealthservices.ca</p><p><br></p><p><a href="https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">The Cuckoo’s Egg by Cliff Stoll</a></p><p>https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787</p><p><br></p><p><a href="https://www.youtube.com/@primitivetechnology9550" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Primitive Technology YouTube channel</a></p><p>https://www.youtube.com/@primitivetechnology9550</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">In this episode, we talk to </span><a href="https://www.linkedin.com/in/richsentme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Richard Henderson</a><span style="background-color: transparent;">, Executive Director and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/alberta-health-services" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a><span style="background-color: transparent;">, about leading cybersecurity across one of the largest hospital networks in North America. Richard explains how clinical operations, digital safety and human-centered leadership converge in high-stakes environments where downtime can directly impact patient care.</span></p><p><br></p><p><span style="background-color: transparent;">He also shares how his background across public and private sectors informs his approach to team development, why he prioritizes continuous learning and rest, and how his perspective as a parent shapes his views on safe technology exposure and foundational digital skills.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">07:13 Limiting screen time improves children's reading abilities.</span></p><p><span style="background-color: transparent;">13:19 Mandatory learning plans prevent burnout and enable growth.</span></p><p><span style="background-color: transparent;">22:30 Setting boundaries and reducing false urgency helps prevent burnout in security teams.</span></p><p><span style="background-color: transparent;">27:53 Saying yes enables business success and collaboration.</span></p><p><span style="background-color: transparent;">32:21 MFA and single sign-on form baseline security.</span></p><p><span style="background-color: transparent;">37:19 Architectural safeguards protect legacy medical devices with minimal risk tolerance.</span></p><p><span style="background-color: transparent;">43:16 Mind maps help clearly visualize all CISO responsibilities.</span></p><p><span style="background-color: transparent;">47:16 Building organizational resilience matters more than prevention.</span></p><p><span style="background-color: transparent;">53:10 AI cannot replace human intuition.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/richsentme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Richard Henderson</a></p><p>https://www.linkedin.com/in/richsentme</p><p><br></p><p><a href="https://www.linkedin.com/company/alberta-health-services" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a> | LinkedIn</p><p>https://www.linkedin.com/company/alberta-health-services</p><p><br></p><p><a href="https://www.albertahealthservices.ca" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Alberta Health Services</a> | Website</p><p>https://www.albertahealthservices.ca</p><p><br></p><p><a href="https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">The Cuckoo’s Egg by Cliff Stoll</a></p><p>https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787</p><p><br></p><p><a href="https://www.youtube.com/@primitivetechnology9550" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Primitive Technology YouTube channel</a></p><p>https://www.youtube.com/@primitivetechnology9550</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[In this episode, we talk to Richard Henderson, Executive Director and Chief Information Security Officer of Alberta Health Services, about leading cybersecurity across one of the largest hospital networks in North America. Richard explains how clin...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">16bae450-ed73-4f31-add0-b46e34d02c17</guid>
  <title><![CDATA[The Myth of the Unhackable System with Elliott Franklin of Fortitude Re]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">In this episode, hosts Aaron Lentz and Tim York sit down with </span><a href="https://www.linkedin.com/in/elliottfranklin" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Elliott Franklin</a><span style="background-color: transparent;">, Senior Vice President and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/fortitude-re" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Fortitude Re</a><span style="background-color: transparent;">. Elliott is known as the Cybersecurity Whisperer. He shares his fascinating journey from hacking his high school's grade system to leading cybersecurity programs across diverse industries, from quick-service restaurants to healthcare and financial services.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">01:10 Building a comprehensive information security program from the ground up.</span></p><p><span style="background-color: transparent;">07:27 Early career security lessons from testing systems as a high school senior.</span></p><p><span style="background-color: transparent;">12:25 Deploying deepfake detection technology in video conferencing platforms.</span></p><p><span style="background-color: transparent;">16:40 Digital identity wallets could revolutionize personal data control and privacy.</span></p><p><span style="background-color: transparent;">21:45 Creative network segmentation solves challenges with outdated infrastructure.</span></p><p><span style="background-color: transparent;">27:16 Risk assessment and framework adoption must precede technology purchases.</span></p><p><span style="background-color: transparent;">31:47 Talent shortage in identity and access management remains a critical challenge.</span></p><p><span style="background-color: transparent;">36:24 Non-human identities, including APIs and tokens, create security vulnerabilities.</span></p><p><span style="background-color: transparent;">41:11 Identity tool migration costs often exceed initial licensing fees significantly.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/elliottfranklin" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Elliott Franklin</a></p><p>https://www.linkedin.com/in/elliottfranklin</p><p><br></p><p><a href="https://www.linkedin.com/company/fortitude-re" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Fortitude Re</a> | LinkedIn</p><p>https://www.linkedin.com/company/fortitude-re</p><p><br></p><p><a href="http://www.fortitude-re.com" target="_blank" style="color: rgb(17, 85, 204);">Fortitude Re</a> | Website</p><p>http://www.fortitude-re.com</p><p><br></p><p><a href="https://www.youtube.com/@CybersecurityWhisperer" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Whisperer YouTube channel</a></p><p>https://www.youtube.com/@CybersecurityWhisperer</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #IdentityAccessManagement</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/c84b965c-830b-4c3a-b84e-fe5bfa3f3157/180578b27d.jpg" />
  <pubDate>Tue, 02 Dec 2025 12:28:27 -0500</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="42915712" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/c84b965c-830b-4c3a-b84e-fe5bfa3f3157/episode.mp3" />
  <itunes:title><![CDATA[The Myth of the Unhackable System with Elliott Franklin of Fortitude Re]]></itunes:title>
  <itunes:duration>44:42</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">In this episode, hosts Aaron Lentz and Tim York sit down with </span><a href="https://www.linkedin.com/in/elliottfranklin" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Elliott Franklin</a><span style="background-color: transparent;">, Senior Vice President and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/fortitude-re" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Fortitude Re</a><span style="background-color: transparent;">. Elliott is known as the Cybersecurity Whisperer. He shares his fascinating journey from hacking his high school's grade system to leading cybersecurity programs across diverse industries, from quick-service restaurants to healthcare and financial services.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">01:10 Building a comprehensive information security program from the ground up.</span></p><p><span style="background-color: transparent;">07:27 Early career security lessons from testing systems as a high school senior.</span></p><p><span style="background-color: transparent;">12:25 Deploying deepfake detection technology in video conferencing platforms.</span></p><p><span style="background-color: transparent;">16:40 Digital identity wallets could revolutionize personal data control and privacy.</span></p><p><span style="background-color: transparent;">21:45 Creative network segmentation solves challenges with outdated infrastructure.</span></p><p><span style="background-color: transparent;">27:16 Risk assessment and framework adoption must precede technology purchases.</span></p><p><span style="background-color: transparent;">31:47 Talent shortage in identity and access management remains a critical challenge.</span></p><p><span style="background-color: transparent;">36:24 Non-human identities, including APIs and tokens, create security vulnerabilities.</span></p><p><span style="background-color: transparent;">41:11 Identity tool migration costs often exceed initial licensing fees significantly.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/elliottfranklin" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Elliott Franklin</a></p><p>https://www.linkedin.com/in/elliottfranklin</p><p><br></p><p><a href="https://www.linkedin.com/company/fortitude-re" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Fortitude Re</a> | LinkedIn</p><p>https://www.linkedin.com/company/fortitude-re</p><p><br></p><p><a href="http://www.fortitude-re.com" target="_blank" style="color: rgb(17, 85, 204);">Fortitude Re</a> | Website</p><p>http://www.fortitude-re.com</p><p><br></p><p><a href="https://www.youtube.com/@CybersecurityWhisperer" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Whisperer YouTube channel</a></p><p>https://www.youtube.com/@CybersecurityWhisperer</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #IdentityAccessManagement</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">In this episode, hosts Aaron Lentz and Tim York sit down with </span><a href="https://www.linkedin.com/in/elliottfranklin" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Elliott Franklin</a><span style="background-color: transparent;">, Senior Vice President and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/fortitude-re" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Fortitude Re</a><span style="background-color: transparent;">. Elliott is known as the Cybersecurity Whisperer. He shares his fascinating journey from hacking his high school's grade system to leading cybersecurity programs across diverse industries, from quick-service restaurants to healthcare and financial services.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">01:10 Building a comprehensive information security program from the ground up.</span></p><p><span style="background-color: transparent;">07:27 Early career security lessons from testing systems as a high school senior.</span></p><p><span style="background-color: transparent;">12:25 Deploying deepfake detection technology in video conferencing platforms.</span></p><p><span style="background-color: transparent;">16:40 Digital identity wallets could revolutionize personal data control and privacy.</span></p><p><span style="background-color: transparent;">21:45 Creative network segmentation solves challenges with outdated infrastructure.</span></p><p><span style="background-color: transparent;">27:16 Risk assessment and framework adoption must precede technology purchases.</span></p><p><span style="background-color: transparent;">31:47 Talent shortage in identity and access management remains a critical challenge.</span></p><p><span style="background-color: transparent;">36:24 Non-human identities, including APIs and tokens, create security vulnerabilities.</span></p><p><span style="background-color: transparent;">41:11 Identity tool migration costs often exceed initial licensing fees significantly.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/elliottfranklin" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Elliott Franklin</a></p><p>https://www.linkedin.com/in/elliottfranklin</p><p><br></p><p><a href="https://www.linkedin.com/company/fortitude-re" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Fortitude Re</a> | LinkedIn</p><p>https://www.linkedin.com/company/fortitude-re</p><p><br></p><p><a href="http://www.fortitude-re.com" target="_blank" style="color: rgb(17, 85, 204);">Fortitude Re</a> | Website</p><p>http://www.fortitude-re.com</p><p><br></p><p><a href="https://www.youtube.com/@CybersecurityWhisperer" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Whisperer YouTube channel</a></p><p>https://www.youtube.com/@CybersecurityWhisperer</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #IdentityAccessManagement</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[In this episode, hosts Aaron Lentz and Tim York sit down with Elliott Franklin, Senior Vice President and Chief Information Security Officer of Fortitude Re. Elliott is known as the Cybersecurity Whisperer. He shares his fascinating journey from ha...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">153713a6-76c0-471b-a291-5b3145aab893</guid>
  <title><![CDATA[Human Skills That Define Tomorrow’s CISO with Matthew Rosenquist of Cybersecurity Insights]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Cybersecurity’s human dimension takes center stage as we welcome </span><a href="https://www.linkedin.com/in/matthewrosenquist" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Matthew Rosenquist</a><span style="background-color: transparent;">, CISO, Cybersecurity Strategist and Advisor at </span><a href="https://www.linkedin.com/company/cybersecurityinsights" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a><span style="background-color: transparent;">. Hosts Aaron Lentz and Tim York guide the discussion, which explores the evolving role of CISOs, the realities of consolidation and AI’s increasing impact, ranging from bridging talent gaps to changing threat profiles.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">01:43 The market’s consolidation cycle disrupts legacy expectations.</span></p><p><span style="background-color: transparent;">06:28 CISOs must be influential at both board and business levels.</span></p><p><span style="background-color: transparent;">10:55 Technical and business leadership gaps are systemic.</span></p><p><span style="background-color: transparent;">14:54 Security features convert freemium users to revenue.</span></p><p><span style="background-color: transparent;">18:21 Basic protections boost small businesses’ security posture.</span></p><p><span style="background-color: transparent;">22:52 Revenue drivers define an effective security strategy.</span></p><p><span style="background-color: transparent;">27:01 Unrealistic entry-level job requirements stall progress.</span></p><p><span style="background-color: transparent;">30:59 Upskilling launches junior talent into future leadership.</span></p><p><span style="background-color: transparent;">35:19 AI elevates both security analysts and adversaries.</span></p><p><span style="background-color: transparent;">43:34 Behavioral awareness defends better than firewalls alone.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/matthewrosenquist" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Matthew Rosenquist</a></p><p>https://www.linkedin.com/in/matthewrosenquist</p><p><br></p><p><a href="https://www.linkedin.com/company/cybersecurityinsights" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a> | LinkedIn</p><p>https://www.linkedin.com/company/cybersecurityinsights</p><p><br></p><p><a href="https://www.cybersecurityinsights.us/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a> | Website</p><p>https://www.cybersecurityinsights.us/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/c5f52177-7b54-455e-85c9-27f1974c5218/bb0ed5812f.jpg" />
  <pubDate>Wed, 29 Oct 2025 00:00:00 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="45762850" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/c5f52177-7b54-455e-85c9-27f1974c5218/episode.mp3" />
  <itunes:title><![CDATA[Human Skills That Define Tomorrow’s CISO with Matthew Rosenquist of Cybersecurity Insights]]></itunes:title>
  <itunes:duration>47:40</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Cybersecurity’s human dimension takes center stage as we welcome </span><a href="https://www.linkedin.com/in/matthewrosenquist" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Matthew Rosenquist</a><span style="background-color: transparent;">, CISO, Cybersecurity Strategist and Advisor at </span><a href="https://www.linkedin.com/company/cybersecurityinsights" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a><span style="background-color: transparent;">. Hosts Aaron Lentz and Tim York guide the discussion, which explores the evolving role of CISOs, the realities of consolidation and AI’s increasing impact, ranging from bridging talent gaps to changing threat profiles.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">01:43 The market’s consolidation cycle disrupts legacy expectations.</span></p><p><span style="background-color: transparent;">06:28 CISOs must be influential at both board and business levels.</span></p><p><span style="background-color: transparent;">10:55 Technical and business leadership gaps are systemic.</span></p><p><span style="background-color: transparent;">14:54 Security features convert freemium users to revenue.</span></p><p><span style="background-color: transparent;">18:21 Basic protections boost small businesses’ security posture.</span></p><p><span style="background-color: transparent;">22:52 Revenue drivers define an effective security strategy.</span></p><p><span style="background-color: transparent;">27:01 Unrealistic entry-level job requirements stall progress.</span></p><p><span style="background-color: transparent;">30:59 Upskilling launches junior talent into future leadership.</span></p><p><span style="background-color: transparent;">35:19 AI elevates both security analysts and adversaries.</span></p><p><span style="background-color: transparent;">43:34 Behavioral awareness defends better than firewalls alone.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/matthewrosenquist" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Matthew Rosenquist</a></p><p>https://www.linkedin.com/in/matthewrosenquist</p><p><br></p><p><a href="https://www.linkedin.com/company/cybersecurityinsights" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a> | LinkedIn</p><p>https://www.linkedin.com/company/cybersecurityinsights</p><p><br></p><p><a href="https://www.cybersecurityinsights.us/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a> | Website</p><p>https://www.cybersecurityinsights.us/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Cybersecurity’s human dimension takes center stage as we welcome </span><a href="https://www.linkedin.com/in/matthewrosenquist" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Matthew Rosenquist</a><span style="background-color: transparent;">, CISO, Cybersecurity Strategist and Advisor at </span><a href="https://www.linkedin.com/company/cybersecurityinsights" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a><span style="background-color: transparent;">. Hosts Aaron Lentz and Tim York guide the discussion, which explores the evolving role of CISOs, the realities of consolidation and AI’s increasing impact, ranging from bridging talent gaps to changing threat profiles.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">01:43 The market’s consolidation cycle disrupts legacy expectations.</span></p><p><span style="background-color: transparent;">06:28 CISOs must be influential at both board and business levels.</span></p><p><span style="background-color: transparent;">10:55 Technical and business leadership gaps are systemic.</span></p><p><span style="background-color: transparent;">14:54 Security features convert freemium users to revenue.</span></p><p><span style="background-color: transparent;">18:21 Basic protections boost small businesses’ security posture.</span></p><p><span style="background-color: transparent;">22:52 Revenue drivers define an effective security strategy.</span></p><p><span style="background-color: transparent;">27:01 Unrealistic entry-level job requirements stall progress.</span></p><p><span style="background-color: transparent;">30:59 Upskilling launches junior talent into future leadership.</span></p><p><span style="background-color: transparent;">35:19 AI elevates both security analysts and adversaries.</span></p><p><span style="background-color: transparent;">43:34 Behavioral awareness defends better than firewalls alone.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/matthewrosenquist" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Matthew Rosenquist</a></p><p>https://www.linkedin.com/in/matthewrosenquist</p><p><br></p><p><a href="https://www.linkedin.com/company/cybersecurityinsights" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a> | LinkedIn</p><p>https://www.linkedin.com/company/cybersecurityinsights</p><p><br></p><p><a href="https://www.cybersecurityinsights.us/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Cybersecurity Insights</a> | Website</p><p>https://www.cybersecurityinsights.us/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Cybersecurity’s human dimension takes center stage as we welcome Matthew Rosenquist, CISO, Cybersecurity Strategist and Advisor at Cybersecurity Insights. Hosts Aaron Lentz and Tim York guide the discussion, which explores the evolving role of CISO...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">4b502e5e-c626-4f92-ab92-d6a7f4b52485</guid>
  <title><![CDATA[Student Experience Meets Cybersecurity Strategy with Zach Lewis of University of Health Sciences and Pharmacy in St. Louis]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> sit down with </span><a href="https://www.linkedin.com/in/zacharylewis1" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Zach Lewis</a><span style="background-color: transparent;">, Chief Information Officer and Chief Information Security Officer of the </span><a href="https://www.linkedin.com/school/uhsp" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a><span style="background-color: transparent;">. Zach discusses leading his university through a ransomware attack, how he balances security with student experience in a nonprofit environment, and why open conversations about breaches are vital for the industry.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">02:06 Zach's book chronicles the university's LockBit ransomware experience.</span></p><p><span style="background-color: transparent;">06:54 Password managers fail when Active Directory authentication becomes unavailable.</span></p><p><span style="background-color: transparent;">09:00 Companies now want cybersecurity leaders who understand breach environments.</span></p><p><span style="background-color: transparent;">14:27 Campus card systems integrate everything from dining to Grubhub.</span></p><p><span style="background-color: transparent;">20:24 AI coding tools represent emerging technological capabilities worth exploring.</span></p><p><span style="background-color: transparent;">23:54 Universities should teach students proper AI tool integration techniques.</span></p><p><span style="background-color: transparent;">28:45 Technical revolutions require flexible pivoting from established security plans.</span></p><p><span style="background-color: transparent;">37:36 Small organizations benefit from outsourcing 24/7 SOC monitoring.</span></p><p><span style="background-color: transparent;">42:48 Legacy applications must evolve, or organizations get left behind.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/zacharylewis1" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Zach Lewis</a></p><p>https://www.linkedin.com/in/zacharylewis1</p><p><br></p><p><a href="https://www.linkedin.com/school/uhsp" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a> | LinkedIn</p><p>https://www.linkedin.com/school/uhsp</p><p><br></p><p><a href="https://www.uhsp.edu" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a> | Website</p><p>https://www.uhsp.edu</p><p><br></p><p><a href="https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">“Locked Up” by Zachary Lewis</a></p><p>https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/6691f9ac-6e11-4ae5-8ae6-ce5e1d87133a/539783bf79.jpg" />
  <pubDate>Wed, 24 Sep 2025 00:00:00 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="45164750" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/6691f9ac-6e11-4ae5-8ae6-ce5e1d87133a/episode.mp3" />
  <itunes:title><![CDATA[Student Experience Meets Cybersecurity Strategy with Zach Lewis of University of Health Sciences and Pharmacy in St. Louis]]></itunes:title>
  <itunes:duration>47:02</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> sit down with </span><a href="https://www.linkedin.com/in/zacharylewis1" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Zach Lewis</a><span style="background-color: transparent;">, Chief Information Officer and Chief Information Security Officer of the </span><a href="https://www.linkedin.com/school/uhsp" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a><span style="background-color: transparent;">. Zach discusses leading his university through a ransomware attack, how he balances security with student experience in a nonprofit environment, and why open conversations about breaches are vital for the industry.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">02:06 Zach's book chronicles the university's LockBit ransomware experience.</span></p><p><span style="background-color: transparent;">06:54 Password managers fail when Active Directory authentication becomes unavailable.</span></p><p><span style="background-color: transparent;">09:00 Companies now want cybersecurity leaders who understand breach environments.</span></p><p><span style="background-color: transparent;">14:27 Campus card systems integrate everything from dining to Grubhub.</span></p><p><span style="background-color: transparent;">20:24 AI coding tools represent emerging technological capabilities worth exploring.</span></p><p><span style="background-color: transparent;">23:54 Universities should teach students proper AI tool integration techniques.</span></p><p><span style="background-color: transparent;">28:45 Technical revolutions require flexible pivoting from established security plans.</span></p><p><span style="background-color: transparent;">37:36 Small organizations benefit from outsourcing 24/7 SOC monitoring.</span></p><p><span style="background-color: transparent;">42:48 Legacy applications must evolve, or organizations get left behind.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/zacharylewis1" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Zach Lewis</a></p><p>https://www.linkedin.com/in/zacharylewis1</p><p><br></p><p><a href="https://www.linkedin.com/school/uhsp" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a> | LinkedIn</p><p>https://www.linkedin.com/school/uhsp</p><p><br></p><p><a href="https://www.uhsp.edu" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a> | Website</p><p>https://www.uhsp.edu</p><p><br></p><p><a href="https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">“Locked Up” by Zachary Lewis</a></p><p>https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> sit down with </span><a href="https://www.linkedin.com/in/zacharylewis1" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Zach Lewis</a><span style="background-color: transparent;">, Chief Information Officer and Chief Information Security Officer of the </span><a href="https://www.linkedin.com/school/uhsp" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a><span style="background-color: transparent;">. Zach discusses leading his university through a ransomware attack, how he balances security with student experience in a nonprofit environment, and why open conversations about breaches are vital for the industry.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">02:06 Zach's book chronicles the university's LockBit ransomware experience.</span></p><p><span style="background-color: transparent;">06:54 Password managers fail when Active Directory authentication becomes unavailable.</span></p><p><span style="background-color: transparent;">09:00 Companies now want cybersecurity leaders who understand breach environments.</span></p><p><span style="background-color: transparent;">14:27 Campus card systems integrate everything from dining to Grubhub.</span></p><p><span style="background-color: transparent;">20:24 AI coding tools represent emerging technological capabilities worth exploring.</span></p><p><span style="background-color: transparent;">23:54 Universities should teach students proper AI tool integration techniques.</span></p><p><span style="background-color: transparent;">28:45 Technical revolutions require flexible pivoting from established security plans.</span></p><p><span style="background-color: transparent;">37:36 Small organizations benefit from outsourcing 24/7 SOC monitoring.</span></p><p><span style="background-color: transparent;">42:48 Legacy applications must evolve, or organizations get left behind.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/zacharylewis1" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Zach Lewis</a></p><p>https://www.linkedin.com/in/zacharylewis1</p><p><br></p><p><a href="https://www.linkedin.com/school/uhsp" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a> | LinkedIn</p><p>https://www.linkedin.com/school/uhsp</p><p><br></p><p><a href="https://www.uhsp.edu" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">University of Health Sciences and Pharmacy in St. Louis</a> | Website</p><p>https://www.uhsp.edu</p><p><br></p><p><a href="https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">“Locked Up” by Zachary Lewis</a></p><p>https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[On this episode, hosts Aaron Lentz and Tim York sit down with Zach Lewis, Chief Information Officer and Chief Information Security Officer of the University of Health Sciences and Pharmacy in St. Louis. Zach discusses leading his university through...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">87dff748-7b6c-4de1-8359-ad002e06ef7f</guid>
  <title><![CDATA[Challenging AI Threats and Strengthening Human Vigilance with Steve Cobb of SecurityScorecard]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> talk to</span><a href="https://www.linkedin.com/in/wscobb/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> Steve Cobb</a><span style="background-color: transparent;">, CISO of </span><a href="https://www.linkedin.com/company/security-scorecard/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a><span style="background-color: transparent;"> and a founding member of the </span><a href="https://www.linkedin.com/company/carolinaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a><span style="background-color: transparent;">. Steve shares how today’s threat actors are targeting human behavior more than systems, and why cultural change and technical guardrails are both essential. He also discusses mentoring the next generation of cyber talent, the importance of foundational skills and his leadership approach rooted in curiosity, communication and service.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">06:48 Deepfakes are now impersonating public officials to influence real-world decisions.</span></p><p><span style="background-color: transparent;">09:39 “Trust but verify” is essential in a world where video calls can be faked.</span></p><p><span style="background-color: transparent;">12:54 Organizations are rushing into AI at the cost of security and thoughtfulness.</span></p><p><span style="background-color: transparent;">16:27 Cultural assumptions about trust make US users especially vulnerable to deception.</span></p><p><span style="background-color: transparent;">20:51 We’re wired to seek connection; shifting to suspicion at work is counterintuitive but necessary.</span></p><p><span style="background-color: transparent;">23:36 Threat actors are focused on hacking people, not just tech.</span></p><p><span style="background-color: transparent;">26:15 Competitive cyber events train youth in real-world collaboration and red/blue team skills.</span></p><p><span style="background-color: transparent;">35:03 Strong cyber teams are grounded in foundational skills: networking, cloud and OS.</span></p><p><span style="background-color: transparent;">39:51 Communication, both up and down the chain, is a critical skill for cyber leaders.</span></p><p><span style="background-color: transparent;">40:30 Servant leadership — building trust and supporting the team — creates stronger, more resilient organizations.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/wscobb/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Steve Cobb</a></p><p>https://www.linkedin.com/in/wscobb/</p><p><br></p><p><a href="https://www.linkedin.com/company/security-scorecard/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a> | LinkedIn</p><p>https://www.linkedin.com/company/security-scorecard/</p><p><br></p><p><a href="https://securityscorecard.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a> | Website</p><p>https://securityscorecard.com/</p><p><br></p><p><a href="https://www.linkedin.com/company/carolinaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a> | LinkedIn</p><p>https://www.linkedin.com/company/carolinaciso/</p><p><br></p><p><a href="https://www.carolinaciso.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a> | Website</p><p>https://www.carolinaciso.org/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/e1b00092-9dd6-418f-91ba-7f8bc0a16b17/d35a8d3f6a.jpg" />
  <pubDate>Wed, 27 Aug 2025 00:00:00 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="42484378" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/e1b00092-9dd6-418f-91ba-7f8bc0a16b17/episode.mp3" />
  <itunes:title><![CDATA[Challenging AI Threats and Strengthening Human Vigilance with Steve Cobb of SecurityScorecard]]></itunes:title>
  <itunes:duration>44:15</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> talk to</span><a href="https://www.linkedin.com/in/wscobb/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> Steve Cobb</a><span style="background-color: transparent;">, CISO of </span><a href="https://www.linkedin.com/company/security-scorecard/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a><span style="background-color: transparent;"> and a founding member of the </span><a href="https://www.linkedin.com/company/carolinaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a><span style="background-color: transparent;">. Steve shares how today’s threat actors are targeting human behavior more than systems, and why cultural change and technical guardrails are both essential. He also discusses mentoring the next generation of cyber talent, the importance of foundational skills and his leadership approach rooted in curiosity, communication and service.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">06:48 Deepfakes are now impersonating public officials to influence real-world decisions.</span></p><p><span style="background-color: transparent;">09:39 “Trust but verify” is essential in a world where video calls can be faked.</span></p><p><span style="background-color: transparent;">12:54 Organizations are rushing into AI at the cost of security and thoughtfulness.</span></p><p><span style="background-color: transparent;">16:27 Cultural assumptions about trust make US users especially vulnerable to deception.</span></p><p><span style="background-color: transparent;">20:51 We’re wired to seek connection; shifting to suspicion at work is counterintuitive but necessary.</span></p><p><span style="background-color: transparent;">23:36 Threat actors are focused on hacking people, not just tech.</span></p><p><span style="background-color: transparent;">26:15 Competitive cyber events train youth in real-world collaboration and red/blue team skills.</span></p><p><span style="background-color: transparent;">35:03 Strong cyber teams are grounded in foundational skills: networking, cloud and OS.</span></p><p><span style="background-color: transparent;">39:51 Communication, both up and down the chain, is a critical skill for cyber leaders.</span></p><p><span style="background-color: transparent;">40:30 Servant leadership — building trust and supporting the team — creates stronger, more resilient organizations.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/wscobb/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Steve Cobb</a></p><p>https://www.linkedin.com/in/wscobb/</p><p><br></p><p><a href="https://www.linkedin.com/company/security-scorecard/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a> | LinkedIn</p><p>https://www.linkedin.com/company/security-scorecard/</p><p><br></p><p><a href="https://securityscorecard.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a> | Website</p><p>https://securityscorecard.com/</p><p><br></p><p><a href="https://www.linkedin.com/company/carolinaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a> | LinkedIn</p><p>https://www.linkedin.com/company/carolinaciso/</p><p><br></p><p><a href="https://www.carolinaciso.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a> | Website</p><p>https://www.carolinaciso.org/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> talk to</span><a href="https://www.linkedin.com/in/wscobb/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> Steve Cobb</a><span style="background-color: transparent;">, CISO of </span><a href="https://www.linkedin.com/company/security-scorecard/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a><span style="background-color: transparent;"> and a founding member of the </span><a href="https://www.linkedin.com/company/carolinaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a><span style="background-color: transparent;">. Steve shares how today’s threat actors are targeting human behavior more than systems, and why cultural change and technical guardrails are both essential. He also discusses mentoring the next generation of cyber talent, the importance of foundational skills and his leadership approach rooted in curiosity, communication and service.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">00:00 Introduction.</span></p><p><span style="background-color: transparent;">06:48 Deepfakes are now impersonating public officials to influence real-world decisions.</span></p><p><span style="background-color: transparent;">09:39 “Trust but verify” is essential in a world where video calls can be faked.</span></p><p><span style="background-color: transparent;">12:54 Organizations are rushing into AI at the cost of security and thoughtfulness.</span></p><p><span style="background-color: transparent;">16:27 Cultural assumptions about trust make US users especially vulnerable to deception.</span></p><p><span style="background-color: transparent;">20:51 We’re wired to seek connection; shifting to suspicion at work is counterintuitive but necessary.</span></p><p><span style="background-color: transparent;">23:36 Threat actors are focused on hacking people, not just tech.</span></p><p><span style="background-color: transparent;">26:15 Competitive cyber events train youth in real-world collaboration and red/blue team skills.</span></p><p><span style="background-color: transparent;">35:03 Strong cyber teams are grounded in foundational skills: networking, cloud and OS.</span></p><p><span style="background-color: transparent;">39:51 Communication, both up and down the chain, is a critical skill for cyber leaders.</span></p><p><span style="background-color: transparent;">40:30 Servant leadership — building trust and supporting the team — creates stronger, more resilient organizations.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/wscobb/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Steve Cobb</a></p><p>https://www.linkedin.com/in/wscobb/</p><p><br></p><p><a href="https://www.linkedin.com/company/security-scorecard/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a> | LinkedIn</p><p>https://www.linkedin.com/company/security-scorecard/</p><p><br></p><p><a href="https://securityscorecard.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SecurityScorecard</a> | Website</p><p>https://securityscorecard.com/</p><p><br></p><p><a href="https://www.linkedin.com/company/carolinaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a> | LinkedIn</p><p>https://www.linkedin.com/company/carolinaciso/</p><p><br></p><p><a href="https://www.carolinaciso.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CarolinaCISO</a> | Website</p><p>https://www.carolinaciso.org/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[On this episode, Tim York and Aaron Lentz talk to Steve Cobb, CISO of SecurityScorecard and a founding member of the CarolinaCISO. Steve shares how today’s threat actors are targeting human behavior more than systems, and why cultural change and te...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">edf19067-71ce-4c9f-8673-929f2c97bcdc</guid>
  <title><![CDATA[Creating Psychological Safety in Security Teams with Susanne Senoff of PROS]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts Tim York and Jackie Henrich talk to </span><a href="https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Susanne Senoff</a><span style="background-color: transparent;">, CISO of </span><a href="https://www.linkedin.com/company/pros/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a><span style="background-color: transparent;">, about making security human, building trust through connection and leading with authenticity. Susanne shares lessons from her unconventional career path, her views on psychological safety and how she builds resilient, empowered teams in high-stakes environments.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(03:56) Making security fun starts with creating psychological safety and room for humor — even in high-pressure environments.</span></p><p><span style="background-color: transparent;">(11:29) Serving internal and external customers while driving meaningful security impact.</span></p><p><span style="background-color: transparent;">(13:44) Missed connections in security often stem from a lack of listening and failure to understand business constraints.</span></p><p><span style="background-color: transparent;">(15:58) Moving from individual contributor to leader means learning how to create impact through others.</span></p><p><span style="background-color: transparent;">(20:39) When expectations are clear and support is real, people rise to the challenge.</span></p><p><span style="background-color: transparent;">(24:41) Realizing the value of asking for help and knowing what energizes you.</span></p><p><span style="background-color: transparent;">(34:22) Mentorship often comes through informal moments, not structured relationships.</span></p><p><span style="background-color: transparent;">(40:14) Not all mentors give good advice. Leadership means filtering input and trusting your gut.</span></p><p><span style="background-color: transparent;">(45:00) Engaging with “grumpy gooses” is a fast path to trust and alignment because of their honesty.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Susanne Senoff</a></p><p>https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/</p><p><br></p><p><a href="https://www.linkedin.com/company/pros/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a> | LinkedIn</p><p>https://www.linkedin.com/company/pros/</p><p><br></p><p><a href="https://pros.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a> | Website</p><p>https://pros.com/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/d9c91f23-d74e-4800-a883-ca1bf768012c/33afd18d8e.jpg" />
  <pubDate>Wed, 30 Jul 2025 00:00:00 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="56245266" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/d9c91f23-d74e-4800-a883-ca1bf768012c/episode.mp3" />
  <itunes:title><![CDATA[Creating Psychological Safety in Security Teams with Susanne Senoff of PROS]]></itunes:title>
  <itunes:duration>58:35</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts Tim York and Jackie Henrich talk to </span><a href="https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Susanne Senoff</a><span style="background-color: transparent;">, CISO of </span><a href="https://www.linkedin.com/company/pros/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a><span style="background-color: transparent;">, about making security human, building trust through connection and leading with authenticity. Susanne shares lessons from her unconventional career path, her views on psychological safety and how she builds resilient, empowered teams in high-stakes environments.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(03:56) Making security fun starts with creating psychological safety and room for humor — even in high-pressure environments.</span></p><p><span style="background-color: transparent;">(11:29) Serving internal and external customers while driving meaningful security impact.</span></p><p><span style="background-color: transparent;">(13:44) Missed connections in security often stem from a lack of listening and failure to understand business constraints.</span></p><p><span style="background-color: transparent;">(15:58) Moving from individual contributor to leader means learning how to create impact through others.</span></p><p><span style="background-color: transparent;">(20:39) When expectations are clear and support is real, people rise to the challenge.</span></p><p><span style="background-color: transparent;">(24:41) Realizing the value of asking for help and knowing what energizes you.</span></p><p><span style="background-color: transparent;">(34:22) Mentorship often comes through informal moments, not structured relationships.</span></p><p><span style="background-color: transparent;">(40:14) Not all mentors give good advice. Leadership means filtering input and trusting your gut.</span></p><p><span style="background-color: transparent;">(45:00) Engaging with “grumpy gooses” is a fast path to trust and alignment because of their honesty.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Susanne Senoff</a></p><p>https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/</p><p><br></p><p><a href="https://www.linkedin.com/company/pros/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a> | LinkedIn</p><p>https://www.linkedin.com/company/pros/</p><p><br></p><p><a href="https://pros.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a> | Website</p><p>https://pros.com/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts Tim York and Jackie Henrich talk to </span><a href="https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Susanne Senoff</a><span style="background-color: transparent;">, CISO of </span><a href="https://www.linkedin.com/company/pros/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a><span style="background-color: transparent;">, about making security human, building trust through connection and leading with authenticity. Susanne shares lessons from her unconventional career path, her views on psychological safety and how she builds resilient, empowered teams in high-stakes environments.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(03:56) Making security fun starts with creating psychological safety and room for humor — even in high-pressure environments.</span></p><p><span style="background-color: transparent;">(11:29) Serving internal and external customers while driving meaningful security impact.</span></p><p><span style="background-color: transparent;">(13:44) Missed connections in security often stem from a lack of listening and failure to understand business constraints.</span></p><p><span style="background-color: transparent;">(15:58) Moving from individual contributor to leader means learning how to create impact through others.</span></p><p><span style="background-color: transparent;">(20:39) When expectations are clear and support is real, people rise to the challenge.</span></p><p><span style="background-color: transparent;">(24:41) Realizing the value of asking for help and knowing what energizes you.</span></p><p><span style="background-color: transparent;">(34:22) Mentorship often comes through informal moments, not structured relationships.</span></p><p><span style="background-color: transparent;">(40:14) Not all mentors give good advice. Leadership means filtering input and trusting your gut.</span></p><p><span style="background-color: transparent;">(45:00) Engaging with “grumpy gooses” is a fast path to trust and alignment because of their honesty.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Susanne Senoff</a></p><p>https://www.linkedin.com/in/susanne-elizer-senoff-575ba96/</p><p><br></p><p><a href="https://www.linkedin.com/company/pros/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a> | LinkedIn</p><p>https://www.linkedin.com/company/pros/</p><p><br></p><p><a href="https://pros.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">PROS</a> | Website</p><p>https://pros.com/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement </span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[On this episode, hosts Tim York and Jackie Henrich talk to Susanne Senoff, CISO of PROS, about making security human, building trust through connection and leading with authenticity. Susanne shares lessons from her unconventional career path, her v...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">240d04d7-abb8-4689-aa70-bdd3796bc35f</guid>
  <title><![CDATA[The Culture Factor in Cybersecurity Leadership with Scott Ostrander of SPS Commerce ]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Hosts Aaron Lentz and Tim York talk to </span><a href="https://www.linkedin.com/in/scott-ostrander-46846a8/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Scott Ostrander</a><span style="background-color: transparent;">, Vice President and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/sps-commerce/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a><span style="background-color: transparent;"> and Founding Member of </span><a href="https://www.linkedin.com/company/minnesotaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a><span style="background-color: transparent;">.</span></p><p><br></p><p><span style="background-color: transparent;">With the experience that comes with two decades at Medtronic and now leading security at a SaaS company, Scott shares how he builds trust, manages risk and leads with empathy in fast-paced environments. He breaks down the limitations of access reviews, how AI is reshaping identity verification and why listening matters more than immediate change. From deepfake threats to third-party visibility and vendor partnerships, Scott offers pragmatic insights and people-centered leadership advice for today’s CISOs.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(05:39) Deleting your biometric data reduces exposure if companies are sold or breached.</span></p><p><span style="background-color: transparent;">(11:09) Culture and identity shape how security decisions are made in business.</span></p><p><span style="background-color: transparent;">(16:30) Effective change depends on alignment and trust with the existing team.</span></p><p><span style="background-color: transparent;">(26:32) AI deepfakes now challenge the reliability of identity verification.</span></p><p><span style="background-color: transparent;">(28:22) Most organizations lack a clear view of their third-party risk landscape.</span></p><p><span style="background-color: transparent;">(38:45) The real risk in access reviews is denying needed access.</span></p><p><span style="background-color: transparent;">(43:46) Determining who has access to what remains difficult across SaaS ecosystems.</span></p><p><span style="background-color: transparent;">(48:31) Trusted vendors offer insight and partnership, not just a sales pitch.</span></p><p><span style="background-color: transparent;">(52:32) Trust builds when vendors stop selling and start listening.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/scott-ostrander-46846a8/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Scott Ostrander</a></p><p>https://www.linkedin.com/in/scott-ostrander-46846a8/</p><p><br></p><p><a href="https://www.linkedin.com/company/sps-commerce/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a> | LinkedIn</p><p>https://www.linkedin.com/company/sps-commerce/</p><p><br></p><p><a href="https://www.spscommerce.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a> | Website</p><p>https://www.spscommerce.com/</p><p><br></p><p><a href="https://www.linkedin.com/company/minnesotaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a> | LinkedIn</p><p>https://www.linkedin.com/company/minnesotaciso/</p><p><br></p><p><a href="https://minnesotaciso.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a> | Website</p><p>https://minnesotaciso.org/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/d7fe448c-0be8-4218-a61c-efa85a0cec09/7dd4476865.jpg" />
  <pubDate>Wed, 25 Jun 2025 00:00:00 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="52450196" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/d7fe448c-0be8-4218-a61c-efa85a0cec09/episode.mp3" />
  <itunes:title><![CDATA[The Culture Factor in Cybersecurity Leadership with Scott Ostrander of SPS Commerce ]]></itunes:title>
  <itunes:duration>54:38</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Hosts Aaron Lentz and Tim York talk to </span><a href="https://www.linkedin.com/in/scott-ostrander-46846a8/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Scott Ostrander</a><span style="background-color: transparent;">, Vice President and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/sps-commerce/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a><span style="background-color: transparent;"> and Founding Member of </span><a href="https://www.linkedin.com/company/minnesotaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a><span style="background-color: transparent;">.</span></p><p><br></p><p><span style="background-color: transparent;">With the experience that comes with two decades at Medtronic and now leading security at a SaaS company, Scott shares how he builds trust, manages risk and leads with empathy in fast-paced environments. He breaks down the limitations of access reviews, how AI is reshaping identity verification and why listening matters more than immediate change. From deepfake threats to third-party visibility and vendor partnerships, Scott offers pragmatic insights and people-centered leadership advice for today’s CISOs.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(05:39) Deleting your biometric data reduces exposure if companies are sold or breached.</span></p><p><span style="background-color: transparent;">(11:09) Culture and identity shape how security decisions are made in business.</span></p><p><span style="background-color: transparent;">(16:30) Effective change depends on alignment and trust with the existing team.</span></p><p><span style="background-color: transparent;">(26:32) AI deepfakes now challenge the reliability of identity verification.</span></p><p><span style="background-color: transparent;">(28:22) Most organizations lack a clear view of their third-party risk landscape.</span></p><p><span style="background-color: transparent;">(38:45) The real risk in access reviews is denying needed access.</span></p><p><span style="background-color: transparent;">(43:46) Determining who has access to what remains difficult across SaaS ecosystems.</span></p><p><span style="background-color: transparent;">(48:31) Trusted vendors offer insight and partnership, not just a sales pitch.</span></p><p><span style="background-color: transparent;">(52:32) Trust builds when vendors stop selling and start listening.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/scott-ostrander-46846a8/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Scott Ostrander</a></p><p>https://www.linkedin.com/in/scott-ostrander-46846a8/</p><p><br></p><p><a href="https://www.linkedin.com/company/sps-commerce/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a> | LinkedIn</p><p>https://www.linkedin.com/company/sps-commerce/</p><p><br></p><p><a href="https://www.spscommerce.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a> | Website</p><p>https://www.spscommerce.com/</p><p><br></p><p><a href="https://www.linkedin.com/company/minnesotaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a> | LinkedIn</p><p>https://www.linkedin.com/company/minnesotaciso/</p><p><br></p><p><a href="https://minnesotaciso.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a> | Website</p><p>https://minnesotaciso.org/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Hosts Aaron Lentz and Tim York talk to </span><a href="https://www.linkedin.com/in/scott-ostrander-46846a8/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Scott Ostrander</a><span style="background-color: transparent;">, Vice President and Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/sps-commerce/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a><span style="background-color: transparent;"> and Founding Member of </span><a href="https://www.linkedin.com/company/minnesotaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a><span style="background-color: transparent;">.</span></p><p><br></p><p><span style="background-color: transparent;">With the experience that comes with two decades at Medtronic and now leading security at a SaaS company, Scott shares how he builds trust, manages risk and leads with empathy in fast-paced environments. He breaks down the limitations of access reviews, how AI is reshaping identity verification and why listening matters more than immediate change. From deepfake threats to third-party visibility and vendor partnerships, Scott offers pragmatic insights and people-centered leadership advice for today’s CISOs.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(05:39) Deleting your biometric data reduces exposure if companies are sold or breached.</span></p><p><span style="background-color: transparent;">(11:09) Culture and identity shape how security decisions are made in business.</span></p><p><span style="background-color: transparent;">(16:30) Effective change depends on alignment and trust with the existing team.</span></p><p><span style="background-color: transparent;">(26:32) AI deepfakes now challenge the reliability of identity verification.</span></p><p><span style="background-color: transparent;">(28:22) Most organizations lack a clear view of their third-party risk landscape.</span></p><p><span style="background-color: transparent;">(38:45) The real risk in access reviews is denying needed access.</span></p><p><span style="background-color: transparent;">(43:46) Determining who has access to what remains difficult across SaaS ecosystems.</span></p><p><span style="background-color: transparent;">(48:31) Trusted vendors offer insight and partnership, not just a sales pitch.</span></p><p><span style="background-color: transparent;">(52:32) Trust builds when vendors stop selling and start listening.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/scott-ostrander-46846a8/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Scott Ostrander</a></p><p>https://www.linkedin.com/in/scott-ostrander-46846a8/</p><p><br></p><p><a href="https://www.linkedin.com/company/sps-commerce/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a> | LinkedIn</p><p>https://www.linkedin.com/company/sps-commerce/</p><p><br></p><p><a href="https://www.spscommerce.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">SPS Commerce</a> | Website</p><p>https://www.spscommerce.com/</p><p><br></p><p><a href="https://www.linkedin.com/company/minnesotaciso/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a> | LinkedIn</p><p>https://www.linkedin.com/company/minnesotaciso/</p><p><br></p><p><a href="https://minnesotaciso.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">MinnesotaCISO</a> | Website</p><p>https://minnesotaciso.org/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Hosts Aaron Lentz and Tim York talk to Scott Ostrander, Vice President and Chief Information Security Officer of SPS Commerce and Founding Member of MinnesotaCISO.With the experience that comes with two decades at Medtronic and now leading security...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">7bcc3bda-929f-4385-a01d-8fe9d4c8e44a</guid>
  <title><![CDATA[Protecting People, Not Just Data with Rich Rhodes of Choice Bank]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts Aaron Linz and Tim York talk to </span><a href="https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Rich Rhodes</a><span style="background-color: transparent;">,</span><a href="https://www.linkedin.com/in/richrhodesiam/" target="_blank" style="background-color: transparent; color: rgb(0, 0, 0);"> </a><span style="background-color: transparent;">Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/choicebank/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a><span style="background-color: transparent;">. Rich shares how his people-first philosophy shapes the way he leads security programs, especially during high-stress moments like bank mergers, regulatory pressure and pandemic-era team isolation. Drawing from years in financial services and community work, Rich explains why fundamentals matter, how humor builds trust and why he believes security is 90% people.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(04:30) Volunteer work revealed the real-world consequences of identity loss.</span></p><p><span style="background-color: transparent;">(07:56) Cybersecurity leadership must center the human experience, not just controls.</span></p><p><span style="background-color: transparent;">(09:33) Managing conflict in security teams requires empathy and intentional restraint.</span></p><p><span style="background-color: transparent;">(16:09) Employee well-being and development are critical responsibilities of CISOs.</span></p><p><span style="background-color: transparent;">(18:25) Regular communication and transparency help unify distributed teams.</span></p><p><span style="background-color: transparent;">(27:04) Large-scale IAM implementations demand urgency and cross-functional alignment.</span></p><p><span style="background-color: transparent;">(30:55) Creative morale boosters can protect team mental health during crises.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Rich Rhodes</a></p><p>https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/</p><p><br></p><p><a href="https://www.linkedin.com/company/choicebank/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a> | LinkedIn</p><p>https://www.linkedin.com/company/choicebank/</p><p><br></p><p><a href="https://bankwithchoice.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a> | Website</p><p>https://bankwithchoice.com/</p><p><br></p><p><a href="https://meals-on-wheels.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Meals on Wheels</a> | Website</p><p>https://meals-on-wheels.com/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><span style="background-color: transparent;">For more information, visit </span><a href="https://ic-consult.com" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ic-consult.com</a><span style="background-color: transparent;">.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/674a925e-80c8-40f8-9088-4d4a4fbdc6fd/cd997211b3.jpg" />
  <pubDate>Wed, 28 May 2025 02:57:55 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="33479865" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/674a925e-80c8-40f8-9088-4d4a4fbdc6fd/episode.mp3" />
  <itunes:title><![CDATA[Protecting People, Not Just Data with Rich Rhodes of Choice Bank]]></itunes:title>
  <itunes:duration>34:52</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts Aaron Linz and Tim York talk to </span><a href="https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Rich Rhodes</a><span style="background-color: transparent;">,</span><a href="https://www.linkedin.com/in/richrhodesiam/" target="_blank" style="background-color: transparent; color: rgb(0, 0, 0);"> </a><span style="background-color: transparent;">Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/choicebank/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a><span style="background-color: transparent;">. Rich shares how his people-first philosophy shapes the way he leads security programs, especially during high-stress moments like bank mergers, regulatory pressure and pandemic-era team isolation. Drawing from years in financial services and community work, Rich explains why fundamentals matter, how humor builds trust and why he believes security is 90% people.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(04:30) Volunteer work revealed the real-world consequences of identity loss.</span></p><p><span style="background-color: transparent;">(07:56) Cybersecurity leadership must center the human experience, not just controls.</span></p><p><span style="background-color: transparent;">(09:33) Managing conflict in security teams requires empathy and intentional restraint.</span></p><p><span style="background-color: transparent;">(16:09) Employee well-being and development are critical responsibilities of CISOs.</span></p><p><span style="background-color: transparent;">(18:25) Regular communication and transparency help unify distributed teams.</span></p><p><span style="background-color: transparent;">(27:04) Large-scale IAM implementations demand urgency and cross-functional alignment.</span></p><p><span style="background-color: transparent;">(30:55) Creative morale boosters can protect team mental health during crises.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Rich Rhodes</a></p><p>https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/</p><p><br></p><p><a href="https://www.linkedin.com/company/choicebank/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a> | LinkedIn</p><p>https://www.linkedin.com/company/choicebank/</p><p><br></p><p><a href="https://bankwithchoice.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a> | Website</p><p>https://bankwithchoice.com/</p><p><br></p><p><a href="https://meals-on-wheels.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Meals on Wheels</a> | Website</p><p>https://meals-on-wheels.com/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><span style="background-color: transparent;">For more information, visit </span><a href="https://ic-consult.com" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ic-consult.com</a><span style="background-color: transparent;">.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">On this episode, hosts Aaron Linz and Tim York talk to </span><a href="https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Rich Rhodes</a><span style="background-color: transparent;">,</span><a href="https://www.linkedin.com/in/richrhodesiam/" target="_blank" style="background-color: transparent; color: rgb(0, 0, 0);"> </a><span style="background-color: transparent;">Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/choicebank/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a><span style="background-color: transparent;">. Rich shares how his people-first philosophy shapes the way he leads security programs, especially during high-stress moments like bank mergers, regulatory pressure and pandemic-era team isolation. Drawing from years in financial services and community work, Rich explains why fundamentals matter, how humor builds trust and why he believes security is 90% people.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(04:30) Volunteer work revealed the real-world consequences of identity loss.</span></p><p><span style="background-color: transparent;">(07:56) Cybersecurity leadership must center the human experience, not just controls.</span></p><p><span style="background-color: transparent;">(09:33) Managing conflict in security teams requires empathy and intentional restraint.</span></p><p><span style="background-color: transparent;">(16:09) Employee well-being and development are critical responsibilities of CISOs.</span></p><p><span style="background-color: transparent;">(18:25) Regular communication and transparency help unify distributed teams.</span></p><p><span style="background-color: transparent;">(27:04) Large-scale IAM implementations demand urgency and cross-functional alignment.</span></p><p><span style="background-color: transparent;">(30:55) Creative morale boosters can protect team mental health during crises.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Rich Rhodes</a></p><p>https://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/</p><p><br></p><p><a href="https://www.linkedin.com/company/choicebank/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a> | LinkedIn</p><p>https://www.linkedin.com/company/choicebank/</p><p><br></p><p><a href="https://bankwithchoice.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Choice Bank</a> | Website</p><p>https://bankwithchoice.com/</p><p><br></p><p><a href="https://meals-on-wheels.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Meals on Wheels</a> | Website</p><p>https://meals-on-wheels.com/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><span style="background-color: transparent;">For more information, visit </span><a href="https://ic-consult.com" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ic-consult.com</a><span style="background-color: transparent;">.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[On this episode, hosts Aaron Linz and Tim York talk to Rich Rhodes, Chief Information Security Officer of Choice Bank. Rich shares how his people-first philosophy shapes the way he leads security programs, especially during high-stress moments like...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">1741639c-2e89-43e7-8249-2ae4a13308ab</guid>
  <title><![CDATA[Why Calm Leadership Wins During Cyber Crises with Andrew Wilder of Vetcor]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> talk to </span><a href="https://www.linkedin.com/in/apwilder/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Andrew Wilder</a><span style="background-color: transparent;">, Chief Security Officer of </span><a href="https://www.linkedin.com/company/vetcor/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Vetcor</a><span style="background-color: transparent;">. With three CISO roles under his belt — including at Nestlé — Andrew shares how he evolved from a command-and-control leader to a collaborative influencer of change. He discusses the importance of identity hygiene, working with the C-suite and why taking your own notes is a secret weapon for long-term leadership. From mentoring through CyberUp to partnering with startups, Andrew offers real stories and practical advice for modern cybersecurity leaders.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(04:41) Dormant accounts and poor identity hygiene are common cybersecurity challenges.</span></p><p><span style="background-color: transparent;">(08:46) Understand the level of change before accepting a leadership role.</span></p><p><span style="background-color: transparent;">(11:52) Mature CISOs accept business risk decisions and move forward.</span></p><p><span style="background-color: transparent;">(16:29) Staying calm in a cyber crisis helps lead a team with clarity.</span></p><p><span style="background-color: transparent;">(21:54) Agentic AI offers efficiency but brings big change challenges.</span></p><p><span style="background-color: transparent;">(27:27) Automate last — after you question, delete, simplify and accelerate.</span></p><p><span style="background-color: transparent;">(32:13) Overpermissioned accounts are prime for data exfiltration.</span></p><p><span style="background-color: transparent;">(38:02) Strong relationships beat cold outreach every time.</span></p><p><span style="background-color: transparent;">(40:26) Cyber insurance now drives many security tool decisions.</span></p><p><span style="background-color: transparent;">(43:13) Partnerships give CISOs tools, team growth and ecosystem security.</span></p><p><span style="background-color: transparent;">(46:34) Trusting AI blindly is a dangerous mistake.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/apwilder/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Andrew Wilder</a></p><p>https://www.linkedin.com/in/apwilder/</p><p><br></p><p><a href="https://www.linkedin.com/company/vetcor/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Vetcor</a></p><p>https://www.linkedin.com/company/vetcor/</p><p><br></p><p><a href="https://wecyberup.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CyberUp</a></p><p>https://wecyberup.org/</p><p><br></p><p><a href="https://www.infragard.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">InfraGard</a><span style="background-color: transparent;">&nbsp;</span></p><p>https://www.infragard.org/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/448a636c-d500-4351-a2c5-8ca2442bf67b/3d6602aeea.jpg" />
  <pubDate>Wed, 30 Apr 2025 00:00:00 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="49445070" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/448a636c-d500-4351-a2c5-8ca2442bf67b/episode.mp3" />
  <itunes:title><![CDATA[Why Calm Leadership Wins During Cyber Crises with Andrew Wilder of Vetcor]]></itunes:title>
  <itunes:duration>51:30</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> talk to </span><a href="https://www.linkedin.com/in/apwilder/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Andrew Wilder</a><span style="background-color: transparent;">, Chief Security Officer of </span><a href="https://www.linkedin.com/company/vetcor/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Vetcor</a><span style="background-color: transparent;">. With three CISO roles under his belt — including at Nestlé — Andrew shares how he evolved from a command-and-control leader to a collaborative influencer of change. He discusses the importance of identity hygiene, working with the C-suite and why taking your own notes is a secret weapon for long-term leadership. From mentoring through CyberUp to partnering with startups, Andrew offers real stories and practical advice for modern cybersecurity leaders.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(04:41) Dormant accounts and poor identity hygiene are common cybersecurity challenges.</span></p><p><span style="background-color: transparent;">(08:46) Understand the level of change before accepting a leadership role.</span></p><p><span style="background-color: transparent;">(11:52) Mature CISOs accept business risk decisions and move forward.</span></p><p><span style="background-color: transparent;">(16:29) Staying calm in a cyber crisis helps lead a team with clarity.</span></p><p><span style="background-color: transparent;">(21:54) Agentic AI offers efficiency but brings big change challenges.</span></p><p><span style="background-color: transparent;">(27:27) Automate last — after you question, delete, simplify and accelerate.</span></p><p><span style="background-color: transparent;">(32:13) Overpermissioned accounts are prime for data exfiltration.</span></p><p><span style="background-color: transparent;">(38:02) Strong relationships beat cold outreach every time.</span></p><p><span style="background-color: transparent;">(40:26) Cyber insurance now drives many security tool decisions.</span></p><p><span style="background-color: transparent;">(43:13) Partnerships give CISOs tools, team growth and ecosystem security.</span></p><p><span style="background-color: transparent;">(46:34) Trusting AI blindly is a dangerous mistake.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/apwilder/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Andrew Wilder</a></p><p>https://www.linkedin.com/in/apwilder/</p><p><br></p><p><a href="https://www.linkedin.com/company/vetcor/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Vetcor</a></p><p>https://www.linkedin.com/company/vetcor/</p><p><br></p><p><a href="https://wecyberup.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CyberUp</a></p><p>https://wecyberup.org/</p><p><br></p><p><a href="https://www.infragard.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">InfraGard</a><span style="background-color: transparent;">&nbsp;</span></p><p>https://www.infragard.org/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> talk to </span><a href="https://www.linkedin.com/in/apwilder/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Andrew Wilder</a><span style="background-color: transparent;">, Chief Security Officer of </span><a href="https://www.linkedin.com/company/vetcor/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Vetcor</a><span style="background-color: transparent;">. With three CISO roles under his belt — including at Nestlé — Andrew shares how he evolved from a command-and-control leader to a collaborative influencer of change. He discusses the importance of identity hygiene, working with the C-suite and why taking your own notes is a secret weapon for long-term leadership. From mentoring through CyberUp to partnering with startups, Andrew offers real stories and practical advice for modern cybersecurity leaders.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(04:41) Dormant accounts and poor identity hygiene are common cybersecurity challenges.</span></p><p><span style="background-color: transparent;">(08:46) Understand the level of change before accepting a leadership role.</span></p><p><span style="background-color: transparent;">(11:52) Mature CISOs accept business risk decisions and move forward.</span></p><p><span style="background-color: transparent;">(16:29) Staying calm in a cyber crisis helps lead a team with clarity.</span></p><p><span style="background-color: transparent;">(21:54) Agentic AI offers efficiency but brings big change challenges.</span></p><p><span style="background-color: transparent;">(27:27) Automate last — after you question, delete, simplify and accelerate.</span></p><p><span style="background-color: transparent;">(32:13) Overpermissioned accounts are prime for data exfiltration.</span></p><p><span style="background-color: transparent;">(38:02) Strong relationships beat cold outreach every time.</span></p><p><span style="background-color: transparent;">(40:26) Cyber insurance now drives many security tool decisions.</span></p><p><span style="background-color: transparent;">(43:13) Partnerships give CISOs tools, team growth and ecosystem security.</span></p><p><span style="background-color: transparent;">(46:34) Trusting AI blindly is a dangerous mistake.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a></p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a></p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><a href="https://www.linkedin.com/in/apwilder/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Andrew Wilder</a></p><p>https://www.linkedin.com/in/apwilder/</p><p><br></p><p><a href="https://www.linkedin.com/company/vetcor/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Vetcor</a></p><p>https://www.linkedin.com/company/vetcor/</p><p><br></p><p><a href="https://wecyberup.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CyberUp</a></p><p>https://wecyberup.org/</p><p><br></p><p><a href="https://www.infragard.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">InfraGard</a><span style="background-color: transparent;">&nbsp;</span></p><p>https://www.infragard.org/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Hosts Aaron Lentz and Tim York talk to Andrew Wilder, Chief Security Officer of Vetcor. With three CISO roles under his belt — including at Nestlé — Andrew shares how he evolved from a command-and-control leader to a collaborative influencer of cha...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">da93fbfb-e7fa-4cb1-b723-3d60024cd796</guid>
  <title><![CDATA[Transforming Security Through Storytelling with Julie Myerholtz of Brunswick Corporation]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/jmyerholtz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Julie Myerholtz</a><span style="background-color: transparent;">, Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/brunswick-corporation/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Brunswick Corporation</a><span style="background-color: transparent;">, shares her approach to identity security, leadership and security culture. She explains why people, not tools, are the first line of defense, how gamification improves security awareness and why identity security must evolve to address non-human identities and just-in-time access.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(09:10) A strong mentor can shape an effective approach to identity security.</span></p><p><span style="background-color: transparent;">(12:17) A formal IT degree isn’t required for a successful cybersecurity career.</span></p><p><span style="background-color: transparent;">(13:52) Cybersecurity plays a direct role in keeping business operations running.</span></p><p><span style="background-color: transparent;">(17:41) Executives need impact, not technical details, in security reporting.</span></p><p><span style="background-color: transparent;">(20:27) Security’s success is invisible — failure is when people take notice.</span></p><p><span style="background-color: transparent;">(23:40) Security must align with business risk, not just technical threats.</span></p><p><span style="background-color: transparent;">(29:08) Identity security is the foundation of digital defense.</span></p><p><span style="background-color: transparent;">(32:50) Legacy identity debt creates major security challenges.</span></p><p><span style="background-color: transparent;">(36:17) Non-human identities must be managed like human accounts.</span></p><p><span style="background-color: transparent;">(39:42) Security incentives drive faster user adoption of new systems.</span></p><p><span style="background-color: transparent;">(43:00) Daytime deployments keep support teams available for issues.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/jmyerholtz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Julie Myerholtz</a> -</p><p>https://www.linkedin.com/in/jmyerholtz/</p><p><a href="https://www.linkedin.com/company/brunswick-corporation/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Brunswick Corporation</a> -</p><p>https://www.linkedin.com/company/brunswick-corporation/</p><p><a href="https://www.cyberark.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CyberArk</a> -</p><p>https://www.cyberark.com/</p><p><a href="https://rhisac.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Retail and Hospitality ISAC</a> -</p><p>https://rhisac.org/</p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/9ca310b8-a1e4-4e39-a21b-68c568df42d2/524307117a.jpg" />
  <pubDate>Thu, 27 Mar 2025 15:01:18 -0400</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (iC Consult)]]></author>
  <enclosure length="45699738" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/9ca310b8-a1e4-4e39-a21b-68c568df42d2/episode.mp3" />
  <itunes:title><![CDATA[Transforming Security Through Storytelling with Julie Myerholtz of Brunswick Corporation]]></itunes:title>
  <itunes:duration>47:36</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/jmyerholtz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Julie Myerholtz</a><span style="background-color: transparent;">, Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/brunswick-corporation/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Brunswick Corporation</a><span style="background-color: transparent;">, shares her approach to identity security, leadership and security culture. She explains why people, not tools, are the first line of defense, how gamification improves security awareness and why identity security must evolve to address non-human identities and just-in-time access.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(09:10) A strong mentor can shape an effective approach to identity security.</span></p><p><span style="background-color: transparent;">(12:17) A formal IT degree isn’t required for a successful cybersecurity career.</span></p><p><span style="background-color: transparent;">(13:52) Cybersecurity plays a direct role in keeping business operations running.</span></p><p><span style="background-color: transparent;">(17:41) Executives need impact, not technical details, in security reporting.</span></p><p><span style="background-color: transparent;">(20:27) Security’s success is invisible — failure is when people take notice.</span></p><p><span style="background-color: transparent;">(23:40) Security must align with business risk, not just technical threats.</span></p><p><span style="background-color: transparent;">(29:08) Identity security is the foundation of digital defense.</span></p><p><span style="background-color: transparent;">(32:50) Legacy identity debt creates major security challenges.</span></p><p><span style="background-color: transparent;">(36:17) Non-human identities must be managed like human accounts.</span></p><p><span style="background-color: transparent;">(39:42) Security incentives drive faster user adoption of new systems.</span></p><p><span style="background-color: transparent;">(43:00) Daytime deployments keep support teams available for issues.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/jmyerholtz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Julie Myerholtz</a> -</p><p>https://www.linkedin.com/in/jmyerholtz/</p><p><a href="https://www.linkedin.com/company/brunswick-corporation/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Brunswick Corporation</a> -</p><p>https://www.linkedin.com/company/brunswick-corporation/</p><p><a href="https://www.cyberark.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CyberArk</a> -</p><p>https://www.cyberark.com/</p><p><a href="https://rhisac.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Retail and Hospitality ISAC</a> -</p><p>https://rhisac.org/</p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/jmyerholtz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Julie Myerholtz</a><span style="background-color: transparent;">, Chief Information Security Officer of </span><a href="https://www.linkedin.com/company/brunswick-corporation/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Brunswick Corporation</a><span style="background-color: transparent;">, shares her approach to identity security, leadership and security culture. She explains why people, not tools, are the first line of defense, how gamification improves security awareness and why identity security must evolve to address non-human identities and just-in-time access.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(09:10) A strong mentor can shape an effective approach to identity security.</span></p><p><span style="background-color: transparent;">(12:17) A formal IT degree isn’t required for a successful cybersecurity career.</span></p><p><span style="background-color: transparent;">(13:52) Cybersecurity plays a direct role in keeping business operations running.</span></p><p><span style="background-color: transparent;">(17:41) Executives need impact, not technical details, in security reporting.</span></p><p><span style="background-color: transparent;">(20:27) Security’s success is invisible — failure is when people take notice.</span></p><p><span style="background-color: transparent;">(23:40) Security must align with business risk, not just technical threats.</span></p><p><span style="background-color: transparent;">(29:08) Identity security is the foundation of digital defense.</span></p><p><span style="background-color: transparent;">(32:50) Legacy identity debt creates major security challenges.</span></p><p><span style="background-color: transparent;">(36:17) Non-human identities must be managed like human accounts.</span></p><p><span style="background-color: transparent;">(39:42) Security incentives drive faster user adoption of new systems.</span></p><p><span style="background-color: transparent;">(43:00) Daytime deployments keep support teams available for issues.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/jmyerholtz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Julie Myerholtz</a> -</p><p>https://www.linkedin.com/in/jmyerholtz/</p><p><a href="https://www.linkedin.com/company/brunswick-corporation/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Brunswick Corporation</a> -</p><p>https://www.linkedin.com/company/brunswick-corporation/</p><p><a href="https://www.cyberark.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">CyberArk</a> -</p><p>https://www.cyberark.com/</p><p><a href="https://rhisac.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Retail and Hospitality ISAC</a> -</p><p>https://rhisac.org/</p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[On this episode, Julie Myerholtz, Chief Information Security Officer of Brunswick Corporation, shares her approach to identity security, leadership and security culture. She explains why people, not tools, are the first line of defense, how gamific...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">5d842800-1c63-4b44-9b01-ac0c4f104209</guid>
  <title><![CDATA[The Hard Truth About Security Leadership with Corey Kaemming of Valvoline Inc.]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/corey-kaemming/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Corey Kaemming</a><span style="background-color: transparent;">, Sr. Director of Information Security at</span><a href="https://www.linkedin.com/company/valvoline/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> Valvoline Inc.</a><span style="background-color: transparent;">, joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From the overuse of buzzwords to vendor consolidation, Corey provides a candid look at what works — and what doesn’t — in building a strong security program.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(06:36) Corey’s leadership philosophy is rooted in listening first and building trust.</span></p><p><span style="background-color: transparent;">(10:58) Early mentorship conveys the importance of preparation and empathy.</span></p><p><span style="background-color: transparent;">(13:07) Identity security touches every part of the business and drives operations.</span></p><p><span style="background-color: transparent;">(18:49) Breaking into identity security requires hands-on experience and adaptability.</span></p><p><span style="background-color: transparent;">(23:59) Security leaders must communicate in ways that resonate with executives.</span></p><p><span style="background-color: transparent;">(27:47) Running security for a company's divestiture requires trust and precision.</span></p><p><span style="background-color: transparent;">(30:44) People resist security changes, but tying them to business outcomes helps.</span></p><p><span style="background-color: transparent;">(37:38) Too many identity tools create complexity and strain resources.</span></p><p><span style="background-color: transparent;">(42:29) Security isn’t a one-time fix — it demands constant attention and updates.</span></p><p><span style="background-color: transparent;">(53:56) Zero trust is widely used but often misunderstood in execution.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/corey-kaemming/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Corey Kaemming</a> -</p><p>https://www.linkedin.com/in/corey-kaemming/</p><p><br></p><p><a href="https://www.linkedin.com/company/valvoline/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Valvoline Inc.</a> -</p><p>https://www.linkedin.com/company/valvoline/</p><p><br></p><p><a href="https://www.evanta.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Evanta</a> -</p><p>https://www.evanta.com/</p><p><br></p><p><a href="https://signal.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Signal</a> -</p><p>https://signal.org/</p><p><br></p><p><a href="https://rhisac.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Retail &amp; Hospitality ISAC (RH-ISAC)</a> -</p><p>https://rhisac.org/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/f50c36af-25a6-4352-88bc-58da765ff8fd/32ca641575.jpg" />
  <pubDate>Wed, 26 Feb 2025 07:49:00 -0500</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (IC Consult)]]></author>
  <enclosure length="54351075" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/f50c36af-25a6-4352-88bc-58da765ff8fd/episode.mp3" />
  <itunes:title><![CDATA[The Hard Truth About Security Leadership with Corey Kaemming of Valvoline Inc.]]></itunes:title>
  <itunes:duration>56:36</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/corey-kaemming/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Corey Kaemming</a><span style="background-color: transparent;">, Sr. Director of Information Security at</span><a href="https://www.linkedin.com/company/valvoline/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> Valvoline Inc.</a><span style="background-color: transparent;">, joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From the overuse of buzzwords to vendor consolidation, Corey provides a candid look at what works — and what doesn’t — in building a strong security program.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(06:36) Corey’s leadership philosophy is rooted in listening first and building trust.</span></p><p><span style="background-color: transparent;">(10:58) Early mentorship conveys the importance of preparation and empathy.</span></p><p><span style="background-color: transparent;">(13:07) Identity security touches every part of the business and drives operations.</span></p><p><span style="background-color: transparent;">(18:49) Breaking into identity security requires hands-on experience and adaptability.</span></p><p><span style="background-color: transparent;">(23:59) Security leaders must communicate in ways that resonate with executives.</span></p><p><span style="background-color: transparent;">(27:47) Running security for a company's divestiture requires trust and precision.</span></p><p><span style="background-color: transparent;">(30:44) People resist security changes, but tying them to business outcomes helps.</span></p><p><span style="background-color: transparent;">(37:38) Too many identity tools create complexity and strain resources.</span></p><p><span style="background-color: transparent;">(42:29) Security isn’t a one-time fix — it demands constant attention and updates.</span></p><p><span style="background-color: transparent;">(53:56) Zero trust is widely used but often misunderstood in execution.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/corey-kaemming/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Corey Kaemming</a> -</p><p>https://www.linkedin.com/in/corey-kaemming/</p><p><br></p><p><a href="https://www.linkedin.com/company/valvoline/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Valvoline Inc.</a> -</p><p>https://www.linkedin.com/company/valvoline/</p><p><br></p><p><a href="https://www.evanta.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Evanta</a> -</p><p>https://www.evanta.com/</p><p><br></p><p><a href="https://signal.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Signal</a> -</p><p>https://signal.org/</p><p><br></p><p><a href="https://rhisac.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Retail &amp; Hospitality ISAC (RH-ISAC)</a> -</p><p>https://rhisac.org/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">On this episode, </span><a href="https://www.linkedin.com/in/corey-kaemming/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Corey Kaemming</a><span style="background-color: transparent;">, Sr. Director of Information Security at</span><a href="https://www.linkedin.com/company/valvoline/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> Valvoline Inc.</a><span style="background-color: transparent;">, joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From the overuse of buzzwords to vendor consolidation, Corey provides a candid look at what works — and what doesn’t — in building a strong security program.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(06:36) Corey’s leadership philosophy is rooted in listening first and building trust.</span></p><p><span style="background-color: transparent;">(10:58) Early mentorship conveys the importance of preparation and empathy.</span></p><p><span style="background-color: transparent;">(13:07) Identity security touches every part of the business and drives operations.</span></p><p><span style="background-color: transparent;">(18:49) Breaking into identity security requires hands-on experience and adaptability.</span></p><p><span style="background-color: transparent;">(23:59) Security leaders must communicate in ways that resonate with executives.</span></p><p><span style="background-color: transparent;">(27:47) Running security for a company's divestiture requires trust and precision.</span></p><p><span style="background-color: transparent;">(30:44) People resist security changes, but tying them to business outcomes helps.</span></p><p><span style="background-color: transparent;">(37:38) Too many identity tools create complexity and strain resources.</span></p><p><span style="background-color: transparent;">(42:29) Security isn’t a one-time fix — it demands constant attention and updates.</span></p><p><span style="background-color: transparent;">(53:56) Zero trust is widely used but often misunderstood in execution.</span></p><p><br></p><p><strong style="background-color: transparent;">Resources Mentioned:</strong></p><p><br></p><p><a href="https://www.linkedin.com/in/corey-kaemming/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Corey Kaemming</a> -</p><p>https://www.linkedin.com/in/corey-kaemming/</p><p><br></p><p><a href="https://www.linkedin.com/company/valvoline/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Valvoline Inc.</a> -</p><p>https://www.linkedin.com/company/valvoline/</p><p><br></p><p><a href="https://www.evanta.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Evanta</a> -</p><p>https://www.evanta.com/</p><p><br></p><p><a href="https://signal.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Signal</a> -</p><p>https://signal.org/</p><p><br></p><p><a href="https://rhisac.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Retail &amp; Hospitality ISAC (RH-ISAC)</a> -</p><p>https://rhisac.org/</p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com.</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[On this episode, Corey Kaemming, Sr. Director of Information Security at Valvoline Inc., joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From t...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
<item>
  <guid isPermaLink="false">860d8548-e4f7-46ca-998f-e3886884b989</guid>
  <title><![CDATA[Humanizing Identity in the Cybersecurity Space with Aaron Lentz and Tim York]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">On this inaugural episode, hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> explore the human element in cybersecurity leadership, using real-world examples and practical insights. From understanding the nuances of deepfakes to thinking of identity tools as hammers, they share actionable strategies for influencing organizational culture and fostering effective collaboration.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(02:26) A false tsunami alert at Bandon Dunes highlighted different human reactions to crises.</span></p><p><span style="background-color: transparent;">(06:02) Deepfakes have evolved from basic to highly convincing, requiring cultural changes to combat them effectively.</span></p><p><span style="background-color: transparent;">(12:25) A privileged access management (PAM) tool failed due to poor communication and user resistance.</span></p><p><span style="background-color: transparent;">(17:03) The rise of Chief Identity Officer roles reflects the growing complexity of identity programs.</span></p><p><span style="background-color: transparent;">(20:27) Simplifying identity workflows is critical for future-proofing cybersecurity strategies.</span></p><p><span style="background-color: transparent;">(25:42) Onboarding delays can erode trust and impact organizational culture.</span></p><p><span style="background-color: transparent;">(27:46) The best CISOs focus on influencing internal culture alongside implementing tools.</span></p><p><br></p><p><span style="background-color: transparent;">Resources Mentioned:</span></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a> -</p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a> -</p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></description>
  <itunes:image href="https://files.cohostpodcasting.com/cohost/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/shows/667f900c-844d-487d-9721-ffce8bfb5376/episodes/44d5e8da-f9f6-477d-8c06-2dd22a7a69d1/8207268dfc.jpg" />
  <pubDate>Wed, 29 Jan 2025 00:01:00 -0500</pubDate>
  <link>https://ic-consult.com/en/</link>
  <author><![CDATA[icconspodcast@gmail.com (IC Consult)]]></author>
  <enclosure length="31377948" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/6ed86b89-10c2-410d-bb5e-9bc50f4cc9ad/episodes/44d5e8da-f9f6-477d-8c06-2dd22a7a69d1/episode.mp3" />
  <itunes:title><![CDATA[Humanizing Identity in the Cybersecurity Space with Aaron Lentz and Tim York]]></itunes:title>
  <itunes:duration>32:41</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">On this inaugural episode, hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> explore the human element in cybersecurity leadership, using real-world examples and practical insights. From understanding the nuances of deepfakes to thinking of identity tools as hammers, they share actionable strategies for influencing organizational culture and fostering effective collaboration.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(02:26) A false tsunami alert at Bandon Dunes highlighted different human reactions to crises.</span></p><p><span style="background-color: transparent;">(06:02) Deepfakes have evolved from basic to highly convincing, requiring cultural changes to combat them effectively.</span></p><p><span style="background-color: transparent;">(12:25) A privileged access management (PAM) tool failed due to poor communication and user resistance.</span></p><p><span style="background-color: transparent;">(17:03) The rise of Chief Identity Officer roles reflects the growing complexity of identity programs.</span></p><p><span style="background-color: transparent;">(20:27) Simplifying identity workflows is critical for future-proofing cybersecurity strategies.</span></p><p><span style="background-color: transparent;">(25:42) Onboarding delays can erode trust and impact organizational culture.</span></p><p><span style="background-color: transparent;">(27:46) The best CISOs focus on influencing internal culture alongside implementing tools.</span></p><p><br></p><p><span style="background-color: transparent;">Resources Mentioned:</span></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a> -</p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a> -</p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">On this inaugural episode, hosts </span><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a><span style="background-color: transparent;"> and </span><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a><span style="background-color: transparent;"> explore the human element in cybersecurity leadership, using real-world examples and practical insights. From understanding the nuances of deepfakes to thinking of identity tools as hammers, they share actionable strategies for influencing organizational culture and fostering effective collaboration.</span></p><p><br></p><p><strong style="background-color: transparent;">Key Takeaways:</strong></p><p><br></p><p><span style="background-color: transparent;">(02:26) A false tsunami alert at Bandon Dunes highlighted different human reactions to crises.</span></p><p><span style="background-color: transparent;">(06:02) Deepfakes have evolved from basic to highly convincing, requiring cultural changes to combat them effectively.</span></p><p><span style="background-color: transparent;">(12:25) A privileged access management (PAM) tool failed due to poor communication and user resistance.</span></p><p><span style="background-color: transparent;">(17:03) The rise of Chief Identity Officer roles reflects the growing complexity of identity programs.</span></p><p><span style="background-color: transparent;">(20:27) Simplifying identity workflows is critical for future-proofing cybersecurity strategies.</span></p><p><span style="background-color: transparent;">(25:42) Onboarding delays can erode trust and impact organizational culture.</span></p><p><span style="background-color: transparent;">(27:46) The best CISOs focus on influencing internal culture alongside implementing tools.</span></p><p><br></p><p><span style="background-color: transparent;">Resources Mentioned:</span></p><p><br></p><p><a href="https://www.linkedin.com/in/aaron-lentz/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Aaron Lentz</a> -</p><p>https://www.linkedin.com/in/aaron-lentz/</p><p><br></p><p><a href="https://www.linkedin.com/in/tim-york-b80b23a/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">Tim York</a> -</p><p>https://www.linkedin.com/in/tim-york-b80b23a/</p><p><br></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;"><span class="ql-cursor">﻿﻿</span>Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">For more information, visit ic-consult.com</span></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[On this inaugural episode, hosts Aaron Lentz and Tim York explore the human element in cybersecurity leadership, using real-world examples and practical insights. From understanding the nuances of deepfakes to thinking of identity tools as hammers,...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
</item>
</channel>
</rss>