<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
    <channel>
        <generator>RedCircle VERIFY_TOKEN_707eef5d-612a-45d0-b073-06b6166f7b5e  -- Rendered At Tue, 28 Apr 2026 10:56:00 &#43;0000</generator>
        <title>CYBER LIFE</title>
        <link>https://redcircle.com/shows/cyber-life</link>
        <language>en-US</language>
        <copyright>All rights reserved.</copyright>
        <itunes:author>Ken Underhill</itunes:author>
        <itunes:summary>Welcome to the Cyber Life podcast, your one-stop destination for learning cybersecurity best practices to help you protect what matters most.

Join us to uncover expert tips to fortify your business and shield your loved ones from digital threats. But that&#39;s not all – elevate your cybersecurity career with insights that&#39;ll set you on a path to success.

Click subscribe and notifications to know when new episodes drop.</itunes:summary>
        <podcast:guid>707eef5d-612a-45d0-b073-06b6166f7b5e</podcast:guid>
        
        <description><![CDATA[<p><span>Welcome to the Cyber Life podcast, your one-stop destination for learning cybersecurity best practices to help you protect what matters most. </span></p><p><span>Join us to uncover expert tips to fortify your business and shield your loved ones from digital threats.  But that&#39;s not all – elevate your cybersecurity career with insights that&#39;ll set you on a path to success. </span></p><p><span>Click subscribe and notifications to know when new episodes drop.</span></p>]]></description>
        
        <itunes:type>episodic</itunes:type>
        <podcast:locked>no</podcast:locked>
        <itunes:owner>
            <itunes:name>Ken Underhill</itunes:name>
            <itunes:email>support@cyberlife.tv</itunes:email>
        </itunes:owner>
        
        <itunes:image href="https://media.redcircle.com/images/2023/8/28/12/ef065f08-896d-4714-9c45-6a263102f1be_1724_a92563b8-d4d7-4c60-abc4-4a3d3e9255e6_blob.jpg"/>
        
        
        
            
            <itunes:category text="Technology" />

            

        
        
            
            <itunes:category text="News">

            
                <itunes:category text="Tech News"/>
            
                <itunes:category text="Business News"/>
            

        </itunes:category>
        
            
            <itunes:category text="Education">

            
                <itunes:category text="Courses"/>
            

        </itunes:category>
        
            
            <itunes:category text="Business">

            
                <itunes:category text="Entrepreneurship"/>
            
                <itunes:category text="Careers"/>
            

        </itunes:category>
        

        
        <itunes:explicit>no</itunes:explicit>
        
        
        
        
        
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 33 - DEI in Cybersecurity with Rebekah Skeete, COO of Black Girls Hack</itunes:title>
                <title>Cyber Life Podcast Ep. 33 - DEI in Cybersecurity with Rebekah Skeete, COO of Black Girls Hack</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, Rebekah Skeete (COO) and I talk about Diversity, Equity and, Inclusion (DEI) in cybersecurity.  Check out the resources from Black Girls Hack and learn about Squad Con at the links below.</span></p><p><strong>https://www.blackgirlshack.org/Home</strong></p><p><br></p><p><strong>SquadCon link (August in Las Vegas)</strong></p><p><span>https://www.blackgirlshack.org/event-5495307?CalendarViewType=1&amp;SelectedDate=8/2/2024</span></p><p><br></p><p><span>Get personalized cybersecurity career help on Top Mate:</span></p><p><span>https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><span>Help support this channel by signing up for cybersecurity training below.  Please note that I earn a small affiliate commission if you sign up through these links for the training.</span></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>Learn the Basics of Cybersecurity</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/kZ3W4tGD/xcaSu79JNX0wDzVt </span></p><p><span>Learn ChatGPT for Ethical Hacking</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/gzESbpRe/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Get a Huge Discount on Full Cybersecurity Training</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/aFTKoM4O/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Learn Digital Forensics</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/exNKMTJD/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Learn Red Team Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/cOXfXsOF/xcaSu79JNX0wDzVt </span></p><p><span>Learn Bug Bounty Hunting</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/Us775v10/xcaSu79JNX0wDzVt </span></p><p><span>Learn Secure Coding Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/miFznW0d/xcaSu79JNX0wDzVt </span></p><p><span>Learn GRC Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/zd8IqN9W/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Learn Cybersecurity Project Management Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/X24n021f/xcaSu79JNX0wDzVt</span></p><p><span>Learn Linux for Security Professionals</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/t8OKNu7M/xcaSu79JNX0wDzVt</span></p><p><span>Learn IoT Cybersecurity</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/nEnsKy1N/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Build Your DevOps Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/Lv8zzscM/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, Rebekah Skeete (COO) and I talk about Diversity, Equity and, Inclusion (DEI) in cybersecurity.  Check out the resources from Black Girls Hack and learn about Squad Con at the links below.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;https://www.blackgirlshack.org/Home&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SquadCon link (August in Las Vegas)&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.blackgirlshack.org/event-5495307?CalendarViewType=1&amp;amp;SelectedDate=8/2/2024&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get personalized cybersecurity career help on Top Mate:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Help support this channel by signing up for cybersecurity training below.  Please note that I earn a small affiliate commission if you sign up through these links for the training.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn the Basics of Cybersecurity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/kZ3W4tGD/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn ChatGPT for Ethical Hacking&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/gzESbpRe/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get a Huge Discount on Full Cybersecurity Training&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/aFTKoM4O/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Digital Forensics&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/exNKMTJD/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Red Team Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/cOXfXsOF/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Bug Bounty Hunting&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/Us775v10/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Secure Coding Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/miFznW0d/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn GRC Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/zd8IqN9W/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Cybersecurity Project Management Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/X24n021f/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Linux for Security Professionals&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/t8OKNu7M/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn IoT Cybersecurity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/nEnsKy1N/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Build Your DevOps Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/Lv8zzscM/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="38653283" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/f0677ad5-7c56-4fae-8897-e6ab162e0a2e/stream.mp3"/>
                
                <guid isPermaLink="false">6c76fb22-7bb2-4d79-a92b-7c727bc0fa5d</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/f0677ad5-7c56-4fae-8897-e6ab162e0a2e</link>
                <pubDate>Wed, 05 Jun 2024 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/6/4/22/3d0c020c-9639-42e3-8656-1e99e2533111_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>2415</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 32 - Cybersecurity Careers and Veterans with Thomas Marr</itunes:title>
                <title>Cyber Life Podcast Ep. 32 - Cybersecurity Careers and Veterans with Thomas Marr</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Thomas Marr shares his cybersecurity career journey from the military and his best advice for getting started in your cybersecurity career.</span></p><p><br></p><p><span>Help support this channel by signing up for more training.  Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><span>Learn ChatGPT for Ethical Hacking</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/gzESbpRe/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Get a Huge Discount on Full Cybersecurity Training</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/aFTKoM4O/xcaSu79JNX0wDzVt</span></p><p><br></p><p><span>Learn the Basics of Cybersecurity</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/kZ3W4tGD/xcaSu79JNX0wDzVt </span></p><p><br></p><p><span>Learn Digital Forensics</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/exNKMTJD/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Learn Red Team Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/cOXfXsOF/xcaSu79JNX0wDzVt </span></p><p><span>Learn Bug Bounty Hunting</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/Us775v10/xcaSu79JNX0wDzVt </span></p><p><span>Learn Secure Coding Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/miFznW0d/xcaSu79JNX0wDzVt </span></p><p><span>Learn GRC Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/zd8IqN9W/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Learn Cybersecurity Project Management Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/X24n021f/xcaSu79JNX0wDzVt</span></p><p><span>Learn Linux for Security Professionals</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/t8OKNu7M/xcaSu79JNX0wDzVt</span></p><p><span>Learn IoT Cybersecurity</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/nEnsKy1N/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Build Your DevOps Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/Lv8zzscM/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>#cybersecurity #cybersecuritycareer #veteran #military #technology </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Thomas Marr shares his cybersecurity career journey from the military and his best advice for getting started in your cybersecurity career.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Help support this channel by signing up for more training.  Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn ChatGPT for Ethical Hacking&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/gzESbpRe/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get a Huge Discount on Full Cybersecurity Training&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/aFTKoM4O/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn the Basics of Cybersecurity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/kZ3W4tGD/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Digital Forensics&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/exNKMTJD/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Red Team Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/cOXfXsOF/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Bug Bounty Hunting&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/Us775v10/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Secure Coding Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/miFznW0d/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn GRC Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/zd8IqN9W/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Cybersecurity Project Management Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/X24n021f/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Linux for Security Professionals&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/t8OKNu7M/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn IoT Cybersecurity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/nEnsKy1N/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Build Your DevOps Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/Lv8zzscM/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#cybersecurity #cybersecuritycareer #veteran #military #technology &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="40560849" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/08983c64-b5a9-4962-a249-2065b6f9ef29/stream.mp3"/>
                
                <guid isPermaLink="false">37097fd4-a78e-4ad5-857a-a0449ab9b9e8</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/08983c64-b5a9-4962-a249-2065b6f9ef29</link>
                <pubDate>Wed, 28 Feb 2024 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/2/27/16/ad38c341-c915-4f31-891b-b3145df32d1f_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>2535</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 31 - Incident Response and Good Looking Navy SEALs with Rick Mischka</itunes:title>
                <title>Cyber Life Podcast Ep. 31 - Incident Response and Good Looking Navy SEALs with Rick Mischka</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, I chat with former Green Beret Rick Mischka about incident response.  We also learn who is better looking - Navy SEALs or Green Berets.  Let us know your votes in the comments.</span></p><p><br></p><p><span>Ask your question here:</span></p><p><span>https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Get more comfortable in job interviews </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><span>Learn the Basics of Cybersecurity</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/kZ3W4tGD/xcaSu79JNX0wDzVt </span></p><p><br></p><p><span>Learn ChatGPT for Ethical Hacking</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/gzESbpRe/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Get a Huge Discount on Full Cybersecurity Training</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/aFTKoM4O/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Learn Digital Forensics</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/exNKMTJD/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Learn Red Team Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/cOXfXsOF/xcaSu79JNX0wDzVt </span></p><p><span>Learn Bug Bounty Hunting</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/Us775v10/xcaSu79JNX0wDzVt </span></p><p><span>Learn Secure Coding Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/miFznW0d/xcaSu79JNX0wDzVt </span></p><p><span>Learn GRC Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/zd8IqN9W/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Learn Cybersecurity Project Management Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/X24n021f/xcaSu79JNX0wDzVt</span></p><p><span>Learn Linux for Security Professionals</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/t8OKNu7M/xcaSu79JNX0wDzVt</span></p><p><span>Learn IoT Cybersecurity</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/nEnsKy1N/xcaSu79JNX0wDzVt</span></p><p><br></p><p><br></p><p><span>Build Your DevOps Skills</span></p><p><span>https://coderedcheckout.eccouncil.org/referral/Lv8zzscM/xcaSu79JNX0wDzVt </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, I chat with former Green Beret Rick Mischka about incident response.  We also learn who is better looking - Navy SEALs or Green Berets.  Let us know your votes in the comments.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask your question here:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get more comfortable in job interviews &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn the Basics of Cybersecurity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/kZ3W4tGD/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn ChatGPT for Ethical Hacking&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/gzESbpRe/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get a Huge Discount on Full Cybersecurity Training&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/aFTKoM4O/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Digital Forensics&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/exNKMTJD/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Red Team Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/cOXfXsOF/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Bug Bounty Hunting&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/Us775v10/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Secure Coding Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/miFznW0d/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn GRC Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/zd8IqN9W/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Cybersecurity Project Management Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/X24n021f/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Linux for Security Professionals&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/t8OKNu7M/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn IoT Cybersecurity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/nEnsKy1N/xcaSu79JNX0wDzVt&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Build Your DevOps Skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://coderedcheckout.eccouncil.org/referral/Lv8zzscM/xcaSu79JNX0wDzVt &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="21184261" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/6b03e423-b841-4148-ac5d-00e6825f2ded/stream.mp3"/>
                
                <guid isPermaLink="false">edd4497c-fec4-44a3-a723-50d33a4b8642</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/6b03e423-b841-4148-ac5d-00e6825f2ded</link>
                <pubDate>Wed, 07 Feb 2024 13:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/2/3/17/6cffebf2-44d5-4dca-901e-64f20ab328e0_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1324</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 30 - Living Abroad Part 2 with Hugh Shepherd</itunes:title>
                <title>Cyber Life Podcast Ep. 30 - Living Abroad Part 2 with Hugh Shepherd</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In Part 2 of living abroad in cybersecurity, Hugh returns to share some of the resources he used to learn about the culture and requirements for other countries and where he thinks you can potentially find jobs.  The resource links are below in the description, along with Part 1 with Hugh.</span></p><p><br></p><p><span>Listen to Part 1 here:</span></p><p><span>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/c073e1de-905d-4d13-9884-fae68e0afae5</span></p><p><br></p><p><span>Research Country:</span></p><p><span>US State Department</span></p><p><span>https://www.state.gov/</span></p><p><br></p><p><span>US State Department – International Travel</span></p><p><span>https://travel.state.gov/content/travel/en/international-travel.html</span></p><p><br></p><p><span>US Embassy and/or Consulates in Country</span></p><p><span>Do a Google search for your desired country.  For example:  “US embassy Thailand”</span></p><p><span>The URL for US embassies will look similar to the examples below</span></p><p><span>Thailand:  https://th.usembassy.gov/</span></p><p><span>Nepal:   https://np.usembassy.gov/</span></p><p><br></p><p><span>Centers for Disease Control and Prevention (CDC)</span></p><p><span>https://www.cdc.gov/</span></p><p><span>Centers for Disease Control and Prevention (CDC) - Traveler’s Health</span></p><p><span>https://wwwnc.cdc.gov/travel/</span></p><p><br></p><p><span>Lonely Planet</span></p><p><span>https://www.lonelyplanet.com/</span></p><p><br></p><p><span>Visa and Work Policies:</span></p><p><span>Official website of country (this can be tricky….Whois lookup)</span></p><p><span>Do a Google search for your desired country.  For example:  “official Vietnam visa website”</span></p><p><span>Also suggest using a Whois Lookup to verify:</span></p><p><span>https://www.whois.com/whois/</span></p><p><br></p><p><span>US Embassy / State Department</span></p><p><span>Do a Google search for your desired country.  For example:  “US embassy Thailand”</span></p><p><span>Also, see links in ‘Research Country’ section above</span></p><p><br></p><p><span>Finding overseas work opportunities:</span></p><p><span>Websites:</span></p><p><span>Devex</span></p><p><span>https://www.devex.com/</span></p><p><span>DevNetJobs</span></p><p><span>https://www.devnetjobs.org/</span></p><p><span>Institute of Electrical and Electronics Engineers (IEEE)</span></p><p><span>https://www.ieee.org/</span></p><p><span>VirtualVocations.com</span></p><p><span>https://www.virtualvocations.com/</span></p><p><span>Flexjobs</span></p><p><span>https://www.flexjobs.com/</span></p><p><span>Upwork</span></p><p><span>https://www.upwork.com/</span></p><p><span>Fiver</span></p><p><span>https://www.fiverr.com/</span></p><p><br></p><p><br></p><p><span>Industries / Sectors / Roles</span></p><p><span>Hospitality sector</span></p><p><span>Hotels</span></p><p><span>Cruise ships</span></p><p><span>Freelance </span></p><p><span>Entrepreneurship</span></p><p><span>Digital Nomad</span></p><p><span>Volunteering</span></p><p><span>Remote Help Desk</span></p><p><br></p><p><span>Staying connected:</span></p><p><span>Local groups </span></p><p><span>Worker communities</span></p><p><span>Internations.org</span></p><p><span>https://www.internations.org/</span></p><p><span>Expat.com</span></p><p><span>https://www.expat.com/</span></p><p><br></p><p><span>Training:</span></p><p><span>•	Scholarships and online programs</span></p><p><span>•	Local training events (prices may be cheaper) </span></p><p><span>•	Consider reskilling / upskilling</span></p><p><span>•	Online training platforms/free resources</span></p><p><br></p><p><span>Other useful resources/tips:</span></p><p><span>•	Learn the language….or, use a translator tool like…</span></p><p><span>•	Google Translate</span></p><p><span>https://translate.google.com/ (*App for phone also available and is more useful)</span></p><p><span>•	Lonely Planet Language books are also useful and come in pocket size versions</span></p><p><span>•	Time and Date - World Clock Meeting Planner (*This tool is invaluable when living and working abroad)</span></p><p><span>ohttps://www.timeanddate.com/worldclock/meeting.html</span></p><p><span>•	Xe Currency Converter</span></p><p><span>https://www.xe.com/currencyconverter/ (*App for phone also available and is more useful)</span></p><p><span>•	Virtual Private Network (VPN)</span></p><p><span>•	WhatsApp / Viber / Vonage / Skype</span></p><p><span>•	Dual SIM phone</span></p><p><span>•	Microsoft Teams / Google Workspace</span></p><p><span>•	Travel around the country/region to learn and experience new things</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In Part 2 of living abroad in cybersecurity, Hugh returns to share some of the resources he used to learn about the culture and requirements for other countries and where he thinks you can potentially find jobs.  The resource links are below in the description, along with Part 1 with Hugh.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Listen to Part 1 here:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/c073e1de-905d-4d13-9884-fae68e0afae5&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Research Country:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;US State Department&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.state.gov/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;US State Department – International Travel&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://travel.state.gov/content/travel/en/international-travel.html&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;US Embassy and/or Consulates in Country&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Do a Google search for your desired country.  For example:  “US embassy Thailand”&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The URL for US embassies will look similar to the examples below&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Thailand:  https://th.usembassy.gov/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Nepal:   https://np.usembassy.gov/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Centers for Disease Control and Prevention (CDC)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.cdc.gov/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Centers for Disease Control and Prevention (CDC) - Traveler’s Health&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://wwwnc.cdc.gov/travel/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Lonely Planet&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.lonelyplanet.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Visa and Work Policies:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Official website of country (this can be tricky….Whois lookup)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Do a Google search for your desired country.  For example:  “official Vietnam visa website”&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Also suggest using a Whois Lookup to verify:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.whois.com/whois/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;US Embassy / State Department&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Do a Google search for your desired country.  For example:  “US embassy Thailand”&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Also, see links in ‘Research Country’ section above&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Finding overseas work opportunities:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Websites:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Devex&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.devex.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;DevNetJobs&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.devnetjobs.org/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Institute of Electrical and Electronics Engineers (IEEE)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.ieee.org/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;VirtualVocations.com&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.virtualvocations.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Flexjobs&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.flexjobs.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Upwork&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.upwork.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Fiver&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.fiverr.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Industries / Sectors / Roles&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Hospitality sector&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Hotels&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cruise ships&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Freelance &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Entrepreneurship&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Digital Nomad&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Volunteering&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Remote Help Desk&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Staying connected:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Local groups &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Worker communities&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Internations.org&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.internations.org/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Expat.com&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.expat.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Training:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Scholarships and online programs&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Local training events (prices may be cheaper) &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Consider reskilling / upskilling&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Online training platforms/free resources&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Other useful resources/tips:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Learn the language….or, use a translator tool like…&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Google Translate&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://translate.google.com/ (*App for phone also available and is more useful)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Lonely Planet Language books are also useful and come in pocket size versions&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Time and Date - World Clock Meeting Planner (*This tool is invaluable when living and working abroad)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;ohttps://www.timeanddate.com/worldclock/meeting.html&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Xe Currency Converter&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.xe.com/currencyconverter/ (*App for phone also available and is more useful)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Virtual Private Network (VPN)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	WhatsApp / Viber / Vonage / Skype&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Dual SIM phone&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Microsoft Teams / Google Workspace&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;•	Travel around the country/region to learn and experience new things&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="28066377" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/05327dc8-cd8a-4273-bbde-58b785c3b91f/stream.mp3"/>
                
                <guid isPermaLink="false">a26bab82-6cb9-4f97-994d-d1275d5268a9</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/05327dc8-cd8a-4273-bbde-58b785c3b91f</link>
                <pubDate>Wed, 07 Feb 2024 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/1/1/18/60998516-4fef-4538-8e40-9decb80d46ce_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1754</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 29 - Building a Security Culture with Tariq Azmi</itunes:title>
                <title>Cyber Life Podcast Ep. 29 - Building a Security Culture with Tariq Azmi</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, Tariq shares his tips for building an effective security culture and his career advice for aspiring cybersecurity professionals.</span></p><p><br></p><p><span>Tariq has been in the tech industry for almost 20 years, working in various roles like helpdesk tech, project manager, software QA, systems and network engineer, security and now he is a compliance officer focused primarily on CMMC and HIPAA compliance.</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>#cybersecurity #cybersecuritycareer </span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, Tariq shares his tips for building an effective security culture and his career advice for aspiring cybersecurity professionals.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Tariq has been in the tech industry for almost 20 years, working in various roles like helpdesk tech, project manager, software QA, systems and network engineer, security and now he is a compliance officer focused primarily on CMMC and HIPAA compliance.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#cybersecurity #cybersecuritycareer &lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="52616045" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/d2f8313b-eff3-4698-b109-d6b614605d2d/stream.mp3"/>
                
                <guid isPermaLink="false">b8f8bb7b-5f66-4b03-9a11-38f2417cb77b</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/d2f8313b-eff3-4698-b109-d6b614605d2d</link>
                <pubDate>Wed, 31 Jan 2024 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/1/1/17/c098b4ea-d13f-4aa5-8f60-87a01fb51780_t_episode_image_template__3000___3000_px___1_.jpg"/>
                <itunes:duration>3288</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 28 - Mobile Application Security with Nabeela Bukhari</itunes:title>
                <title>Cyber Life Podcast Ep. 28 - Mobile Application Security with Nabeela Bukhari</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, I speak with Nabeela Bukhari about mobile application security.  Be sure to check out the resources linked below.</span></p><p><br></p><p><span>Nabeela is a senior security engineer primarily focused on app security and mobile app security.  She holds a degree in Electronics Engineering and several certifications.  Nabeela is also a volunteer with BBWIC and helps mentor women in their cybersecurity careers around the world.</span></p><p><br></p><p><span>Resources shared on the podcast: </span></p><p><br></p><p><span>https://mas.owasp.org/MASTG/ - MSTG Guide </span></p><p><span>https://owasp.org/www-project-mobile-top-10/ - OWASP TOP 10 Mobile</span></p><p><span>https://github.com/MobSF/Mobile-Security-Framework-MobSF- MOBSF</span></p><p><br></p><p><span>Tools: </span></p><p><br></p><p><span>Frida- https://frida.re/ </span></p><p><span>Objection- https://github.com/sensepost/objection/wiki/components</span></p><p><span>Drozer- https://github.com/WithSecureLabs/drozer</span></p><p><span>JADX-Gui- https://github.com/skylot/jadx</span></p><p><br></p><p><span>Vulnerable Android apps for learning:</span></p><p><br></p><p><span>InjuredAndroid  </span></p><p><span>https://github.com/B3nac/InjuredAndroid</span></p><p><span>Walkthrough Video: https://www.youtube.com/watch?v=PMKnPaGWxtg</span></p><p><span>Google Play Link: https://play.google.com/store/apps/details?id=b3nac.injuredandroid</span></p><p><br></p><p><span>Android AppSec</span></p><p><span>CTF site: ctf.hpandro.raviramesh.info</span></p><p><span>Walkthrough Video:https://www.youtube.com/c/AndroidAppSec</span></p><p><span>Google Play Link: https://play.google.com/store/apps/details?id=com.hpandro.androidsecurity</span></p><p><br></p><p><span>Damn Vulnerable Bank</span></p><p><span>Link: https://github.com/rewanthtammana/Damn-Vulnerable-Bank</span></p><p><span>Walkthrough Video: https://rewanthtammana.com/damn-vulnerable-bank/</span></p><p><br></p><p><span>Insecure Shop</span></p><p><span>Link: https://github.com/optiv/InsecureShop/releases/download/v1.0/InsecureShop.apk</span></p><p><span>GitHub: https://github.com/optiv/InsecureShop</span></p><p><span>Walkthrough Video: https://docs.insecureshopapp.com/</span></p><p><br></p><p><span>AndroGoat  </span></p><p><span>Link: https://github.com/satishpatnayak/MyTest/blob/master/AndroGoat.apk</span></p><p><span>GitHub: https://github.com/satishpatnayak/AndroGoat</span></p><p><span>Walkthrough Video: https://medium.com/androgoat</span></p><p><br></p><p><span>Crackmes</span></p><p><span>Link: https://github.com/satishpatnayak/MyTest/blob/master/AndroGoat.apk</span></p><p><span>GitHub: https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/Android</span></p><p><span>Walkthrough: https://github.com/OWASP/owasp-mstg/tree/master/Crackmes</span></p><p><br></p><p><span>InsecureBank </span></p><p><span>Link: https://github.com/dineshshetty/Android-InsecureBankv2/raw/master/InsecureBankv2.apk</span></p><p><span>GitHub: https://github.com/dineshshetty/Android-InsecureBankv2</span></p><p><br></p><p><span>Oversecured Vulnerable Android App</span></p><p><span>GitHub: https://github.com/oversecured/ovaa</span></p><p><span>Blog: https://blog.oversecured.com/</span></p><p><br></p><p><span>DIVA Android</span></p><p><span>GitHub: https://github.com/payatu/diva-android</span></p><p><span>Walkthrough: http://www.payatu.com/damn-insecure-and-vulnerable-app/</span></p><p><br></p><p><span>MSTG Hacking Playground</span></p><p><span>GitHub links: https://github.com/OWASP/MSTG-Hacking-Playground </span></p><p><span>https://github.com/OWASP/MSTG-Hacking-Playground/tree/master/Android/MSTG-Android-Java-App</span></p><p><span>https://github.com/OWASP/MSTG-Hacking-Playground/tree/master/Android/MSTG-Android-Kotlin-App</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, I speak with Nabeela Bukhari about mobile application security.  Be sure to check out the resources linked below.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Nabeela is a senior security engineer primarily focused on app security and mobile app security.  She holds a degree in Electronics Engineering and several certifications.  Nabeela is also a volunteer with BBWIC and helps mentor women in their cybersecurity careers around the world.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Resources shared on the podcast: &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://mas.owasp.org/MASTG/ - MSTG Guide &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://owasp.org/www-project-mobile-top-10/ - OWASP TOP 10 Mobile&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://github.com/MobSF/Mobile-Security-Framework-MobSF- MOBSF&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Tools: &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Frida- https://frida.re/ &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Objection- https://github.com/sensepost/objection/wiki/components&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Drozer- https://github.com/WithSecureLabs/drozer&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;JADX-Gui- https://github.com/skylot/jadx&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Vulnerable Android apps for learning:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;InjuredAndroid  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://github.com/B3nac/InjuredAndroid&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Walkthrough Video: https://www.youtube.com/watch?v=PMKnPaGWxtg&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Google Play Link: https://play.google.com/store/apps/details?id=b3nac.injuredandroid&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Android AppSec&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;CTF site: ctf.hpandro.raviramesh.info&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Walkthrough Video:https://www.youtube.com/c/AndroidAppSec&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Google Play Link: https://play.google.com/store/apps/details?id=com.hpandro.androidsecurity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Damn Vulnerable Bank&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Link: https://github.com/rewanthtammana/Damn-Vulnerable-Bank&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Walkthrough Video: https://rewanthtammana.com/damn-vulnerable-bank/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Insecure Shop&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Link: https://github.com/optiv/InsecureShop/releases/download/v1.0/InsecureShop.apk&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;GitHub: https://github.com/optiv/InsecureShop&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Walkthrough Video: https://docs.insecureshopapp.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;AndroGoat  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Link: https://github.com/satishpatnayak/MyTest/blob/master/AndroGoat.apk&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;GitHub: https://github.com/satishpatnayak/AndroGoat&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Walkthrough Video: https://medium.com/androgoat&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Crackmes&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Link: https://github.com/satishpatnayak/MyTest/blob/master/AndroGoat.apk&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;GitHub: https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/Android&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Walkthrough: https://github.com/OWASP/owasp-mstg/tree/master/Crackmes&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;InsecureBank &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Link: https://github.com/dineshshetty/Android-InsecureBankv2/raw/master/InsecureBankv2.apk&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;GitHub: https://github.com/dineshshetty/Android-InsecureBankv2&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Oversecured Vulnerable Android App&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;GitHub: https://github.com/oversecured/ovaa&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Blog: https://blog.oversecured.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;DIVA Android&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;GitHub: https://github.com/payatu/diva-android&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Walkthrough: http://www.payatu.com/damn-insecure-and-vulnerable-app/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;MSTG Hacking Playground&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;GitHub links: https://github.com/OWASP/MSTG-Hacking-Playground &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://github.com/OWASP/MSTG-Hacking-Playground/tree/master/Android/MSTG-Android-Java-App&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://github.com/OWASP/MSTG-Hacking-Playground/tree/master/Android/MSTG-Android-Kotlin-App&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="24951745" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/cac87970-3754-4ad1-a552-96bc44f34edf/stream.mp3"/>
                
                <guid isPermaLink="false">d3370482-ba1c-4ff0-97e6-ff62f792f5b3</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/cac87970-3754-4ad1-a552-96bc44f34edf</link>
                <pubDate>Wed, 24 Jan 2024 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/1/1/17/23f46803-085c-4eb5-95bd-ee2b3722d570_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1559</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 27 - AI in Cybersecurity and Cloud Security with Pawel Lakomski</itunes:title>
                <title>Cyber Life Podcast Ep. 27 - AI in Cybersecurity and Cloud Security with Pawel Lakomski</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Paweł Łakomski is an experienced IT professional with focus on IT security, cloud services and virtualization. Currently he is working for Microsoft where his responsibilities include Azure security and compliance.  Paweł lives in Warsaw, Poland.  In this episode, he shares his thoughts on using generative AI in cybersecurity and specifically in cloud security and SOCs.</span></p><p><br></p><p><span>Here are the resources he shares in this episode:</span></p><p><span>Microsoft Security Copilot: https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot</span></p><p><span>Responsible AI principles: https://www.microsoft.com/en-gb/ai/responsible-ai</span></p><p><span>Microsoft AI-powered solutions: https://www.microsoft.com/en-gb/ai</span></p><p><br></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Paweł Łakomski is an experienced IT professional with focus on IT security, cloud services and virtualization. Currently he is working for Microsoft where his responsibilities include Azure security and compliance.  Paweł lives in Warsaw, Poland.  In this episode, he shares his thoughts on using generative AI in cybersecurity and specifically in cloud security and SOCs.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Here are the resources he shares in this episode:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Microsoft Security Copilot: https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Responsible AI principles: https://www.microsoft.com/en-gb/ai/responsible-ai&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Microsoft AI-powered solutions: https://www.microsoft.com/en-gb/ai&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="21081443" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/fa9bd751-497b-416a-976c-42e938b87f30/stream.mp3"/>
                
                <guid isPermaLink="false">01b7d523-bbba-4a5b-ac74-c1f9e1f29795</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/fa9bd751-497b-416a-976c-42e938b87f30</link>
                <pubDate>Wed, 17 Jan 2024 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/1/1/16/988b0057-06d6-425e-98f8-376d2fd313e6_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1317</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 26 - Critical Infrastructure Cybersecurity with Chip Harris</itunes:title>
                <title>Cyber Life Podcast Ep. 26 - Critical Infrastructure Cybersecurity with Chip Harris</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Chip is a senior level penetration tester that has over 20 years of experience in the cybersecurity world.  Chip has done a lot of work for government agencies and has authored university textbooks.</span></p><p><br></p><p><span>He&#39;s written content for the University of Arizona cybersecurity Master&#39;s degree program and has decades of experience in the critical infrastructure space.</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>#cybersecurity #ethicalhacking </span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Chip is a senior level penetration tester that has over 20 years of experience in the cybersecurity world.  Chip has done a lot of work for government agencies and has authored university textbooks.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;He&amp;#39;s written content for the University of Arizona cybersecurity Master&amp;#39;s degree program and has decades of experience in the critical infrastructure space.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#cybersecurity #ethicalhacking &lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="40938684" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4154681d-fcbf-4ed2-af24-d3c6b4928b3c/stream.mp3"/>
                
                <guid isPermaLink="false">fde2eb52-1df1-4a5b-a125-44f0d2bffe46</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/4154681d-fcbf-4ed2-af24-d3c6b4928b3c</link>
                <pubDate>Wed, 10 Jan 2024 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/1/1/15/706a81e5-d144-4bb3-83b3-db2f0442bde9_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>2558</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 25 - EQ and Executive Presence with Andrew Wilder</itunes:title>
                <title>Cyber Life Podcast Ep. 25 - EQ and Executive Presence with Andrew Wilder</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Andrew Wilder is an award-winning CISO who is in the C|CISO Top 50 Hall of Fame. </span></p><p><span>Here are the books mentioned in this episode, along with a few other suggested readings.</span></p><p><br></p><p><span>Cybersecurity First Principles by Rick Howard</span></p><p><span>https://www.amazon.com/Cybersecurity-First-Principles-Strategy-Tactics/dp/1394173083</span></p><p><br></p><p><span>IT Works (The Famous Little Red Book) by RHJ</span></p><p><span>https://www.amazon.com/Works-Famous-Little-Makes-Dreams/dp/0875163238</span></p><p><br></p><p><span>The Magic of Believing by Claude M. Bristol</span></p><p><span>https://www.amazon.com/Magic-Believing-Claude-M-Bristol/dp/0671745212</span></p><p><br></p><p><span>The Five Lessons by Neville Goddard</span></p><p><span>https://www.amazon.com/Five-Lessons-Neville-Goddard/dp/1603865357</span></p><p><br></p><p><span>The Lazy Man&#39;s Way to Riches by Joe Karbo (1st Edition)</span></p><p><span>https://www.amazon.com/Lazy-Mans-Way-Riches-Everything/dp/1884337015</span></p><p><br></p><p><span>So You Want to be a CISO by Sue Bergamo</span></p><p><span>https://www.amazon.com/want-Chief-Information-Security-Officer-ebook/dp/B0CP8HSCKT</span></p><p><br></p><p><span>The Leadership Forge: 50 fire-tested insights by Joe Scherrer</span></p><p><span>https://www.amazon.com/Leadership-Forge-Fire-Tested-Insights-Toughest/dp/0990489612</span></p><p><br></p><p><span>A Data-Driven Computer Defense by Roger A. Grimes</span></p><p><span>https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847</span></p><p><br></p><p><span>The Great Reboot by Bob Zukis</span></p><p><span>https://www.amazon.com/Great-Reboot-Succeeding-Complex-Systemic/dp/173504301X</span></p><p><span> </span></p><p><span>Washington University Executive Cybersecurity Certificate Program</span></p><p><span>https://tlcenter.wustl.edu/executive-cybersecurity-certificate</span></p><p><br></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span> </span></p><p><span> </span></p><p><span>#cybersecurity #ciso #leadershipdevelopment #leadership #executivecoaching </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Andrew Wilder is an award-winning CISO who is in the C|CISO Top 50 Hall of Fame. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Here are the books mentioned in this episode, along with a few other suggested readings.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cybersecurity First Principles by Rick Howard&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Cybersecurity-First-Principles-Strategy-Tactics/dp/1394173083&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;IT Works (The Famous Little Red Book) by RHJ&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Works-Famous-Little-Makes-Dreams/dp/0875163238&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The Magic of Believing by Claude M. Bristol&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Magic-Believing-Claude-M-Bristol/dp/0671745212&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The Five Lessons by Neville Goddard&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Five-Lessons-Neville-Goddard/dp/1603865357&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The Lazy Man&amp;#39;s Way to Riches by Joe Karbo (1st Edition)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Lazy-Mans-Way-Riches-Everything/dp/1884337015&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;So You Want to be a CISO by Sue Bergamo&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/want-Chief-Information-Security-Officer-ebook/dp/B0CP8HSCKT&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The Leadership Forge: 50 fire-tested insights by Joe Scherrer&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Leadership-Forge-Fire-Tested-Insights-Toughest/dp/0990489612&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;A Data-Driven Computer Defense by Roger A. Grimes&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The Great Reboot by Bob Zukis&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.amazon.com/Great-Reboot-Succeeding-Complex-Systemic/dp/173504301X&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Washington University Executive Cybersecurity Certificate Program&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://tlcenter.wustl.edu/executive-cybersecurity-certificate&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#cybersecurity #ciso #leadershipdevelopment #leadership #executivecoaching &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="28807418" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/c01d0304-68a5-4b00-a624-3487c82674f1/stream.mp3"/>
                
                <guid isPermaLink="false">9fba75b2-e811-44b2-9fa5-4dd8c6c6d25e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/c01d0304-68a5-4b00-a624-3487c82674f1</link>
                <pubDate>Wed, 03 Jan 2024 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2024/1/1/14/364c3933-0471-4f0e-9416-8d82c629eb70_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1800</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 24 - Digital Forensics with Khushi Gupta</itunes:title>
                <title>Cyber Life Podcast Ep. 24 - Digital Forensics with Khushi Gupta</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, Khushi Gupta shares her experience pursuing a PhD in Digital Forensics and her experience in being an International student.  Khushi will share what skills she thinks you need to be successful in a digital forensic career.</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>#cybersecurity #digitalforensics </span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, Khushi Gupta shares her experience pursuing a PhD in Digital Forensics and her experience in being an International student.  Khushi will share what skills she thinks you need to be successful in a digital forensic career.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#cybersecurity #digitalforensics &lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="14489809" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/19170968-7f32-4f64-99b9-a79d82a0034a/stream.mp3"/>
                
                <guid isPermaLink="false">21ec47b1-6aaa-474a-a95d-25805b8fb37c</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/19170968-7f32-4f64-99b9-a79d82a0034a</link>
                <pubDate>Wed, 27 Dec 2023 15:17:32 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/12/27/15/c111ebe4-aefa-4d9b-aba3-8328a8a884b3_t_episode_image_template__3000___3000_px___1_.jpg"/>
                <itunes:duration>905</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 23 - F.U.D. in Cybersecurity with Mari, Teri, Ben, Charles, and Omar</itunes:title>
                <title>Cyber Life Podcast Ep. 23 - F.U.D. in Cybersecurity with Mari, Teri, Ben, Charles, and Omar</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, we talk about Fear, Uncertainty, and Doubt (FUD) in cybersecurity sales.  Hear about crazy claims from cybersecurity vendors and how you should be approaching CISO&#39;s and other decision makers.</span></p><p><br></p><p><span>This episode is a must listen for anyone in cybersecurity sales.</span></p><p><br></p><p><span>Joining me are special guests Teri Green, Mari Galloway, Charles Payne, Benjamin Corll, and, Omar Sangurima.</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, we talk about Fear, Uncertainty, and Doubt (FUD) in cybersecurity sales.  Hear about crazy claims from cybersecurity vendors and how you should be approaching CISO&amp;#39;s and other decision makers.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;This episode is a must listen for anyone in cybersecurity sales.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Joining me are special guests Teri Green, Mari Galloway, Charles Payne, Benjamin Corll, and, Omar Sangurima.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="35830804" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a9c76235-ccba-4fa8-866d-cd4d3e1e0831/stream.mp3"/>
                
                <guid isPermaLink="false">366345ba-ad9d-4e84-b96d-516acb96fc1b</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/a9c76235-ccba-4fa8-866d-cd4d3e1e0831</link>
                <pubDate>Thu, 21 Dec 2023 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/12/17/17/82dd725d-a4ba-4f14-910b-33c8a0610048_3000x3000_thumbnail.jpg"/>
                <itunes:duration>2239</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 22 - Starting Your Own Business with Kenneth Ellington</itunes:title>
                <title>Cyber Life Podcast Ep. 22 - Starting Your Own Business with Kenneth Ellington</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, Kenneth Ellington talks about starting his own cybersecurity training company, while balancing a busy corporate job.</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><br></p><p><span>Get better at job interviews and build your confidence with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>#cybersecurity #cybersecuritycareer #cybersecurityanalyst #cybersecurityeducation #cybersecurityengineer </span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, Kenneth Ellington talks about starting his own cybersecurity training company, while balancing a busy corporate job.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get better at job interviews and build your confidence with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#cybersecurity #cybersecuritycareer #cybersecurityanalyst #cybersecurityeducation #cybersecurityengineer &lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="22716081" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/1f2b7ef5-443a-4aac-90d4-7b115202c9b4/stream.mp3"/>
                
                <guid isPermaLink="false">9222dc43-4bbd-4e2a-9474-3ded8832acc4</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/1f2b7ef5-443a-4aac-90d4-7b115202c9b4</link>
                <pubDate>Wed, 20 Dec 2023 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/12/17/17/fef27612-d0cf-439a-be7e-3a6f86b1188f_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1419</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep. 21 - Technical Writing and Project Management Careers with Yash Gorasiya</itunes:title>
                <title>Cyber Life Podcast Ep. 21 - Technical Writing and Project Management Careers with Yash Gorasiya</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Technical writing and project management are two great career paths to get your first job at a cybersecurity product or service-based company.  </span></p><p><br></p><p><span>In this episode, Yash shares his experience and advice on both of these career paths.</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Technical writing and project management are two great career paths to get your first job at a cybersecurity product or service-based company.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In this episode, Yash shares his experience and advice on both of these career paths.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="21990086" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/25279f05-4b6a-49c3-b827-14fbe7e853cd/stream.mp3"/>
                
                <guid isPermaLink="false">5fa90bbe-ee36-4f0a-935a-a668d2856a3e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/25279f05-4b6a-49c3-b827-14fbe7e853cd</link>
                <pubDate>Wed, 13 Dec 2023 14:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/12/12/23/5177fa00-bd41-4e22-9e08-e3a71f4189ea_t_episode_image_template__3000___3000_px___1_.jpg"/>
                <itunes:duration>1374</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.20 - From IT Support to Cybersecurity Ssozi Malik&#39;s Inspiring Journey</itunes:title>
                <title>Cyber Life Podcast Ep.20 - From IT Support to Cybersecurity Ssozi Malik&#39;s Inspiring Journey</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Ask me a Question Here: https://topmate.io/ken_underhill  </span></p><p><span>Welcome to this episode, where we have the privilege of hosting Ssozi Malik, joining us all the way from Uganda.  Ssozi has a remarkable background in IT support and is currently on the path to becoming a cybersecurity professional while completing his degree in Information Technology.</span></p><p><br></p><p><span>Ssozi shares his inspiring journey into the world of cybersecurity, including:</span></p><p><br></p><p><span>- Ssozi discusses what motivated him to transition from IT support roles to pursue a career in cybersecurity.  </span></p><p><br></p><p><span>- Learn how Ssozi&#39;s experiences in IT support roles provided a strong foundation for his cybersecurity career and how these skills were transferable.</span></p><p><br></p><p><span>- Learn about Ssozi&#39;s cybersecurity internships and how they not only solidified his interest in the field but also equipped him with valuable skills crucial for success.</span></p><p><br></p><p><span>...and more!</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Welcome to this episode, where we have the privilege of hosting Ssozi Malik, joining us all the way from Uganda.  Ssozi has a remarkable background in IT support and is currently on the path to becoming a cybersecurity professional while completing his degree in Information Technology.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ssozi shares his inspiring journey into the world of cybersecurity, including:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Ssozi discusses what motivated him to transition from IT support roles to pursue a career in cybersecurity.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Learn how Ssozi&amp;#39;s experiences in IT support roles provided a strong foundation for his cybersecurity career and how these skills were transferable.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Learn about Ssozi&amp;#39;s cybersecurity internships and how they not only solidified his interest in the field but also equipped him with valuable skills crucial for success.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;...and more!&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="19254125" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/809ebfbf-2776-4059-9718-0cc64fc86ea9/stream.mp3"/>
                
                <guid isPermaLink="false">f8bc29eb-8ddb-4ba8-8929-827dcc93362a</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/809ebfbf-2776-4059-9718-0cc64fc86ea9</link>
                <pubDate>Fri, 08 Dec 2023 13:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/12/4/18/a854f087-696e-4f66-b2b7-bb85df72fbbb_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1203</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.19 - Unveiling the Power of Cybersecurity Risk Management with Shawn Robinson</itunes:title>
                <title>Cyber Life Podcast Ep.19 - Unveiling the Power of Cybersecurity Risk Management with Shawn Robinson</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Ask me a Question Here: https://topmate.io/ken_underhill  </span></p><p><span>In this episode, I had the privilege of hosting Shawn Robinson, a distinguished Cybersecurity Risk Management Program Manager with over three decades of experience in the telecommunications, network, and security technology fields, with a strong focus on the financial services industry. </span></p><p><br></p><p><span>Shawn is also a US Army veteran, President of the Charlotte Metro ISC2 Chapter, and holds numerous industry certifications, including the Certified Information Systems Security Professional (CISSP) certification.</span></p><p><br></p><p><span>Join us as Shawn dives into the critical world of cybersecurity risk management and governance.</span></p><p><br></p><p><span>In this episode, Shawn explores:</span></p><p><br></p><p><span>- How risk management and governance play a pivotal role in establishing a robust security foundation for organizations, enabling them to effectively tackle emerging threats.</span></p><p><br></p><p><span>- Insights into the upcoming NIST Cybersecurity Framework and recent SEC rules, highlighting the significant changes and implications they bring for businesses.  Learn Shawn&#39;s advice for how security leaders can navigate these new waters.</span></p><p><br></p><p><span>- Find out how security leaders can bridge the gap between technical cybersecurity and the strategic decisions essential at the executive level, aligning security with business goals.</span></p><p><br></p><p><span>...and much more.</span></p><p><br></p><p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In this episode, I had the privilege of hosting Shawn Robinson, a distinguished Cybersecurity Risk Management Program Manager with over three decades of experience in the telecommunications, network, and security technology fields, with a strong focus on the financial services industry. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Shawn is also a US Army veteran, President of the Charlotte Metro ISC2 Chapter, and holds numerous industry certifications, including the Certified Information Systems Security Professional (CISSP) certification.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Join us as Shawn dives into the critical world of cybersecurity risk management and governance.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In this episode, Shawn explores:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- How risk management and governance play a pivotal role in establishing a robust security foundation for organizations, enabling them to effectively tackle emerging threats.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Insights into the upcoming NIST Cybersecurity Framework and recent SEC rules, highlighting the significant changes and implications they bring for businesses.  Learn Shawn&amp;#39;s advice for how security leaders can navigate these new waters.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Find out how security leaders can bridge the gap between technical cybersecurity and the strategic decisions essential at the executive level, aligning security with business goals.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;...and much more.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="22348277" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4cf54f21-05db-43eb-92b8-9703105f94a0/stream.mp3"/>
                
                <guid isPermaLink="false">2b3122db-0c01-4dc6-9a54-dbec7891a3fb</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/4cf54f21-05db-43eb-92b8-9703105f94a0</link>
                <pubDate>Thu, 07 Dec 2023 13:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/12/4/18/3fd255ca-2712-4b92-a8eb-66ff2b64b283_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1396</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.18 - Cyberpsychology and Its Impact on Cybersecurity with Andrew Shpilkin</itunes:title>
                <title>Cyber Life Podcast Ep.18 - Cyberpsychology and Its Impact on Cybersecurity with Andrew Shpilkin</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Ask me a Question Here: https://topmate.io/ken_underhill   </span></p><p><span>In today&#39;s episode, we have a special guest, Andrew Shpilkin, a rising star in the world of cybersecurity. </span></p><p><br></p><p><span>Despite his relatively short journey in the field, Andrew brings a unique perspective as a security awareness intern at the University of Ottawa, focusing on cyberpsychology research and penetration testing.</span></p><p><br></p><p><span>In this episode, we dive deep into the fascinating realm of cyberpsychology and its connection to cybersecurity, particularly user behavior. </span></p><p><br></p><p><span>Andrew sheds light on these areas:</span></p><p><br></p><p><span>- What cyberpsychology is and how it relates to cybersecurity. </span></p><p><span>- How cyberpsychology can be used in security awareness training.</span></p><p><span>- Cyberpsychology and &#34;Layer 8&#34; of the OSI model.</span></p><p><span> </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Ask me a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In today&amp;#39;s episode, we have a special guest, Andrew Shpilkin, a rising star in the world of cybersecurity. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Despite his relatively short journey in the field, Andrew brings a unique perspective as a security awareness intern at the University of Ottawa, focusing on cyberpsychology research and penetration testing.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In this episode, we dive deep into the fascinating realm of cyberpsychology and its connection to cybersecurity, particularly user behavior. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Andrew sheds light on these areas:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- What cyberpsychology is and how it relates to cybersecurity. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- How cyberpsychology can be used in security awareness training.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Cyberpsychology and &amp;#34;Layer 8&amp;#34; of the OSI model.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="11593769" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/6c308b0c-5722-4d51-8718-0e84cd534e00/stream.mp3"/>
                
                <guid isPermaLink="false">c9fa8154-7ef0-4048-96e7-d6359a579bbe</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/6c308b0c-5722-4d51-8718-0e84cd534e00</link>
                <pubDate>Wed, 06 Dec 2023 13:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/12/4/18/ede4f5c3-c53b-46bf-8719-b20abeeedff9_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>724</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.17 - Jiu Jitsu and Cyber Security with Yesenia Yser</itunes:title>
                <title>Cyber Life Podcast Ep.17 - Jiu Jitsu and Cyber Security with Yesenia Yser</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>Support this podcast at — https://redcircle.com/cyber-life/donations</p><p>Ask a Question Here: https://topmate.io/ken_underhill   </p><p><br></p><p>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  </p><p>https://cyberken23.gumroad.com/l/jbilol/youtube20 </p><p><br></p><p>In this episode, Yesenia shares her wisdom about cybersecurity, how open-source projects can help your career, and how cybersecurity and Brazilian Jiu-Jitsu are similar. 🥋</p><p><br></p><p> If you like these types of episodes where we interview experienced cybersecurity professionals, let us know in the comments.</p><p><br></p><p> </p><p>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </p><p><br></p><p><br></p><p>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </p><p><br></p><p><br></p><p>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </p><p>https://www.stationx.net/cyberlife </p><p><br></p><p><br></p><p>#Cybersecurity #OpenSource #BrazilianJiuJitsu #DigitalCommunity #learnandgrow </p>]]></description>
                <content:encoded>&lt;p&gt;Support this podcast at — https://redcircle.com/cyber-life/donations&lt;/p&gt;&lt;p&gt;Ask a Question Here: https://topmate.io/ken_underhill   &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  &lt;/p&gt;&lt;p&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, Yesenia shares her wisdom about cybersecurity, how open-source projects can help your career, and how cybersecurity and Brazilian Jiu-Jitsu are similar. 🥋&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt; If you like these types of episodes where we interview experienced cybersecurity professionals, let us know in the comments.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/p&gt;&lt;p&gt;https://www.stationx.net/cyberlife &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;#Cybersecurity #OpenSource #BrazilianJiuJitsu #DigitalCommunity #learnandgrow &lt;/p&gt;</content:encoded>
                
                <enclosure length="34374635" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/acbac161-c192-45c8-b10b-4da33a9699f3/stream.mp3"/>
                
                <guid isPermaLink="false">0f148b24-5c94-4cda-8ba4-df73f6e0bd31</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/acbac161-c192-45c8-b10b-4da33a9699f3</link>
                <pubDate>Wed, 29 Nov 2023 12:56:42 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/11/29/12/1a644829-7317-4370-8113-7c245275ed9d__dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>2148</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.16 - Archaeology and Cyber Security with Indiana Jones (Dr. Mike Brass)</itunes:title>
                <title>Cyber Life Podcast Ep.16 - Archaeology and Cyber Security with Indiana Jones (Dr. Mike Brass)</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, Dr. Mike Brass shares insight into how archaeology and cyber security have similar principles.  </span></p><p><span>Enjoy the short clip from Indiana Jones and the Last Crusade at the start of this episode.  </span></p><p><span>You can watch the clip over on YouTube.</span></p><p>https://www.youtube.com/@CyberLifeTV</p><p><br></p><p><span>Ask a Question Here: https://topmate.io/ken_underhill  </span></p><p><span> </span></p><p><span>Build your job interview skills with this short course.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources below. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, Dr. Mike Brass shares insight into how archaeology and cyber security have similar principles.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Enjoy the short clip from Indiana Jones and the Last Crusade at the start of this episode.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;You can watch the clip over on YouTube.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;https://www.youtube.com/@CyberLifeTV&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask a Question Here: https://topmate.io/ken_underhill  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Build your job interview skills with this short course.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources below. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="23381472" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/54cfc48a-e59d-4e72-81b8-0134f3b89094/stream.mp3"/>
                
                <guid isPermaLink="false">fecd4fe4-782d-4c71-b985-0e7fee8cc4f7</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/54cfc48a-e59d-4e72-81b8-0134f3b89094</link>
                <pubDate>Thu, 16 Nov 2023 13:54:09 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/11/16/13/7cb723d4-934d-47ac-a8b0-95c4061921f8_t_episode_image_template__3000___3000_px___1_.jpg"/>
                <itunes:duration>1461</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.15 - Building the Cyber Security Talent Pipeline with Chris Foulon, CISSP</itunes:title>
                <title>Cyber Life Podcast Ep.15 - Building the Cyber Security Talent Pipeline with Chris Foulon, CISSP</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, Chris Foulon shares his insight into how organizations can build cyber security 🔐 talent pipelines to fill their skill gaps. </span></p><p><br></p><p><span>Connect with Chris:</span></p><p><span>https://cpf-coaching.com/</span></p><p><span>https://www.linkedin.com/in/christophefoulon</span></p><p><br></p><p><span>Chris holds multiple industry certifications, like CISSP.  He&#39;s a dedicated security practitioner who&#39;s passionate about helping businesses tackle their cybersecurity risks while minimizing friction, resulting in increased resiliency. Chris also focuses on securing people and processes, all with a solid understanding of the technology involved.</span></p><p><br></p><p><span>Chris is also the brains behind CPF-coaching.com, where he helps cybersecurity professionals enhance their leadership skills. He&#39;s an International best-selling author of &#34;Hack the Cybersecurity Interview&#34;, a podcast host of Breaking into Cybersecurity, and a dedicated volunteer with organizations such as InfraGard, Security Tinkerers, the Whole Cyber Human Initiative, and Boots2Books.</span></p><p><br></p><p><span>Chris answers questions like these:</span></p><p><span> - How can organizations build a strong cybersecurity talent pipeline?</span></p><p><br></p><p><span>- What creative ways can organizations explore to bridge the cybersecurity talent gap?</span></p><p><br></p><p><span>- How can collaboration 🤝 between academia, industry, and professional organizations contribute to a more skilled and versatile cybersecurity workforce?</span></p><p><br></p><p><span>- How do organizations nurture existing cybersecurity professionals to help them grow 🚀 their careers?</span></p><p><br></p><p><br></p><p><span>Don&#39;t forget to hit that like button, subscribe to the channel for more insightful cyber security content, and ring the notification bell so you never miss an episode. </span></p><p><br></p><p><span>Ask a Question Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p><p><span>#cybersecurity  #SecurityLeadership #infosec  #collaboration  #careergrowth  #CultureBuilding</span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, Chris Foulon shares his insight into how organizations can build cyber security 🔐 talent pipelines to fill their skill gaps. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Connect with Chris:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cpf-coaching.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.linkedin.com/in/christophefoulon&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Chris holds multiple industry certifications, like CISSP.  He&amp;#39;s a dedicated security practitioner who&amp;#39;s passionate about helping businesses tackle their cybersecurity risks while minimizing friction, resulting in increased resiliency. Chris also focuses on securing people and processes, all with a solid understanding of the technology involved.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Chris is also the brains behind CPF-coaching.com, where he helps cybersecurity professionals enhance their leadership skills. He&amp;#39;s an International best-selling author of &amp;#34;Hack the Cybersecurity Interview&amp;#34;, a podcast host of Breaking into Cybersecurity, and a dedicated volunteer with organizations such as InfraGard, Security Tinkerers, the Whole Cyber Human Initiative, and Boots2Books.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Chris answers questions like these:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; - How can organizations build a strong cybersecurity talent pipeline?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- What creative ways can organizations explore to bridge the cybersecurity talent gap?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- How can collaboration 🤝 between academia, industry, and professional organizations contribute to a more skilled and versatile cybersecurity workforce?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- How do organizations nurture existing cybersecurity professionals to help them grow 🚀 their careers?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Don&amp;#39;t forget to hit that like button, subscribe to the channel for more insightful cyber security content, and ring the notification bell so you never miss an episode. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask a Question Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#cybersecurity  #SecurityLeadership #infosec  #collaboration  #careergrowth  #CultureBuilding&lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="18947761" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/74cef7e9-6638-4c2b-878f-10e8ea6b2a0f/stream.mp3"/>
                
                <guid isPermaLink="false">eaa53b3d-935c-42d1-8e26-7292865e19c1</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/74cef7e9-6638-4c2b-878f-10e8ea6b2a0f</link>
                <pubDate>Wed, 15 Nov 2023 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/11/14/14/dd91b7f2-19f7-4cdd-9ca6-78a134ef0976_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1184</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.14 - Traveling the World in Cyber Security with Hugh Shepherd</itunes:title>
                <title>Cyber Life Podcast Ep.14 - Traveling the World in Cyber Security with Hugh Shepherd</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Get Help Here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Hugh Shepherd has been living abroad for several years and shares how you too can build the travel lifestyle in your cybersecurity career.</span></p><p><br></p><p><span>Hugh will share:</span></p><p><br></p><p><span>1️⃣ Unique advantages of living abroad for tech professionals.</span></p><p><span>2️⃣ Balancing the demands of a tech career with the challenges and opportunities of expat life.</span></p><p><span>3️⃣ Staying updated on industry trends and developments, even when far from tech hubs.</span></p><p><span>4️⃣ Inspiring success stories from individuals who&#39;ve leveraged living abroad to supercharge their tech careers.</span></p><p><span>5️⃣ Navigating cultural differences and communication challenges when working with international colleagues or clients.</span></p><p><span>6️⃣ Overcoming legal and logistical hurdles while living abroad, with valuable recommendations.</span></p><p><span>7️⃣ The competitive cybersecurity job market and strategies to petition for a remote position that allows you to live your dream abroad.</span></p><p><span>8️⃣ How personal and professional goals evolve as you embrace life in a foreign land.</span></p><p><br></p><p><span>And be sure to tune into a future episode where Hugh shares some of his favorite resources to help you get started living abroad.</span></p><p><br></p><p><span>Get Help Here: https://topmate.io/ken_underhill   </span></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>#travel #livingabroad #cybersecurity #cybersecuritycareer </span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Get Help Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Hugh Shepherd has been living abroad for several years and shares how you too can build the travel lifestyle in your cybersecurity career.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Hugh will share:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;1️⃣ Unique advantages of living abroad for tech professionals.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;2️⃣ Balancing the demands of a tech career with the challenges and opportunities of expat life.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;3️⃣ Staying updated on industry trends and developments, even when far from tech hubs.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;4️⃣ Inspiring success stories from individuals who&amp;#39;ve leveraged living abroad to supercharge their tech careers.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;5️⃣ Navigating cultural differences and communication challenges when working with international colleagues or clients.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;6️⃣ Overcoming legal and logistical hurdles while living abroad, with valuable recommendations.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;7️⃣ The competitive cybersecurity job market and strategies to petition for a remote position that allows you to live your dream abroad.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;8️⃣ How personal and professional goals evolve as you embrace life in a foreign land.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;And be sure to tune into a future episode where Hugh shares some of his favorite resources to help you get started living abroad.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Help Here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#travel #livingabroad #cybersecurity #cybersecuritycareer &lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="34528444" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/c073e1de-905d-4d13-9884-fae68e0afae5/stream.mp3"/>
                
                <guid isPermaLink="false">3ba6c004-6fd0-49e5-9000-a2a0d7a2dbac</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/c073e1de-905d-4d13-9884-fae68e0afae5</link>
                <pubDate>Wed, 08 Nov 2023 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/11/6/21/78443cff-0091-4da9-bbba-2c51e9b40629_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>2158</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.13 - The Human Layer in Cyber Security with Becky Gaylord</itunes:title>
                <title>Cyber Life Podcast Ep.13 - The Human Layer in Cyber Security with Becky Gaylord</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode, Becky Gaylord talks about the &#34;human layer&#34; of cybersecurity—a realm often underestimated but important to protecting your digital world.</p><p><br></p><p>💡 Here&#39;s what you can expect to learn:</p><p><br></p><p>Understand what the &#34;human layer&#34; of cybersecurity is and why addressing it is paramount in today&#39;s digital landscape.</p><p><br></p><p>Discover simple and effective ways to boost cybersecurity awareness, both personally and within organizations.</p><p><br></p><p>Find out how cybersecurity professionals can skillfully communicate the importance of security to non-technical stakeholders, ensuring everyone is on the same page.</p><p><br></p><p>...and much more!</p><p><br></p><p>Becky is a trusted advisor and collaborative leader with global experience and 20+ years in Information Security. A former investigative and financial reporter for The New York Times and Dow Jones, she has worked across domains and holds certifications that include CISSP, CRISC, CISM and CIPP/US.</p><p><span>Learn more at www.beckygaylord.com</span></p><p>Ask me a question here: https://topmate.io/ken_underhill</p><p><br></p><p>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.</p><p><br></p><p>https://cyberken23.gumroad.com/l/jbilol/youtube20</p><p><br></p><p><br></p><p>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153</p><p><br></p><p><br></p><p>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.</p><p><br></p><p><br></p><p>Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd</p><p><br></p><p><br></p><p>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.</p><p>https://www.stationx.net/cyberlife</p><p><br></p><p>#cybersecurity #StaySafeOnline #digitalsecurity</p><p>#securityawareness #socialengineering #phishingattacks #insiderthreats #employeetraining #securityculture #securitychallenges</p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;In this episode, Becky Gaylord talks about the &amp;#34;human layer&amp;#34; of cybersecurity—a realm often underestimated but important to protecting your digital world.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;💡 Here&amp;#39;s what you can expect to learn:&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Understand what the &amp;#34;human layer&amp;#34; of cybersecurity is and why addressing it is paramount in today&amp;#39;s digital landscape.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Discover simple and effective ways to boost cybersecurity awareness, both personally and within organizations.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Find out how cybersecurity professionals can skillfully communicate the importance of security to non-technical stakeholders, ensuring everyone is on the same page.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;...and much more!&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Becky is a trusted advisor and collaborative leader with global experience and 20&#43; years in Information Security. A former investigative and financial reporter for The New York Times and Dow Jones, she has worked across domains and holds certifications that include CISSP, CRISC, CISM and CIPP/US.&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn more at www.beckygaylord.com&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Ask me a question here: https://topmate.io/ken_underhill&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.&lt;/p&gt;&lt;p&gt;https://www.stationx.net/cyberlife&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;#cybersecurity #StaySafeOnline #digitalsecurity&lt;/p&gt;&lt;p&gt;#securityawareness #socialengineering #phishingattacks #insiderthreats #employeetraining #securityculture #securitychallenges&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="22125087" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/43efcd17-dedf-4d3f-b6c6-430a49044de2/stream.mp3"/>
                
                <guid isPermaLink="false">858515bc-bb88-486a-bab2-ed495de7b16b</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/43efcd17-dedf-4d3f-b6c6-430a49044de2</link>
                <pubDate>Wed, 01 Nov 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/10/31/20/3f968991-fca2-4e23-ba1e-8086332c8fb5__t_episode_image_template__3000___3000_px___1_.jpg"/>
                <itunes:duration>1382</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.12 - Cybersecurity in Mergers and Acquisitions with Shruti Kalsi</itunes:title>
                <title>Cyber Life Podcast Ep.12 - Cybersecurity in Mergers and Acquisitions with Shruti Kalsi</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>▬▬▬ Ask me a question about your cybersecurity career  ▬▬▬</span></p><p><span>Ask me a question here:  https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>▬▬▬ Episode Description  ▬▬▬</span></p><p><span>Join Shruti Kalsi and I in this episode, where we dive into the world of Mergers and Acquisitions (M&amp;A) and discover how cybersecurity plays a pivotal role, transforming the way organizations approach these complex business transactions.</span></p><p><br></p><p><span>Shruti has over 20 years of experience and has helped organizations save millions of dollars during M&amp;A transactions through her cybersecurity wisdom. </span></p><p><br></p><p><span>▬▬▬ Prepare for Your next Job Interview  ▬▬▬</span></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. </span></p><p><br></p><p><span>Limited time 20% discount because you support the YouTube channel. </span></p><p><br></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 </span></p><p><br></p><p><span>▬▬▬ Learn Cyber Security Skills  ▬▬▬</span></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links below for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills from Haiku</span></p><p><span>https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Learn GRC skills, Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><br></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p><p><span>#mergers #cybersecurity #cyber security</span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;▬▬▬ Ask me a question about your cybersecurity career  ▬▬▬&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a question here:  https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;▬▬▬ Episode Description  ▬▬▬&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Join Shruti Kalsi and I in this episode, where we dive into the world of Mergers and Acquisitions (M&amp;amp;A) and discover how cybersecurity plays a pivotal role, transforming the way organizations approach these complex business transactions.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Shruti has over 20 years of experience and has helped organizations save millions of dollars during M&amp;amp;A transactions through her cybersecurity wisdom. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;▬▬▬ Prepare for Your next Job Interview  ▬▬▬&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Limited time 20% discount because you support the YouTube channel. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;▬▬▬ Learn Cyber Security Skills  ▬▬▬&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links below for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills from Haiku&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn GRC skills, Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#mergers #cybersecurity #cyber security&lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="16490997" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/d4a5f6b0-18ca-4913-b186-26437dd4ce10/stream.mp3"/>
                
                <guid isPermaLink="false">7bfed153-148f-453f-a90b-83fecfa07732</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/d4a5f6b0-18ca-4913-b186-26437dd4ce10</link>
                <pubDate>Thu, 26 Oct 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/10/25/19/984c8de2-a8a1-433f-b00e-1d710fb3f6f4_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1030</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.11 - Identity &amp; Identity Security &amp; Zero Trust with Jeff Reich</itunes:title>
                <title>Cyber Life Podcast Ep.11 - Identity &amp; Identity Security &amp; Zero Trust with Jeff Reich</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, you will learn about Identity and Identity Security from Jeff Reich.</span></p><p><br></p><p><span>Jeff has has over 40 years of experience in what we now call cybersecurity.</span></p><p><span> </span></p><p><span>🌐 Jeff, currently serves as the Executive Director for the Identity Defined Security Alliance.</span></p><p><br></p><p><span>Learn more: https://www.idsalliance.org/ </span></p><p><br></p><p><span>Don&#39;t forget to like, share, and subscribe to help more people learn from cybersecurity experts like Jeff.</span></p><p><br></p><p><span>Want to meet Jeff in person?</span></p><p><br></p><p><span>He will be speaking at TRUSTECH 2023 on 28-30 Nov  Learn more at:</span></p><p><span>https://www.trustech-event.com/</span></p><p><br></p><p><br></p><p><span>🔑 Jeff answers questions for you like:</span></p><p><br></p><p><span>1️⃣ What exactly is identity in the context of cybersecurity, and why is it so crucial in today&#39;s digital age?</span></p><p><br></p><p><span>2️⃣ Discover the latest trends in identity security that you should be keeping an eye on to stay ahead of the game.</span></p><p><br></p><p><span>3️⃣ Jeff will unveil strategies for organizations to implement robust Identity and Access Management (IAM) systems, providing a shield against emerging threats.</span></p><p><br></p><p><span>4️⃣ Biometrics - the future or a potential pitfall?  Jeff will guide us through the advantages and disadvantages of relying on biometrics for identity verification.</span></p><p><br></p><p><span>5️⃣ Learn how organizations strike the delicate balance between identity security and protection against insider threats.</span></p><p><br></p><p><span>6️⃣ Dive into the world of Zero Trust strategy and explore how it seamlessly aligns with identity security best practices.</span></p><p><br></p><p><span>Ask me a question: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. Limited time 20% discount because you support the YouTube channel. </span></p><p><br></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p><p><br></p><p><span>#IdentitySecurity #Cybersecurity #DigitalIdentity #DataProtection #IdentityManagement #BlockchainSecurity #ZeroTrust #Biometrics #IAM #CloudSecurity #TechTrends</span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, you will learn about Identity and Identity Security from Jeff Reich.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Jeff has has over 40 years of experience in what we now call cybersecurity.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;🌐 Jeff, currently serves as the Executive Director for the Identity Defined Security Alliance.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn more: https://www.idsalliance.org/ &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Don&amp;#39;t forget to like, share, and subscribe to help more people learn from cybersecurity experts like Jeff.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Want to meet Jeff in person?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;He will be speaking at TRUSTECH 2023 on 28-30 Nov  Learn more at:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.trustech-event.com/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;🔑 Jeff answers questions for you like:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;1️⃣ What exactly is identity in the context of cybersecurity, and why is it so crucial in today&amp;#39;s digital age?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;2️⃣ Discover the latest trends in identity security that you should be keeping an eye on to stay ahead of the game.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;3️⃣ Jeff will unveil strategies for organizations to implement robust Identity and Access Management (IAM) systems, providing a shield against emerging threats.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;4️⃣ Biometrics - the future or a potential pitfall?  Jeff will guide us through the advantages and disadvantages of relying on biometrics for identity verification.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;5️⃣ Learn how organizations strike the delicate balance between identity security and protection against insider threats.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;6️⃣ Dive into the world of Zero Trust strategy and explore how it seamlessly aligns with identity security best practices.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a question: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. Limited time 20% discount because you support the YouTube channel. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#IdentitySecurity #Cybersecurity #DigitalIdentity #DataProtection #IdentityManagement #BlockchainSecurity #ZeroTrust #Biometrics #IAM #CloudSecurity #TechTrends&lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="30166622" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/bab333b9-8f2f-42a3-89b9-be2d7da2f44c/stream.mp3"/>
                
                <guid isPermaLink="false">35e92e1a-9629-400c-8fc8-328507b7d550</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/bab333b9-8f2f-42a3-89b9-be2d7da2f44c</link>
                <pubDate>Wed, 25 Oct 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/10/23/13/08825589-49a9-4e60-afb9-91c706ef3c2a_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1885</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.10 - AI and Behavioral Science for Cybersecurity with Dustin Sachs</itunes:title>
                <title>Cyber Life Podcast Ep.10 - AI and Behavioral Science for Cybersecurity with Dustin Sachs</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>In this episode, award-winning cybersecurity professional and OT security expert Dustin Sachs breaks down how you can leverage artificial intelligence (AI) and behavioral science in your cybersecurity initiatives.</span></p><p><br></p><p><span>Ask me a question: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20  </span></p><p><br></p><p><br></p><p><span>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153  </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd    </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><br></p><p><span>https://www.stationx.net/cyberlife  </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;In this episode, award-winning cybersecurity professional and OT security expert Dustin Sachs breaks down how you can leverage artificial intelligence (AI) and behavioral science in your cybersecurity initiatives.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a question: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd    &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="28009116" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/30961c55-2fbd-4f58-b334-f581d71f8285/stream.mp3"/>
                
                <guid isPermaLink="false">bd06809a-a1d3-4163-b733-38e7f627fc8e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/30961c55-2fbd-4f58-b334-f581d71f8285</link>
                <pubDate>Wed, 18 Oct 2023 11:10:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/10/16/23/18894f00-a326-4feb-b918-881067f9a0f8_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1750</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.9 - GRC Career Path with Abinash Jena - GRC Analyst Jobs</itunes:title>
                <title>Cyber Life Podcast Ep.9 - GRC Career Path with Abinash Jena - GRC Analyst Jobs</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode, Abinash will share his experience working in Governance, Risk, and Compliance (GRC) and answer the famous question on if you can really get a six-figure GRC job with no experience within 24 hours, like YouTube videos claim.</p><p><br></p><p>Ask me a question: https://topmate.io/ken_underhill</p><p><br></p><p>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.</p><p><br></p><p>https://cyberken23.gumroad.com/l/jbilol/youtube20</p><p><br></p><p><br></p><p>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153</p><p><br></p><p><br></p><p>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.</p><p><br></p><p><br></p><p>Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd</p><p><br></p><p><br></p><p>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.</p><p>https://www.stationx.net/cyberlife</p><p><br></p><p><br></p><p>GRC Analyst, Governance, Risk, and Compliance Analyst, GRC Analyst job description, GRC Analyst salary, GRC Analyst certification, GRC Analyst skills, GRC Analyst responsibilities, GRC Analyst interview questions, GRC Analyst career path, GRC Analyst training, GRC Analyst job openings, GRC Analyst qualifications, GRC Analyst job market, GRC Analyst roles and responsibilities, GRC Analyst certification programs, Entry-level GRC Analyst, Senior GRC Analyst, GRC Analyst job prospects, GRC Analyst certifications, GRC Analyst remote jobs</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode, Abinash will share his experience working in Governance, Risk, and Compliance (GRC) and answer the famous question on if you can really get a six-figure GRC job with no experience within 24 hours, like YouTube videos claim.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Ask me a question: https://topmate.io/ken_underhill&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.&lt;/p&gt;&lt;p&gt;https://www.stationx.net/cyberlife&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;GRC Analyst, Governance, Risk, and Compliance Analyst, GRC Analyst job description, GRC Analyst salary, GRC Analyst certification, GRC Analyst skills, GRC Analyst responsibilities, GRC Analyst interview questions, GRC Analyst career path, GRC Analyst training, GRC Analyst job openings, GRC Analyst qualifications, GRC Analyst job market, GRC Analyst roles and responsibilities, GRC Analyst certification programs, Entry-level GRC Analyst, Senior GRC Analyst, GRC Analyst job prospects, GRC Analyst certifications, GRC Analyst remote jobs&lt;/p&gt;</content:encoded>
                
                <enclosure length="24957178" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/8238e713-451a-4fba-ac2a-12994aa4cb20/stream.mp3"/>
                
                <guid isPermaLink="false">63ca4ef7-dc0f-469f-ad1b-b700ec561204</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/8238e713-451a-4fba-ac2a-12994aa4cb20</link>
                <pubDate>Wed, 18 Oct 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/10/13/19/1686e44b-8758-429d-80f8-c3a033eed006__dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1559</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.8 - Cybersecurity Careers with Rob Blackwell</itunes:title>
                <title>Cyber Life Podcast Ep.8 - Cybersecurity Careers with Rob Blackwell</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>This episode is packed with value for your cybersecurity career.  </span></p><p><br></p><p><span>Rob Blackwell, CISSP, CISM shares his wisdom around cybersecurity careers and how cybersecurity is everyone&#39;s responsibility in this episode.  </span></p><p><br></p><p><span>Ask me a question: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. Limited time 20% discount because you support the YouTube channel. </span></p><p><br></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;This episode is packed with value for your cybersecurity career.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Rob Blackwell, CISSP, CISM shares his wisdom around cybersecurity careers and how cybersecurity is everyone&amp;#39;s responsibility in this episode.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a question: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. Limited time 20% discount because you support the YouTube channel. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="59945795" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/20dd114b-358e-48ad-95cd-2a529ec88be8/stream.mp3"/>
                
                <guid isPermaLink="false">feb6cfd1-4d6d-4817-a973-fef0ccbbb7d4</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/20dd114b-358e-48ad-95cd-2a529ec88be8</link>
                <pubDate>Tue, 17 Oct 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/10/13/20/cc8cd666-c9ec-4216-ac5f-0fff0fb7c114_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>3746</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.7 - Program Management with Omar Sangurima</itunes:title>
                <title>Cyber Life Podcast Ep.7 - Program Management with Omar Sangurima</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>🔒 Are you curious about how cybersecurity program management can help your business achieve its objectives? </span></p><p><br></p><p><span>Join Omar Sangurima in this episode as he explores the evolution of cybersecurity program management from a technical focus to a strategic business function. </span></p><p><br></p><p><strong>Ask me a question: https://topmate.io/ken_underhill   </strong></p><p><br></p><p><span>💼 If you&#39;re a cybersecurity professional struggling to secure funding for your programs, we&#39;ve got you covered. Omar shares effective strategies for communicating the business value/ROI of your cybersecurity initiatives to stakeholders. </span></p><p><br></p><p><span>💡 Resource limitations are a common obstacle, but don&#39;t let them hinder your cybersecurity program.  Omar shares practical tips on prioritizing cybersecurity initiatives while judiciously managing your resources.  </span></p><p><br></p><p><span>📈 And for those seeking funding for their cybersecurity initiatives, Omar reveals the key performance indicators (KPIs) that will make your proposal stand out.  Learn how to demonstrate the effectiveness of your cybersecurity strategy and gain the support/money you need.</span></p><p><span> </span></p><p><br></p><p><span>Ask me a question: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. </span></p><p><br></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><span>Limited time 20% discount because you support the YouTube channel. </span></p><p><br></p><p><span>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><br></p><p><span>Learn Ethical Hacking skills  </span></p><p><span>https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><br></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><span>Be sure to subscribe and hit that notification bell 🔔 for the latest Cyber Life episodes.</span></p><p><br></p><p><br></p><p><br></p><p><br></p><p><br></p><p><br></p><p><span>Program management, Project vs Program management, Program management best practices, Program management tools, Program management methodologies, Benefits realization in program management</span></p><p><br></p><p><br></p><p><span> </span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;🔒 Are you curious about how cybersecurity program management can help your business achieve its objectives? &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Join Omar Sangurima in this episode as he explores the evolution of cybersecurity program management from a technical focus to a strategic business function. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Ask me a question: https://topmate.io/ken_underhill   &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;💼 If you&amp;#39;re a cybersecurity professional struggling to secure funding for your programs, we&amp;#39;ve got you covered. Omar shares effective strategies for communicating the business value/ROI of your cybersecurity initiatives to stakeholders. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;💡 Resource limitations are a common obstacle, but don&amp;#39;t let them hinder your cybersecurity program.  Omar shares practical tips on prioritizing cybersecurity initiatives while judiciously managing your resources.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;📈 And for those seeking funding for their cybersecurity initiatives, Omar reveals the key performance indicators (KPIs) that will make your proposal stand out.  Learn how to demonstrate the effectiveness of your cybersecurity strategy and gain the support/money you need.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a question: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Limited time 20% discount because you support the YouTube channel. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Be sure to subscribe and hit that notification bell 🔔 for the latest Cyber Life episodes.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Program management, Project vs Program management, Program management best practices, Program management tools, Program management methodologies, Benefits realization in program management&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="29945939" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/62e1667e-40de-4a59-9681-e00592605a38/stream.mp3"/>
                
                <guid isPermaLink="false">0ea36825-cb2d-461a-8dd2-963779465169</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/62e1667e-40de-4a59-9681-e00592605a38</link>
                <pubDate>Wed, 11 Oct 2023 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/10/10/20/94e9e2b0-a308-455a-849a-4505be8c13bd_dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1871</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.6 - Cloud Phishing Attacks with Ruchira Pokhriyal with the AWS Incident Response Team</itunes:title>
                <title>Cyber Life Podcast Ep.6 - Cloud Phishing Attacks with Ruchira Pokhriyal with the AWS Incident Response Team</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>Cloud Phishing Attacks are on the rise globally.  In this episode, you will learn from cybersecurity and cloud security expert, Ruchira Pokhriyal.  </span></p><p><br></p><p><span>Ask me a question here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>Ruchira is a member of Amazon AWS&#39;s incident response (IR) team, where she plays a crucial role in maintaining security.  Her impressive background includes expertise in web app penetration testing, cloud security, incident response, and digital forensics. </span></p><p><br></p><p><span>Ruchira is a well-rounded professional in the cybersecurity 🔒 world and is frequently seen at various conferences advocating for diversity, equity, inclusion, and supporting the LGBTQ+ and Neurodivergent communities.</span></p><p><br></p><p><span>The information shared in this episode is for educational purposes only.  The views expressed here are Ruchira&#39;s personal opinions and do not reflect her employer&#39;s or any affiliated communities&#39; official stances.  </span></p><p><br></p><p><span>Cloud phishing encompasses a range of attacks that target cloud services like Google Drive, Dropbox, and OneDrive, aiming to deceive users into revealing their credentials.  These attacks often come in the form of phishing emails, complete with fake login pages and a sense of urgency.</span></p><p><br></p><p><span>One common attack Ruchira discusses in this episode is credential phishing.  Attackers impersonate trusted cloud service providers, sending emails claiming that the user&#39;s account has been compromised and demanding immediate attention.  These emails contain links to fake login pages that closely mimic the legitimate ones, leading unsuspecting users to share their sensitive data.</span></p><p><br></p><p><span>She also talks about the CloudFormation Stack Phishing attack, which specifically targets AWS CloudFormation users.  In this attack, the bad guys send emails impersonating AWS, tricking users into clicking malicious links that compromise their AWS CloudFormation resources.  </span></p><p><br></p><p><span>Ruchira delves into Cloud Billing Phishing emails as well.  These emails pose as billing departments of cloud service providers, creating a sense of urgency by claiming issues with your payment details.  Users are directed to fake billing portals, where they unwittingly enter their payment information, providing attackers with sensitive data.</span></p><p><br></p><p><span>To protect against these attacks, Ruchira recommends several best practices.  These include educating users about phishing attacks, verifying sender email addresses, avoiding clicking on suspicious links, enabling multi-factor authentication, and implementing email filtering and anti-phishing tools.</span></p><p><br></p><p><span>In this episode, you&#39;ll learn some prevention strategies and security best practices to fortify your cloud defenses.  Whether you&#39;re an individual or an organization, this episode will empower you to take action and protect your digital assets.  </span></p><p><br></p><p><span>📢 Hit that &#34;Subscribe&#34; button and ring the notification bell to stay updated on the latest Cyber Life podcast episodes, where I interview some of the top cybersecurity experts in the world. </span></p><p><br></p><p><span>And be sure to share this episode with your colleagues, friends, and family because together, we can build a safer digital world.</span></p><p><br></p><p><span>Ask me a question here: https://topmate.io/ken_underhill   </span></p><p><br></p><p><span>In less than one hour, build confidence for your next job interview.  Limited time 20% discount because you support the YouTube channel. </span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20 </span></p><p><br></p><p><br></p><p><span>Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 </span></p><p><br></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. </span></p><p><br></p><p><span>Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   </span></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife </span></p><p><br></p><p><br></p><p><span>Cloud phishing attacks, Phishing in cloud computing, Cloud email phishing, Cloud phishing prevention, Cloud security breaches, Cloud account phishing, Protecting against cloud phishing, Cloud credential phishing, Cloud data security, Cloud cybersecurity threats, Cloud-based email scams, Multi-factor authentication for cloud, Cloud billing phishing, CloudFormation Stack phishing, Detecting cloud phishing attempts, Cloud phishing awareness, Secure cloud data from phishing, Cloud service provider phishing, Cloud phishing best practices, Cloud phishing statistics</span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;Cloud Phishing Attacks are on the rise globally.  In this episode, you will learn from cybersecurity and cloud security expert, Ruchira Pokhriyal.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a question here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ruchira is a member of Amazon AWS&amp;#39;s incident response (IR) team, where she plays a crucial role in maintaining security.  Her impressive background includes expertise in web app penetration testing, cloud security, incident response, and digital forensics. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ruchira is a well-rounded professional in the cybersecurity 🔒 world and is frequently seen at various conferences advocating for diversity, equity, inclusion, and supporting the LGBTQ&#43; and Neurodivergent communities.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The information shared in this episode is for educational purposes only.  The views expressed here are Ruchira&amp;#39;s personal opinions and do not reflect her employer&amp;#39;s or any affiliated communities&amp;#39; official stances.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cloud phishing encompasses a range of attacks that target cloud services like Google Drive, Dropbox, and OneDrive, aiming to deceive users into revealing their credentials.  These attacks often come in the form of phishing emails, complete with fake login pages and a sense of urgency.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;One common attack Ruchira discusses in this episode is credential phishing.  Attackers impersonate trusted cloud service providers, sending emails claiming that the user&amp;#39;s account has been compromised and demanding immediate attention.  These emails contain links to fake login pages that closely mimic the legitimate ones, leading unsuspecting users to share their sensitive data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;She also talks about the CloudFormation Stack Phishing attack, which specifically targets AWS CloudFormation users.  In this attack, the bad guys send emails impersonating AWS, tricking users into clicking malicious links that compromise their AWS CloudFormation resources.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ruchira delves into Cloud Billing Phishing emails as well.  These emails pose as billing departments of cloud service providers, creating a sense of urgency by claiming issues with your payment details.  Users are directed to fake billing portals, where they unwittingly enter their payment information, providing attackers with sensitive data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;To protect against these attacks, Ruchira recommends several best practices.  These include educating users about phishing attacks, verifying sender email addresses, avoiding clicking on suspicious links, enabling multi-factor authentication, and implementing email filtering and anti-phishing tools.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In this episode, you&amp;#39;ll learn some prevention strategies and security best practices to fortify your cloud defenses.  Whether you&amp;#39;re an individual or an organization, this episode will empower you to take action and protect your digital assets.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;📢 Hit that &amp;#34;Subscribe&amp;#34; button and ring the notification bell to stay updated on the latest Cyber Life podcast episodes, where I interview some of the top cybersecurity experts in the world. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;And be sure to share this episode with your colleagues, friends, and family because together, we can build a safer digital world.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Ask me a question here: https://topmate.io/ken_underhill   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In less than one hour, build confidence for your next job interview.  Limited time 20% discount because you support the YouTube channel. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153 &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills  https://get.haikuinc.io/crk0rg6li6qd   &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cloud phishing attacks, Phishing in cloud computing, Cloud email phishing, Cloud phishing prevention, Cloud security breaches, Cloud account phishing, Protecting against cloud phishing, Cloud credential phishing, Cloud data security, Cloud cybersecurity threats, Cloud-based email scams, Multi-factor authentication for cloud, Cloud billing phishing, CloudFormation Stack phishing, Detecting cloud phishing attempts, Cloud phishing awareness, Secure cloud data from phishing, Cloud service provider phishing, Cloud phishing best practices, Cloud phishing statistics&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="33048868" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/3a260219-b9a8-44cb-b778-8449de8dceb5/stream.mp3"/>
                
                <guid isPermaLink="false">5c414071-4271-4015-9f74-890fafa51721</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/3a260219-b9a8-44cb-b778-8449de8dceb5</link>
                <pubDate>Wed, 04 Oct 2023 12:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/9/30/17/d111b892-1761-4a32-927a-7c8e927508c0_ruchira_episode_image.jpg"/>
                <itunes:duration>2065</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.5 - 🔒 Unlocking the Material Impact of Cybersecurity Risk with Chris Hetner 🔒</itunes:title>
                <title>Cyber Life Podcast Ep.5 - 🔒 Unlocking the Material Impact of Cybersecurity Risk with Chris Hetner 🔒</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>🔒 Unlocking the Material Impact of Cybersecurity Risk with Chris Hetner </span></p><p><br></p><p><span>In this episode, we sit down with the world renowned Chris Hetner, a global expert in the material impact of cybersecurity risk. </span></p><p><br></p><p><span>Chris has a wealth of experience and has advised both the SEC (that&#39;s the Security Exchange Commission, for the uninitiated) and the National Association of Corporate Directors, making him an authority in the field.</span></p><p><br></p><p><span>🌐 In the rapidly evolving cybersecurity landscape, we dive into the world of cybersecurity risk assessments, financial implications, and strategies to navigate emerging cyber threats. 🌐</span></p><p><br></p><p><span>📊 With the SEC&#39;s recent (July 2023) ruling mandating publicly traded companies to report material impact within a mere four business days, Chris offers invaluable insights into compliance, risk mitigation, and the changing face of cybersecurity risk management. 📊</span></p><p><br></p><p><span>🌟 Highlights of our Conversation 🌟</span></p><p><br></p><p><span>- Understanding the Financial Impact of Cyber Attacks</span></p><p><span>- The Role of Enterprise Risk Management in Quantifying Costs</span></p><p><span>- Strategies for Properly Managing and Communicating Cybersecurity Investments</span></p><p><span>- Real-world Examples of Cyber Risk Management</span></p><p><span>- The Emergence of AI in Cyberattacks and How to Defend Against Them</span></p><p><span>- The Implications of Supply Chain Attacks</span></p><p><br></p><p><span>Join us for this thought-provoking discussion that could shape your organization&#39;s approach to cybersecurity and risk management.  </span></p><p><br></p><p><span>Whether you&#39;re a seasoned security professional or just diving into cybersecurity, you won&#39;t want to miss this eye-opening conversation with Chris Hetner.</span></p><p><br></p><p><span>Do you need more help?</span></p><p><br></p><p><span>Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  </span></p><p><span>Limited time 20% discount because you support the YouTube channel.</span></p><p><span>https://cyberken23.gumroad.com/l/jbilol/youtube20</span></p><p><br></p><p><span>Schedule a mock job interview call with me at this link.</span></p><p><span>https://topmate.io/ken_underhill/411153</span></p><p><br></p><p><span>If you need cybersecurity training, here are some good resources.  </span></p><p><br></p><p><span>Please note that I earn a small affiliate commission if you sign up through these links below for the training.</span></p><p><br></p><p><span>Learn Ethical Hacking skills</span></p><p><span>https://get.haikuinc.io/crk0rg6li6qd</span></p><p><br></p><p><span>Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. </span></p><p><span>https://www.stationx.net/cyberlife</span></p><p><br></p><p><span>Don&#39;t forget to like, share, and subscribe for more insights from some of the top cybersecurity experts. 🚀</span></p><p><br></p><p><span>#Cybersecurity #RiskManagement #SEC #EnterpriseRisk #AIinCyberattacks #SupplyChainAttacks #CybersecurityExperts #CybersecurityStrategies #BusinessResilience #ChrisHetner #CybersecurityDiscussion #CybersecurityInsights</span></p><p><span>Cybersecurity risk assessment, Data breach consequences, Financial impact of cyber attacks, Cybersecurity incident response, Risk mitigation strategies, Cost of data breaches, Business continuity after a cyber attack, Regulatory fines for data breaches, Cybersecurity risk management, Insurance for cyber attacks, Reputation damage from cyber incidents, Cybersecurity ROI (Return on Investment), Cybersecurity compliance costs, Cybersecurity breach recovery, Customer data protection, Legal liabilities in cyber incidents, Supply chain cyber risks, Insider threats to organizations, Ransomware impact on businesses, Cybersecurity incident reporting</span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;🔒 Unlocking the Material Impact of Cybersecurity Risk with Chris Hetner &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;In this episode, we sit down with the world renowned Chris Hetner, a global expert in the material impact of cybersecurity risk. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Chris has a wealth of experience and has advised both the SEC (that&amp;#39;s the Security Exchange Commission, for the uninitiated) and the National Association of Corporate Directors, making him an authority in the field.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;🌐 In the rapidly evolving cybersecurity landscape, we dive into the world of cybersecurity risk assessments, financial implications, and strategies to navigate emerging cyber threats. 🌐&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;📊 With the SEC&amp;#39;s recent (July 2023) ruling mandating publicly traded companies to report material impact within a mere four business days, Chris offers invaluable insights into compliance, risk mitigation, and the changing face of cybersecurity risk management. 📊&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;🌟 Highlights of our Conversation 🌟&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Understanding the Financial Impact of Cyber Attacks&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- The Role of Enterprise Risk Management in Quantifying Costs&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Strategies for Properly Managing and Communicating Cybersecurity Investments&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Real-world Examples of Cyber Risk Management&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- The Emergence of AI in Cyberattacks and How to Defend Against Them&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- The Implications of Supply Chain Attacks&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Join us for this thought-provoking discussion that could shape your organization&amp;#39;s approach to cybersecurity and risk management.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Whether you&amp;#39;re a seasoned security professional or just diving into cybersecurity, you won&amp;#39;t want to miss this eye-opening conversation with Chris Hetner.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Do you need more help?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Limited time 20% discount because you support the YouTube channel.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://cyberken23.gumroad.com/l/jbilol/youtube20&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Schedule a mock job interview call with me at this link.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://topmate.io/ken_underhill/411153&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;If you need cybersecurity training, here are some good resources.  &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Please note that I earn a small affiliate commission if you sign up through these links below for the training.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Ethical Hacking skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://get.haikuinc.io/crk0rg6li6qd&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Get Ethical Hacking skills, SOC Analyst skills, and more through StationX. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.stationx.net/cyberlife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Don&amp;#39;t forget to like, share, and subscribe for more insights from some of the top cybersecurity experts. 🚀&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;#Cybersecurity #RiskManagement #SEC #EnterpriseRisk #AIinCyberattacks #SupplyChainAttacks #CybersecurityExperts #CybersecurityStrategies #BusinessResilience #ChrisHetner #CybersecurityDiscussion #CybersecurityInsights&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cybersecurity risk assessment, Data breach consequences, Financial impact of cyber attacks, Cybersecurity incident response, Risk mitigation strategies, Cost of data breaches, Business continuity after a cyber attack, Regulatory fines for data breaches, Cybersecurity risk management, Insurance for cyber attacks, Reputation damage from cyber incidents, Cybersecurity ROI (Return on Investment), Cybersecurity compliance costs, Cybersecurity breach recovery, Customer data protection, Legal liabilities in cyber incidents, Supply chain cyber risks, Insider threats to organizations, Ransomware impact on businesses, Cybersecurity incident reporting&lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="19642409" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5c2e8454-7dc7-4ad4-ab71-675754da08d8/stream.mp3"/>
                
                <guid isPermaLink="false">5bccc155-a829-445c-9361-be90586efcdb</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/5c2e8454-7dc7-4ad4-ab71-675754da08d8</link>
                <pubDate>Wed, 27 Sep 2023 10:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/9/22/15/3084e28c-0e70-4089-8553-beab3629e96c_chris_hetner_podcast_image.jpg"/>
                <itunes:duration>1227</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.4 - Big Mac Attack - Cybersecurity and Food Safety with Kristin Demoranville</itunes:title>
                <title>Cyber Life Podcast Ep.4 - Big Mac Attack - Cybersecurity and Food Safety with Kristin Demoranville</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode, we dive into the crucial relationship between food safety and cybersecurity with <strong>Kristin Demoranville</strong>.  </p><p>It&#39;s important to recognize that the food industry encompasses everything from agriculture and food production to distribution and beyond.</p><p>This combination of cybersecurity with food safety ensures not only the protection of digital assets but also the safety and security of the food supply chain from production to delivery.</p><p>One of the key takeaways from our conversation is the importance of awareness and education. We need to make cybersecurity an integral part of the food protection culture. Just as we&#39;ve learned to stop, drop, and roll in case of fire, we should aim for a similarly straightforward and universally understood approach to food safety and cybersecurity.  </p><p><br></p><p>Kristin has a new podcast called Bites &amp; Bytes Podcast launching soon that you can listen to at the link below. </p><p><a href="https://www.anzensage.com/BitesandBytesPodcast" rel="nofollow">https://www.anzensage.com/BitesandBytesPodcast</a> </p><p><br></p><p>*Disclaimer: I may earn a few dollars from affiliate links in this description.</p><p><br></p><p>Learn Cybersecurity skills by playing in the Haiku game.</p><p><a href="https://get.haikuinc.io/crk0rg6li6qd" rel="nofollow">https://get.haikuinc.io/crk0rg6li6qd</a></p><p><br></p><p>If your team needs cybersecurity-skill training, StationX offers a robust catalog of cybersecurity training.  </p><p>Learn more here: https://www.stationx.net/cyberlife</p><p><br></p><p><br></p><p><br></p><p>Cybersecurity in food industry, Food safety breaches, Cyber threats to food supply, Secure food supply chain, Food safety data protection, Cybersecurity for food processing, Food safety risk assessment, IoT in food safety, Cybersecurity for agricultural systems, Food safety traceability, Blockchain for food security, Food safety and digitalization, Cyber-physical food safety, Food safety incident response, Threats to food safety systems, Food supply chain resilience, Cybersecurity for food distribution, Food safety compliance and cyber risks, Data privacy in food safety, Food safety audit cybersecurity</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode, we dive into the crucial relationship between food safety and cybersecurity with &lt;strong&gt;Kristin Demoranville&lt;/strong&gt;.  &lt;/p&gt;&lt;p&gt;It&amp;#39;s important to recognize that the food industry encompasses everything from agriculture and food production to distribution and beyond.&lt;/p&gt;&lt;p&gt;This combination of cybersecurity with food safety ensures not only the protection of digital assets but also the safety and security of the food supply chain from production to delivery.&lt;/p&gt;&lt;p&gt;One of the key takeaways from our conversation is the importance of awareness and education. We need to make cybersecurity an integral part of the food protection culture. Just as we&amp;#39;ve learned to stop, drop, and roll in case of fire, we should aim for a similarly straightforward and universally understood approach to food safety and cybersecurity.  &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Kristin has a new podcast called Bites &amp;amp; Bytes Podcast launching soon that you can listen to at the link below. &lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.anzensage.com/BitesandBytesPodcast&#34; rel=&#34;nofollow&#34;&gt;https://www.anzensage.com/BitesandBytesPodcast&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;*Disclaimer: I may earn a few dollars from affiliate links in this description.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn Cybersecurity skills by playing in the Haiku game.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://get.haikuinc.io/crk0rg6li6qd&#34; rel=&#34;nofollow&#34;&gt;https://get.haikuinc.io/crk0rg6li6qd&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If your team needs cybersecurity-skill training, StationX offers a robust catalog of cybersecurity training.  &lt;/p&gt;&lt;p&gt;Learn more here: https://www.stationx.net/cyberlife&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Cybersecurity in food industry, Food safety breaches, Cyber threats to food supply, Secure food supply chain, Food safety data protection, Cybersecurity for food processing, Food safety risk assessment, IoT in food safety, Cybersecurity for agricultural systems, Food safety traceability, Blockchain for food security, Food safety and digitalization, Cyber-physical food safety, Food safety incident response, Threats to food safety systems, Food supply chain resilience, Cybersecurity for food distribution, Food safety compliance and cyber risks, Data privacy in food safety, Food safety audit cybersecurity&lt;/p&gt;</content:encoded>
                
                <enclosure length="31205668" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7ca57076-e0b0-41c2-bd1d-9652cc965b39/stream.mp3"/>
                
                <guid isPermaLink="false">cd78937d-cc77-442b-b102-68c483b2c698</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/7ca57076-e0b0-41c2-bd1d-9652cc965b39</link>
                <pubDate>Wed, 20 Sep 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/9/19/19/ddc7e379-51d6-4cbb-9e0e-54eef0239ab2__dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1950</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.3 - The CISO role with Charles Payne</itunes:title>
                <title>Cyber Life Podcast Ep.3 - The CISO role with Charles Payne</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode, we interview Charles Payne, a seasoned CISO with over 20 years of experience. He shares his insights on what it takes to be successful in this critical role, and offers advice to anyone who aspires to become a CISO.</p><p><br></p><p><span>*Disclaimer: I may earn a few dollars from affiliate links in this description.</span></p><p><span>Learn Cybersecurity skills by playing in the Haiku game.</span></p><p><span>https://get.haikuinc.io/crk0rg6li6qd</span></p><p><br></p><p>Charles explains that the CISO is responsible for protecting an organization&#39;s data and systems from cyberattacks. This requires a deep understanding of both technical and business aspects of security.</p><p><br></p><p>CISOs must also be able to communicate effectively with both technical and non-technical stakeholders.</p><p><br></p><p>Charles also shares some of the key qualities that make a successful CISO, including technical expertise, business acumen, leadership skills, and the ability to communicate effectively.</p><p><br></p><p>No role in cybersecurity is without its challenges, so Charles shares common challenges of the CISO role and offers advice on how to overcome them.</p><p><br></p><p>If you&#39;re interested in a career as a CISO, this episode is a must-listen.</p><p><br></p><p>Learn more about the Horizon Summit Cybersecurity Conference in Hawaii and register here:</p><p>https://web.cvent.com/event/c281260c-6cc5-4f3e-ba94-aebb10c65b6c/summary</p><p><br></p><p>Click the link to learn more about the Haiku gamified learning. </p><p>https://get.haikuinc.io/crk0rg6li6qd</p><p><br></p><p>CISO responsibilities, CISO qualifications, CISO best practices, CISO career path, CISO skills, CISO cybersecurity strategy CISO risk management, CISO data protection, CISO compliance, CISO incident response, CISO governance</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode, we interview Charles Payne, a seasoned CISO with over 20 years of experience. He shares his insights on what it takes to be successful in this critical role, and offers advice to anyone who aspires to become a CISO.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;*Disclaimer: I may earn a few dollars from affiliate links in this description.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Learn Cybersecurity skills by playing in the Haiku game.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://get.haikuinc.io/crk0rg6li6qd&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Charles explains that the CISO is responsible for protecting an organization&amp;#39;s data and systems from cyberattacks. This requires a deep understanding of both technical and business aspects of security.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;CISOs must also be able to communicate effectively with both technical and non-technical stakeholders.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Charles also shares some of the key qualities that make a successful CISO, including technical expertise, business acumen, leadership skills, and the ability to communicate effectively.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;No role in cybersecurity is without its challenges, so Charles shares common challenges of the CISO role and offers advice on how to overcome them.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If you&amp;#39;re interested in a career as a CISO, this episode is a must-listen.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn more about the Horizon Summit Cybersecurity Conference in Hawaii and register here:&lt;/p&gt;&lt;p&gt;https://web.cvent.com/event/c281260c-6cc5-4f3e-ba94-aebb10c65b6c/summary&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Click the link to learn more about the Haiku gamified learning. &lt;/p&gt;&lt;p&gt;https://get.haikuinc.io/crk0rg6li6qd&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;CISO responsibilities, CISO qualifications, CISO best practices, CISO career path, CISO skills, CISO cybersecurity strategy CISO risk management, CISO data protection, CISO compliance, CISO incident response, CISO governance&lt;/p&gt;</content:encoded>
                
                <enclosure length="30261498" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/f143b136-04fa-4a65-ab46-982860da32df/stream.mp3"/>
                
                <guid isPermaLink="false">7c526063-202b-4834-85f2-3cbb77baded4</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/f143b136-04fa-4a65-ab46-982860da32df</link>
                <pubDate>Wed, 13 Sep 2023 13:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/9/5/21/565aa5cc-5cc7-42b0-a363-7db0defeb67e__dcast_episode_image_template__3000___3000_px_.jpg"/>
                <itunes:duration>1891</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.2 - Building a Resilient Cloud Architecture with Katoria Henry</itunes:title>
                <title>Cyber Life Podcast Ep.2 - Building a Resilient Cloud Architecture with Katoria Henry</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode, Katoria Henry, a multi-award winning cloud security and technical resilience expert, discusses the importance of building a resilient cloud architecture.</p><p>Katoria covers the key concepts of cloud resilience, the challenges of building resilient cloud architectures, and best practices for overcoming these challenges.</p><p><br></p><p>Katoria also shares her personal experiences working with organizations to help them build resilient cloud architectures. She provides practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.</p><p><br></p><p>Whether you&#39;re a cloud architect, developer, or security professional, this video is essential viewing for anyone who wants to build resilient cloud applications.</p><p><br></p><p><strong>Listen to this episode to learn:</strong></p><p>- What is cloud resilience?</p><p>- The challenges of building resilient cloud architectures and how to overcome them.</p><p>- Practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.</p><p><br></p><p>Get a discount on StationX cybersecurity courses here: https://www.stationx.net/cyberlife</p><p><br></p><p>cloud resilience, microservices, cloud architecture, cloud security, data breaches, outages</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode, Katoria Henry, a multi-award winning cloud security and technical resilience expert, discusses the importance of building a resilient cloud architecture.&lt;/p&gt;&lt;p&gt;Katoria covers the key concepts of cloud resilience, the challenges of building resilient cloud architectures, and best practices for overcoming these challenges.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Katoria also shares her personal experiences working with organizations to help them build resilient cloud architectures. She provides practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Whether you&amp;#39;re a cloud architect, developer, or security professional, this video is essential viewing for anyone who wants to build resilient cloud applications.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Listen to this episode to learn:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;- What is cloud resilience?&lt;/p&gt;&lt;p&gt;- The challenges of building resilient cloud architectures and how to overcome them.&lt;/p&gt;&lt;p&gt;- Practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Get a discount on StationX cybersecurity courses here: https://www.stationx.net/cyberlife&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;cloud resilience, microservices, cloud architecture, cloud security, data breaches, outages&lt;/p&gt;</content:encoded>
                
                <enclosure length="32738742" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/707e3331-4390-40d3-ba7c-92ec23d4ae3c/stream.mp3"/>
                
                <guid isPermaLink="false">950c85c2-8d5d-4b8a-9bf4-53b1150c00a6</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/707e3331-4390-40d3-ba7c-92ec23d4ae3c</link>
                <pubDate>Wed, 06 Sep 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/8/29/19/7f929312-e684-4e34-84f8-4a9d27becff2_d-4e46-8fce-bf854eeb2f4c_katoria_podcast_image.jpg"/>
                <itunes:duration>2046</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cyber Life Podcast Ep.1 - Cloud Identity and Access Management (IAM) with Dr. KVN Rajesh</itunes:title>
                <title>Cyber Life Podcast Ep.1 - Cloud Identity and Access Management (IAM) with Dr. KVN Rajesh</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode, we&#39;re diving into the realm of identity and access management in the cloud. Our guest is Dr. KVN Rajesh, a multi award-winning trainer focused on Microsoft Azure security.</p><p>With a PhD in deep learning and over 10,000 individuals trained, Dr. Rajesh is a cloud security expert you won&#39;t want to miss.</p><p><br></p><p>Dr. Rajesh explains the concept of identity and access management (IAM) and how it helps protect our digital resources.</p><p><br></p><p>Imagine your username as your digital ID and access as your role within the organization – all controlled through IAM. IAM helps protect critical data, data privacy, and ensures compliance.</p><p><br></p><p>Dr. Rajesh talks about creating and managing IAM users, from provisioning to authentication, authorization, lifecycle management, and continuous monitoring.</p><p><br></p><p>He then explores the power of IAM policies. These digital blueprints govern user permissions and actions, safeguarding the principle of least privilege. Dr. Rajesh sheds light on architecture best practices of these policies and their role in maintaining the balance between security and user experience.</p><p><br></p><p>As our episode focus pivots to cloud environments, Dr. Rajesh showcases the pivotal role of IAM in Microsoft Azure. You will learn how Azure IAM centralizes access control, leveraging Azure Active Directory and Role-Based Access Control (RBAC) for seamless user identity management.</p><p><br></p><p>Dr. Rajesh also addresses emerging trends shaping the future of IAM.</p><p><br></p><p>He discusses zero trust, AI integration, and blockchain-backed identity verification.</p><p><br></p><p>But every coin has two sides.</p><p><br></p><p>Dr. Rajesh shares some common pitfalls to avoid – from generic passwords to excessive privileges – and offers a roadmap for troubleshooting IAM issues.</p><p><br></p><p>Dr. Rajesh recommends a comprehensive IAM strategy to enforce granular permissions, track user activities, and ensure regulatory compliance.</p><p><br></p><p>In this ever-connected world, cloud-based IAM solutions come with scalability, centralized management, and seamless integration. Dr. Rajesh digs into common benefits and challenges with cloud IAM solutions, to help your organization identity &#34;right fit&#34; solutions.</p><p><br></p><p>Dr. Rajesh also emphasizes the urgency of implementing IAM best practices because of emerging threats and the reduced barrier to entry for cyber criminals.</p><p><br></p><p>Be sure to like and subscribe for more episodes of the 🎙️ Cyber Life Podcast – where our guests share cybersecurity best practices.</p><p><br></p><p><br></p><p>If your team needs cybersecurity-skill training, StationX offers a robust catalog of training. Learn more here: https://www.stationx.net/cyberlife</p><p><br></p><p><br></p><p>Identity and access management (IAM), Access control, IAM solutions, User authentication, Role-based access control, Multifactor authentication, IAM best practices, Identity security, Access management tools, IAM implementation, Privileged access management, Single sign-on (SSO), Identity governance, Cloud IAM, Microsoft Azure IAM, Identity verification</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode, we&amp;#39;re diving into the realm of identity and access management in the cloud. Our guest is Dr. KVN Rajesh, a multi award-winning trainer focused on Microsoft Azure security.&lt;/p&gt;&lt;p&gt;With a PhD in deep learning and over 10,000 individuals trained, Dr. Rajesh is a cloud security expert you won&amp;#39;t want to miss.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Dr. Rajesh explains the concept of identity and access management (IAM) and how it helps protect our digital resources.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Imagine your username as your digital ID and access as your role within the organization – all controlled through IAM. IAM helps protect critical data, data privacy, and ensures compliance.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Dr. Rajesh talks about creating and managing IAM users, from provisioning to authentication, authorization, lifecycle management, and continuous monitoring.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;He then explores the power of IAM policies. These digital blueprints govern user permissions and actions, safeguarding the principle of least privilege. Dr. Rajesh sheds light on architecture best practices of these policies and their role in maintaining the balance between security and user experience.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;As our episode focus pivots to cloud environments, Dr. Rajesh showcases the pivotal role of IAM in Microsoft Azure. You will learn how Azure IAM centralizes access control, leveraging Azure Active Directory and Role-Based Access Control (RBAC) for seamless user identity management.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Dr. Rajesh also addresses emerging trends shaping the future of IAM.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;He discusses zero trust, AI integration, and blockchain-backed identity verification.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;But every coin has two sides.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Dr. Rajesh shares some common pitfalls to avoid – from generic passwords to excessive privileges – and offers a roadmap for troubleshooting IAM issues.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Dr. Rajesh recommends a comprehensive IAM strategy to enforce granular permissions, track user activities, and ensure regulatory compliance.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this ever-connected world, cloud-based IAM solutions come with scalability, centralized management, and seamless integration. Dr. Rajesh digs into common benefits and challenges with cloud IAM solutions, to help your organization identity &amp;#34;right fit&amp;#34; solutions.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Dr. Rajesh also emphasizes the urgency of implementing IAM best practices because of emerging threats and the reduced barrier to entry for cyber criminals.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Be sure to like and subscribe for more episodes of the 🎙️ Cyber Life Podcast – where our guests share cybersecurity best practices.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If your team needs cybersecurity-skill training, StationX offers a robust catalog of training. Learn more here: https://www.stationx.net/cyberlife&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Identity and access management (IAM), Access control, IAM solutions, User authentication, Role-based access control, Multifactor authentication, IAM best practices, Identity security, Access management tools, IAM implementation, Privileged access management, Single sign-on (SSO), Identity governance, Cloud IAM, Microsoft Azure IAM, Identity verification&lt;/p&gt;</content:encoded>
                
                <enclosure length="26698396" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/3f269cfa-a61f-45c3-bb04-6bf84c424f1b/stream.mp3"/>
                
                <guid isPermaLink="false">02581343-8466-471e-83e3-4a4b312f34fb</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/3f269cfa-a61f-45c3-bb04-6bf84c424f1b</link>
                <pubDate>Wed, 30 Aug 2023 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2023/8/29/19/4de67b86-066a-410e-8dfb-3c81fbe588a8_-9fb3-daa3531c1ca6_dr_kvn_rajesh_podcast_image.jpg"/>
                <itunes:duration>1668</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 2 Hacking from a Van</itunes:title>
                <title>Episode 2 Hacking from a Van</title>

                <itunes:episode>2</itunes:episode>
                <itunes:season>6</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode, I&#39;m joined by Zachary M. who built his own 5G van to live the dream life.</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode, I&amp;#39;m joined by Zachary M. who built his own 5G van to live the dream life.&lt;/p&gt;</content:encoded>
                
                <enclosure length="42665273" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/6acbeeb8-77b5-4454-9bd0-4bfc3ae9cadc/stream.mp3"/>
                
                <guid isPermaLink="false">e2a3bbf7-9a25-4c51-9b5c-4fbeccb5613c</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/6acbeeb8-77b5-4454-9bd0-4bfc3ae9cadc</link>
                <pubDate>Mon, 20 Sep 2021 10:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/9/19/20/bcebf174-d175-41e5-be5e-91fe4dbc0e7b_final_image.jpg"/>
                <itunes:duration>2666</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 6 Simply Cyber Guest Appearance</itunes:title>
                <title>Episode 6 Simply Cyber Guest Appearance</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>6</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>In this episode Gerry Auger and I discuss the need for cybersecurity skill-based training.  Be sure to check out and subscribe to Gerry&#39;s Simply Cyber YouTube channel.</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode Gerry Auger and I discuss the need for cybersecurity skill-based training.  Be sure to check out and subscribe to Gerry&amp;#39;s Simply Cyber YouTube channel.&lt;/p&gt;</content:encoded>
                
                <enclosure length="71562971" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/0310de59-6fe2-43b9-8d66-f3155e347bde/stream.mp3"/>
                
                <guid isPermaLink="false">8ab476d6-157b-4d14-b273-642fc8117681</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/0310de59-6fe2-43b9-8d66-f3155e347bde</link>
                <pubDate>Sun, 05 Sep 2021 00:25:28 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/9/5/0/6eb6397c-b81d-4c0f-88e2-e364f9ccf58b_final_image.jpg"/>
                <itunes:duration>4472</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Ken Squared (K2)</itunes:title>
                <title>Ken Squared (K2)</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>5</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>You can&#39;t go wrong with 2 Kens in the room.  Listen to this brief episode of my chat with Ken Mofford at Comcast.</p>]]></description>
                <content:encoded>&lt;p&gt;You can&amp;#39;t go wrong with 2 Kens in the room.  Listen to this brief episode of my chat with Ken Mofford at Comcast.&lt;/p&gt;</content:encoded>
                
                <enclosure length="10850220" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a47afd82-b9a2-426c-b476-721879bd58ca/stream.mp3"/>
                
                <guid isPermaLink="false">cbe479b0-82b9-43b6-8e9c-c240e48b45b7</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/a47afd82-b9a2-426c-b476-721879bd58ca</link>
                <pubDate>Wed, 14 Apr 2021 10:25:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/4/13/23/cfd0e30e-6a91-4154-b03a-5c11e7929fd5_final_image.jpg"/>
                <itunes:duration>678</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cybersecurity Inner Greatness Personal Brand Conference 2021 Season 4 Episode 11</itunes:title>
                <title>Cybersecurity Inner Greatness Personal Brand Conference 2021 Season 4 Episode 11</title>

                <itunes:episode>11</itunes:episode>
                <itunes:season>4</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>This is the recent cybersecurity personal branding conference, where cybersecurity professionals shared their insights and funny stories around personal branding.</span></p><p><br></p><p><span>A strong personal brand is important in both your cybersecurity career and if you decide to start your own business.  Having a strong personal brand allows you to have real negotiating power in job interviews and increases your value for any organization.  In this virtual conference, experienced cybersecurity professionals and business owners shared their insights into personal branding.</span></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;This is the recent cybersecurity personal branding conference, where cybersecurity professionals shared their insights and funny stories around personal branding.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;A strong personal brand is important in both your cybersecurity career and if you decide to start your own business.  Having a strong personal brand allows you to have real negotiating power in job interviews and increases your value for any organization.  In this virtual conference, experienced cybersecurity professionals and business owners shared their insights into personal branding.&lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="70346292" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/b69ab9e2-44c4-44d4-8dd0-b3dfdb118cd2/stream.mp3"/>
                
                <guid isPermaLink="false">700d957a-2df5-43e9-9def-aed8795e16b0</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/b69ab9e2-44c4-44d4-8dd0-b3dfdb118cd2</link>
                <pubDate>Sat, 13 Feb 2021 21:02:14 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/2/13/21/d32ade69-27e0-42c9-acd6-09635fa422e8_branding_podcast.jpg"/>
                <itunes:duration>4396</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Weekly Cybersecurity Jobs Feb 6th - Episode 10</itunes:title>
                <title>Weekly Cybersecurity Jobs Feb 6th - Episode 10</title>

                <itunes:episode>10</itunes:episode>
                <itunes:season>4</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>Listen to the open cybersecurity jobs in this episode and hear my brief discussion on the power of networking for getting jobs.</p><p><br></p><p>Be sure to subscribe to the YouTube channel for new videos released each week.</p><p><a href="https://youtu.be/Sjqpm059EIo" rel="nofollow">https://youtu.be/Sjqpm059EIo</a></p><p><br></p><p><span><span>﻿</span></span></p>]]></description>
                <content:encoded>&lt;p&gt;Listen to the open cybersecurity jobs in this episode and hear my brief discussion on the power of networking for getting jobs.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Be sure to subscribe to the YouTube channel for new videos released each week.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://youtu.be/Sjqpm059EIo&#34; rel=&#34;nofollow&#34;&gt;https://youtu.be/Sjqpm059EIo&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;&lt;span&gt;﻿&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="7123278" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/e6abd377-ffb1-49d8-b15c-a9fdd794face/stream.mp3"/>
                
                <guid isPermaLink="false">a2a79c83-ffbd-44a8-98ee-ce9536d63ee9</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/e6abd377-ffb1-49d8-b15c-a9fdd794face</link>
                <pubDate>Sat, 06 Feb 2021 19:35:02 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/2/6/19/c8fa80be-6e22-4489-981c-832f43fb55d5_final_image.jpg"/>
                <itunes:duration>445</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Weekly Cybersecurity Jobs January 29th - Season 4 Episode 9</itunes:title>
                <title>Weekly Cybersecurity Jobs January 29th - Season 4 Episode 9</title>

                <itunes:episode>9</itunes:episode>
                <itunes:season>4</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>A list of jobs (including entry level) that I&#39;ve found this week, along with companies that have a lot of jobs open.</p>]]></description>
                <content:encoded>&lt;p&gt;A list of jobs (including entry level) that I&amp;#39;ve found this week, along with companies that have a lot of jobs open.&lt;/p&gt;</content:encoded>
                
                <enclosure length="32403121" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/d493ce67-7122-4027-853b-f0a8fd0578e6/stream.mp3"/>
                
                <guid isPermaLink="false">2daeaa90-85b3-43a8-9620-c6316f7df302</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/d493ce67-7122-4027-853b-f0a8fd0578e6</link>
                <pubDate>Sat, 30 Jan 2021 11:15:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/30/3/acc3b884-14d2-429a-8299-5365d9fc2bac_f5bc01d6-ad6a-4899-aa45-a3a0fa298d11_final_image.jpg"/>
                <itunes:duration>2025</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Weekly Jobs Jan 22nd - Season 4 Episode 8</itunes:title>
                <title>Weekly Jobs Jan 22nd - Season 4 Episode 8</title>

                <itunes:episode>8</itunes:episode>
                <itunes:season>4</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p>Weekly Job List</p><p>Please ping me jobs you know of via LinkedIn, so I can include them in this list.</p><p>👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag </p><p><br></p><p>Subscribe to the Cyber Life TV YouTube Channel </p><p>https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug </p><p><br></p><p>Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life  </p><p><br></p><p>Follow us across other social media in the coming months as well. </p><p><br></p><p>👉 Facebook https://www.facebook.com/therealcyberlife </p><p>👉 InstaGram https://www.instagram.com/officialcyberlife/ </p><p>👉 Twitter https://twitter.com/RealCyberLife  www.cyberlife.tv</p><p><br></p><p>Job/Course Links Mentioned in this Episode</p><p><strong>Battleship free course</strong></p><p><span>https://academy.battleshipsecurity.com/course/get_infosec_interviews </span></p><p><br></p><p><strong>RangeForce </strong></p><p><span>Has paid intern roles available</span></p><p><a href="https://www.rangeforce.com/careers" rel="nofollow">https://www.rangeforce.com/careers</a><span> </span></p><p><br></p><p><strong>Ultimate Software</strong></p><p><span>Remote System Consultant</span></p><p><a href="https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=865721a7-e656-4ffc-b65d-f944072fb1ba" rel="nofollow">https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=865721a7-e656-4ffc-b65d-f944072fb1ba</a></p><ul><li><span>3-5 yrs experience implementing HRMS solutions</span></li><li><span>Project management skills</span></li><li><span>Custom service skills</span></li><li><span>Prior payroll implementation experience</span></li><li><span>Time Management skills</span></li><li><span>Communication skills</span></li><li><span>Motivated</span></li><li><span>Strong Excel knowledge </span></li></ul><p><br></p><p><span>Cybersecurity Vulnerability Analyst</span></p><p><a href="https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=5015ec69-cbc1-4e4d-82df-1cf20307ccb0" rel="nofollow">https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=5015ec69-cbc1-4e4d-82df-1cf20307ccb0</a><span> </span></p><p><span>-Be current on CVEs</span></p><p><span>-Vulnerability assessments, reports, and remediation </span></p><p><span>-Communication skills</span></p><p><span>-RSA Archer a plus</span></p><p><span>-Programming/Scripting experience</span></p><p><span>-Hardening skills</span></p><p><br></p><p><br></p><p><strong>Conquest Cyber</strong></p><p><br></p><p><span>Linux Security Engineer -mid level role</span></p><p><span>https://www.linkedin.com/jobs/view/2377019536/</span></p><p><span>-Advanced Linux experience</span></p><p><span>-Development/Scripting experience</span></p><p><span>-Plus to have Golang and Elastic stack management experience</span></p><p><br></p><p><span>DevSecOps Engineer -mid level role</span></p><p><span>https://www.linkedin.com/jobs/view/2377021798/</span></p><p><span>-Advanced Linux experience</span></p><p><span>-Kubernetes experience</span></p><p><span>-Development/Scripting experience</span></p><p><span>-Plus to have Golang</span></p><p><br></p><p><span>Application Security Engineer- mid level role</span></p><p><span>https://www.linkedin.com/jobs/view/2386004317/</span></p><p><span>-Threat modeling</span></p><p><span>-Code review (Golang, .Net, Javascript)</span></p><p><span>-Investigating security defects found by SAST/DAST (static and dynamic code analysis)</span></p><p><br></p><p><span>Golang Developer- mid level role</span></p><p><span>https://www.linkedin.com/jobs/view/2361241990/</span></p><p><span>- Plus to have experience with Javascript frameworks - React.js, Next.js and other front end technology</span></p><p><br></p><p><span>Cloud Engineer - senior level role</span></p><p><span>https://www.linkedin.com/jobs/view/2371389170/</span></p><p><span>- Azure architecture</span></p><p><span>-8-10 years experience in security/cloud</span></p><p><span>- Plus to have CISSP, CISM, or Azure certs</span></p><p><br></p><p><br></p><p><strong>Comcast</strong></p><p><br></p><p><span>Customer Success Engineer</span></p><p><span>https://comcast.wd5.myworkdayjobs.com/Comcast_Careers/job/MD---Virtual---C/Customer-Success-Engineer_227757</span></p><p><span>-Python</span></p><p><span>-Windows AD</span></p><p><span>-Splunk</span></p><p><span>-IDS</span></p><p><span>-Linux Server - main skillset they want</span></p><p><br></p><p><span>Note: Lots of Product Manager roles open at Comcast as well.</span></p><p><br></p><p><br></p><p><strong>Deloitte</strong></p><p><span>------------------------------------------</span></p><p><span>Lots of jobs open, including some entry level</span></p><p><span>https://www2.deloitte.com/us/en.html</span></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;Weekly Job List&lt;/p&gt;&lt;p&gt;Please ping me jobs you know of via LinkedIn, so I can include them in this list.&lt;/p&gt;&lt;p&gt;👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel &lt;/p&gt;&lt;p&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life  &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well. &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/p&gt;&lt;p&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/ &lt;/p&gt;&lt;p&gt;👉 Twitter https://twitter.com/RealCyberLife  www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Job/Course Links Mentioned in this Episode&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Battleship free course&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://academy.battleshipsecurity.com/course/get_infosec_interviews &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;RangeForce &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Has paid intern roles available&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.rangeforce.com/careers&#34; rel=&#34;nofollow&#34;&gt;https://www.rangeforce.com/careers&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Ultimate Software&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Remote System Consultant&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=865721a7-e656-4ffc-b65d-f944072fb1ba&#34; rel=&#34;nofollow&#34;&gt;https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=865721a7-e656-4ffc-b65d-f944072fb1ba&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;3-5 yrs experience implementing HRMS solutions&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;Project management skills&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;Custom service skills&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;Prior payroll implementation experience&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;Time Management skills&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;Communication skills&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;Motivated&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;Strong Excel knowledge &lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cybersecurity Vulnerability Analyst&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=5015ec69-cbc1-4e4d-82df-1cf20307ccb0&#34; rel=&#34;nofollow&#34;&gt;https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=5015ec69-cbc1-4e4d-82df-1cf20307ccb0&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Be current on CVEs&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Vulnerability assessments, reports, and remediation &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Communication skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-RSA Archer a plus&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Programming/Scripting experience&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Hardening skills&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Conquest Cyber&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Linux Security Engineer -mid level role&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.linkedin.com/jobs/view/2377019536/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Advanced Linux experience&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Development/Scripting experience&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Plus to have Golang and Elastic stack management experience&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;DevSecOps Engineer -mid level role&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.linkedin.com/jobs/view/2377021798/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Advanced Linux experience&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Kubernetes experience&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Development/Scripting experience&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Plus to have Golang&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Application Security Engineer- mid level role&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.linkedin.com/jobs/view/2386004317/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Threat modeling&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Code review (Golang, .Net, Javascript)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Investigating security defects found by SAST/DAST (static and dynamic code analysis)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Golang Developer- mid level role&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.linkedin.com/jobs/view/2361241990/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Plus to have experience with Javascript frameworks - React.js, Next.js and other front end technology&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cloud Engineer - senior level role&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www.linkedin.com/jobs/view/2371389170/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Azure architecture&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-8-10 years experience in security/cloud&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;- Plus to have CISSP, CISM, or Azure certs&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Comcast&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Customer Success Engineer&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://comcast.wd5.myworkdayjobs.com/Comcast_Careers/job/MD---Virtual---C/Customer-Success-Engineer_227757&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Python&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Windows AD&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Splunk&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-IDS&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-Linux Server - main skillset they want&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Note: Lots of Product Manager roles open at Comcast as well.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Deloitte&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Lots of jobs open, including some entry level&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;https://www2.deloitte.com/us/en.html&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="21088966" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/9147bca7-6c44-45d8-832d-ee18ec4c6bf9/stream.mp3"/>
                
                <guid isPermaLink="false">7c275e3b-ba90-486c-949e-5765c484e79e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/9147bca7-6c44-45d8-832d-ee18ec4c6bf9</link>
                <pubDate>Fri, 22 Jan 2021 13:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/22/2/065bb60b-78a9-43de-b34a-cfe7800f717a_podcast.jpg"/>
                <itunes:duration>1318</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Productivity Tips &amp; Cyber Life TV Show Update - Season 4 Episode 7</itunes:title>
                <title>Productivity Tips &amp; Cyber Life TV Show Update - Season 4 Episode 7</title>

                <itunes:episode>7</itunes:episode>
                <itunes:season>4</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p><br></p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="19860166" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4e9e6995-547b-4c65-92b6-f29214537c80/stream.mp3"/>
                
                <guid isPermaLink="false">b3104709-8a80-471d-97c8-dc4818105eac</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/4e9e6995-547b-4c65-92b6-f29214537c80</link>
                <pubDate>Tue, 19 Jan 2021 02:54:59 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/a47a0c08-eea1-4c46-b485-bd4e0cb79d03_podcast.jpg"/>
                <itunes:duration>1241</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>KenApp Version 4.6</itunes:title>
                <title>KenApp Version 4.6</title>

                <itunes:episode>6</itunes:episode>
                <itunes:season>4</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, I go over some of the common questions I get around cybersecurity jobs, creating online courses, making money, and more.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, I go over some of the common questions I get around cybersecurity jobs, creating online courses, making money, and more.&lt;/p&gt;</content:encoded>
                
                <enclosure length="55704346" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5c3a6138-a88e-43ad-9628-314905c9efc2/stream.mp3"/>
                
                <guid isPermaLink="false">b88f470d-e762-4d70-952f-f587997c48dc</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/5c3a6138-a88e-43ad-9628-314905c9efc2</link>
                <pubDate>Tue, 01 Dec 2020 16:13:26 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/b51ddd2e-6f76-4280-98e7-14bb01f25a70_963a2d3a-4c95-442d-adf3-bcd18f3468ce_final_image.jpg"/>
                <itunes:duration>3481</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Version 4.5 Diversity Thoughts</itunes:title>
                <title>Version 4.5 Diversity Thoughts</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>This is a guest appearance I did on another podcast, where I gave my thoughts around diversity.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;This is a guest appearance I did on another podcast, where I gave my thoughts around diversity.&lt;/p&gt;</content:encoded>
                
                <enclosure length="31360313" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a5a10e0c-2291-4a23-9d13-82d9bc50d6a8/stream.mp3"/>
                
                <guid isPermaLink="false">12f4d61d-16f5-4ca7-ae4e-3b02eadfb072</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/a5a10e0c-2291-4a23-9d13-82d9bc50d6a8</link>
                <pubDate>Sat, 03 Oct 2020 03:42:32 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/749ba619-a653-41cf-862d-3e9eb835e80e_bfc8dcce-e20a-46e4-a118-2328abac8492_final_image.jpg"/>
                <itunes:duration>1960</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 4: Episode 4 Dustin Sachs Forensics Expert</itunes:title>
                <title>Season 4: Episode 4 Dustin Sachs Forensics Expert</title>

                <itunes:episode>4</itunes:episode>
                <itunes:season>4</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join digital forensics expert and GRC advisor Dustin Sachs and I in this episode.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join digital forensics expert and GRC advisor Dustin Sachs and I in this episode.&lt;/p&gt;</content:encoded>
                
                <enclosure length="11520626" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/ca5c7b5e-8b4c-49d3-a5c1-ca0ac21133ed/stream.mp3"/>
                
                <guid isPermaLink="false">41c99966-3490-48ea-a746-687bfc906060</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/ca5c7b5e-8b4c-49d3-a5c1-ca0ac21133ed</link>
                <pubDate>Mon, 28 Sep 2020 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/19588898-f4b5-47b6-baeb-57b1ddb9e454_c9a77a9f-816f-4a65-bb61-1553fce5a804_final_image.jpg"/>
                <itunes:duration>720</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 4: Episode 3 Cyberjutsu Awards</itunes:title>
                <title>Season 4: Episode 3 Cyberjutsu Awards</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Thank you to everyone for the nomination for a Cyberjutsu award. The winners will be chosen at the event (virtual) in October. More details coming soon.</p><p>You can learn more about the awards and the organization at this link.</p><p>https://womenscyberjutsu.org/page/awards2020</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Thank you to everyone for the nomination for a Cyberjutsu award. The winners will be chosen at the event (virtual) in October. More details coming soon.&lt;/p&gt;&lt;p&gt;You can learn more about the awards and the organization at this link.&lt;/p&gt;&lt;p&gt;https://womenscyberjutsu.org/page/awards2020&lt;/p&gt;</content:encoded>
                
                <enclosure length="10708532" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/350585b7-6e64-49ad-89f2-2c10857042bd/stream.mp3"/>
                
                <guid isPermaLink="false">c4205de6-7b72-4cdd-8377-0f7a82b0ee1e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/350585b7-6e64-49ad-89f2-2c10857042bd</link>
                <pubDate>Wed, 02 Sep 2020 20:06:39 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/6fb30496-bdc3-43b0-8412-5e4526a3627f_faed21a1-9c4b-4e87-8855-ad251f083047_cyberjutsu.jpg"/>
                <itunes:duration>669</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 4: Episode 2 Career Advice</itunes:title>
                <title>Season 4: Episode 2 Career Advice</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this video, we host a Q&amp;A session with some great career advice.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this video, we host a Q&amp;amp;A session with some great career advice.&lt;/p&gt;</content:encoded>
                
                <enclosure length="59007477" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/b014f06c-5edd-41af-9946-fc0522c10f35/stream.mp3"/>
                
                <guid isPermaLink="false">7a04173a-8b8a-4ed2-8c2b-065c63e84af4</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/b014f06c-5edd-41af-9946-fc0522c10f35</link>
                <pubDate>Fri, 21 Aug 2020 22:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/b652e8a2-1ca1-4a29-a85c-9ee4d4320ce3_274a7c56-f898-452a-9497-e3f2c4dfe26e_final_image.jpg"/>
                <itunes:duration>3687</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 4 Episode 1: The Surprise Inside</itunes:title>
                <title>Season 4 Episode 1: The Surprise Inside</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, I talk about how to find the cybersecurity talent hiding in your organization.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, I talk about how to find the cybersecurity talent hiding in your organization.&lt;/p&gt;</content:encoded>
                
                <enclosure length="10151392" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/ced9dd9f-be26-4656-b697-7c4172ac34c8/stream.mp3"/>
                
                <guid isPermaLink="false">b8f9a7f9-44a3-4216-8b08-d2ea2be8670f</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/ced9dd9f-be26-4656-b697-7c4172ac34c8</link>
                <pubDate>Thu, 20 Aug 2020 23:35:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/3dff1073-65fb-4c0e-9bba-e25ea73d9675_63bbe684-6b8e-4858-8309-26befdb32b3a_final_image.jpg"/>
                <itunes:duration>634</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 17: Tino Sokic OSINT</itunes:title>
                <title>Season 3 Episode 17: Tino Sokic OSINT</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Who is on the balcony? Tune into this episode with Tino Sokic to find out.</p><p><br></p><p>Connect with Tino on LinkedIn.</p><p><a href="https://www.linkedin.com/in/tinosokic/" rel="nofollow">https://www.linkedin.com/in/tinosokic/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Who is on the balcony? Tune into this episode with Tino Sokic to find out.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Tino on LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/tinosokic/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/tinosokic/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="20741224" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/d8af7444-158f-41a1-b03f-baf1d1056a17/stream.mp3"/>
                
                <guid isPermaLink="false">644afd4c-d17e-433b-8410-b75f56584497</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/d8af7444-158f-41a1-b03f-baf1d1056a17</link>
                <pubDate>Thu, 04 Jun 2020 10:30:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/f0cc7713-77a4-402e-a5c0-06670ae061f6_a76a95cb-e99b-4b32-ac32-6d8ff37abcc5_final_image.jpg"/>
                <itunes:duration>1296</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 16: Ron Brash ICS/OT Expert</itunes:title>
                <title>Episode 16: Ron Brash ICS/OT Expert</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join <strong>Ron Brash</strong>, Director of Cybersecurity Insights at Verve Industrial Protection, and I in this episode as we discuss critical infrastructure.</p><p><br></p><p>Connect with Ron here.</p><p><a href="https://www.linkedin.com/in/ronbrash/" rel="nofollow">https://www.linkedin.com/in/ronbrash/</a></p><p><a href="https://verveindustrial.com/" rel="nofollow">https://verveindustrial.com/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join &lt;strong&gt;Ron Brash&lt;/strong&gt;, Director of Cybersecurity Insights at Verve Industrial Protection, and I in this episode as we discuss critical infrastructure.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Ron here.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/ronbrash/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/ronbrash/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://verveindustrial.com/&#34; rel=&#34;nofollow&#34;&gt;https://verveindustrial.com/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="21530331" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/bb4ec518-4941-4956-aec9-ecb46435f66a/stream.mp3"/>
                
                <guid isPermaLink="false">bf1e28ed-89ec-433f-8c15-e9fa0294853d</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/bb4ec518-4941-4956-aec9-ecb46435f66a</link>
                <pubDate>Sun, 24 May 2020 17:07:08 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/aff6fca2-843d-49e1-ae27-42204ea88922_4c70c3c1-8a53-4a18-9598-50a838934742_final_image.jpg"/>
                <itunes:duration>1345</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 15 Joe Perry &#34;Certified Cool Guy&#34;</itunes:title>
                <title>Episode 15 Joe Perry &#34;Certified Cool Guy&#34;</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Joe Perry joins us in this episode as we talk about his journey as a secret spy into his current role for Mandiant/FireEye.</p><p><br></p><p>Joe provides some great career advice and even shows a demonstration of some Python coding.</p><p><br></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Joe Perry joins us in this episode as we talk about his journey as a secret spy into his current role for Mandiant/FireEye.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Joe provides some great career advice and even shows a demonstration of some Python coding.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="23437061" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/c75531d8-456b-4d57-88ac-c51f82361fbe/stream.mp3"/>
                
                <guid isPermaLink="false">df5c4a8a-20dc-4a61-84bf-fb75a30753ed</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/c75531d8-456b-4d57-88ac-c51f82361fbe</link>
                <pubDate>Thu, 14 May 2020 07:30:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/c8cdd5c9-7e60-453e-8f01-17e6c182430f_dd2a068c-ba0d-462b-948f-4fdc31a031aa_aa6181ad-8ac0-4210-99ff-0949327f9d21_c4b05722-b3e3-43f7-959e-2f08d208db89_final_image.jpg"/>
                <itunes:duration>1464</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 14 John Prisco, CEO at Quantum Xchange</itunes:title>
                <title>Episode 14 John Prisco, CEO at Quantum Xchange</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p><strong>John Prisco, CEO of Quantum Xchange</strong> joins me in this episode as we talk about quantum computing and its relation to cybersecurity.</p><p><br></p><p>John explains what quantum key distribution (QKD) is and why we as an industry, and Nation, need to win the race for quantum security.</p><p><br></p><p>Connect with John&#39;s team over at Quantum Xchange at this link.</p><p><a href="https://quantumxc.com/" rel="nofollow">https://quantumxc.com/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;John Prisco, CEO of Quantum Xchange&lt;/strong&gt; joins me in this episode as we talk about quantum computing and its relation to cybersecurity.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;John explains what quantum key distribution (QKD) is and why we as an industry, and Nation, need to win the race for quantum security.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with John&amp;#39;s team over at Quantum Xchange at this link.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://quantumxc.com/&#34; rel=&#34;nofollow&#34;&gt;https://quantumxc.com/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="13894217" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/954f22c7-cbc6-44e1-be6a-f4a5e8d46d4f/stream.mp3"/>
                
                <guid isPermaLink="false">42ef7477-08a4-4676-95cf-622a0d0b2a3f</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/954f22c7-cbc6-44e1-be6a-f4a5e8d46d4f</link>
                <pubDate>Thu, 07 May 2020 05:25:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/239d9dec-3453-4135-9327-7edd0d77f3e5_839ef644-7b5b-4538-8ed2-fc2193b3d145_final_image.jpg"/>
                <itunes:duration>868</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 13 Chris Kubecka</itunes:title>
                <title>Episode 13 Chris Kubecka</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Penetration tester and government 3-letter agency advisor Chris Kubecka joins me in this episode. Be sure to watch this one over on the Cyber Life YouTube channel, so you can see our cool backgrounds.</p><p><br></p><p>Find Chris on Twitter, LinkedIn, and many other sites.</p><p><br></p><p>Twitter: @SecEvangelism</p><p>LinkedIn: <a href="https://www.linkedin.com/in/chris-k-6577984/" rel="nofollow">https://www.linkedin.com/in/chris-k-6577984/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Penetration tester and government 3-letter agency advisor Chris Kubecka joins me in this episode. Be sure to watch this one over on the Cyber Life YouTube channel, so you can see our cool backgrounds.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Find Chris on Twitter, LinkedIn, and many other sites.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Twitter: @SecEvangelism&lt;/p&gt;&lt;p&gt;LinkedIn: &lt;a href=&#34;https://www.linkedin.com/in/chris-k-6577984/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/chris-k-6577984/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="19514514" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/57474c1f-7e99-46f3-9433-1204e8cd12f4/stream.mp3"/>
                
                <guid isPermaLink="false">d8813677-5c47-4fe9-b75b-0f810434c7a5</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/57474c1f-7e99-46f3-9433-1204e8cd12f4</link>
                <pubDate>Fri, 24 Apr 2020 15:30:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/1287fcd0-0566-49bb-ab4d-d919049796f9_2ecf8a6d-f47c-48c1-ba79-3aa8893f80fa_final_image.jpg"/>
                <itunes:duration>1219</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 12: Ron Woerner and Charlie Dagwell</itunes:title>
                <title>Season 3 Episode 12: Ron Woerner and Charlie Dagwell</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in the latest episode of the Cyber Life podcast, where I chat with Ron Woerner and Charlie Dagwell.</p><p>We&#39;ll talk about some security fundamentals from Ron that small business owners can do and also learn from recruiting expert Charlie on things you can do to get that dream job.</p><p><br></p><p>Connect with Ron and Charlie on LinkedIn and be sure to personalize the invite to let them know you enjoyed this episode.</p><p><br></p><p>Ron Woerner</p><p><a href="https://www.linkedin.com/in/ronwoerner/" rel="nofollow">https://www.linkedin.com/in/ronwoerner/</a></p><p><br></p><p>Charlie Dagwell</p><p><a href="https://www.linkedin.com/in/charlie-dagwell-27231092/" rel="nofollow">https://www.linkedin.com/in/charlie-dagwell-27231092/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in the latest episode of the Cyber Life podcast, where I chat with Ron Woerner and Charlie Dagwell.&lt;/p&gt;&lt;p&gt;We&amp;#39;ll talk about some security fundamentals from Ron that small business owners can do and also learn from recruiting expert Charlie on things you can do to get that dream job.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Ron and Charlie on LinkedIn and be sure to personalize the invite to let them know you enjoyed this episode.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Ron Woerner&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/ronwoerner/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/ronwoerner/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Charlie Dagwell&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/charlie-dagwell-27231092/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/charlie-dagwell-27231092/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="28905639" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4b897c17-a5f5-4344-8ddf-d7540497e950/stream.mp3"/>
                
                <guid isPermaLink="false">45f96e5b-a78a-4528-9533-36e2a862bdab</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/4b897c17-a5f5-4344-8ddf-d7540497e950</link>
                <pubDate>Mon, 13 Apr 2020 07:15:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/d6dda6c1-51f4-43ce-a3bd-a0e2dabdb3aa_58d5efcd-0f2e-4caf-b340-927bb65220b3_final_image.jpg"/>
                <itunes:duration>1806</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 11 Lizzie Verbeek</itunes:title>
                <title>Season 3 Episode 11 Lizzie Verbeek</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Lizzie Verbeek is an experienced recruiter in the industry. Listen in as she provides great information on resumes, finding jobs, and much more!</p><p><br></p><p>Connect with Lizzie on LinkedIn.</p><p><a href="https://www.linkedin.com/in/lizzie-verbeek-548a32b/" rel="nofollow">https://www.linkedin.com/in/lizzie-verbeek-548a32b/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Lizzie Verbeek is an experienced recruiter in the industry. Listen in as she provides great information on resumes, finding jobs, and much more!&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Lizzie on LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/lizzie-verbeek-548a32b/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/lizzie-verbeek-548a32b/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="15418932" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/8c6b0a90-afe9-45e0-9e5d-7953d349d0fb/stream.mp3"/>
                
                <guid isPermaLink="false">b5ed5ac5-64e2-42c2-99a7-687184c08d99</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/8c6b0a90-afe9-45e0-9e5d-7953d349d0fb</link>
                <pubDate>Tue, 07 Apr 2020 10:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/bcf4dff8-7cc9-42f3-91a0-ef8feca9ee3e_b43746d1-6cc2-4ca6-9e5a-ff7c986ac7b3_final_image.jpg"/>
                <itunes:duration>963</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 10 Aastha Sahni</itunes:title>
                <title>Season 3 Episode 10 Aastha Sahni</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join Aastha Sahni and I in this episode as we discuss her tips for getting into the industry and finding a job.</p><p><br></p><p>Connect with Aastha on LinkedIn.</p><p><a href="https://www.linkedin.com/in/aastha-sahni-9aa14371/" rel="nofollow">https://www.linkedin.com/in/aastha-sahni-9aa14371/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join Aastha Sahni and I in this episode as we discuss her tips for getting into the industry and finding a job.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Aastha on LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/aastha-sahni-9aa14371/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/aastha-sahni-9aa14371/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="23632248" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/2d09586b-b6ba-4e87-ba62-7c6b13a4e6d3/stream.mp3"/>
                
                <guid isPermaLink="false">43d80bd4-0a4d-43f1-bed5-e468e74337e8</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/2d09586b-b6ba-4e87-ba62-7c6b13a4e6d3</link>
                <pubDate>Sat, 04 Apr 2020 10:50:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/87342b53-f5d1-4e4f-95ae-c1becc008b09_44004ba5-027c-4f98-95a4-1feea1f8a79b_final_image.jpg"/>
                <itunes:duration>1477</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 9 Katia Dean and Resumes</itunes:title>
                <title>Season 3 Episode 9 Katia Dean and Resumes</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Katia Dean returns in this episode, where we talk about resume tips and ways to find cybersecurity jobs.</p><p><br></p><p>Check out Katia&#39;s website</p><p><a href="https://katiascylife.tech/" rel="nofollow">https://katiascylife.tech/</a></p><p><br></p><p>Connect with Katia on LinkedIn</p><p><a href="https://www.linkedin.com/in/katiadean/" rel="nofollow">https://www.linkedin.com/in/katiadean/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Katia Dean returns in this episode, where we talk about resume tips and ways to find cybersecurity jobs.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Check out Katia&amp;#39;s website&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://katiascylife.tech/&#34; rel=&#34;nofollow&#34;&gt;https://katiascylife.tech/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Katia on LinkedIn&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/katiadean/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/katiadean/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="26480640" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/31f8ebd6-0998-43ab-a40c-c48b6f3b0358/stream.mp3"/>
                
                <guid isPermaLink="false">6ad696c6-2041-40e8-bb64-e35893e0483c</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/31f8ebd6-0998-43ab-a40c-c48b6f3b0358</link>
                <pubDate>Wed, 01 Apr 2020 10:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/d693a806-58a7-40da-b375-acd9ce796862_d113565b-e8ac-4134-b8a2-e2636efd0c5f_final_image.jpg"/>
                <itunes:duration>1655</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 8 Hanging with George McPherson</itunes:title>
                <title>Season 3 Episode 8 Hanging with George McPherson</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, I was a guest on the Blak Cyber podcast with George McPherson, CASP.</p><p><br></p><p>Tune in as George and I discuss certifications, the best way to study for them, and some tips on being fiscally responsible. When your finances are in order, you can be a better practitioner.</p><p><br></p><p>Tune into George&#39;s podcast here: <a href="https://anchor.fm/blakcyber/episodes" rel="nofollow">https://anchor.fm/blakcyber/episodes</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, I was a guest on the Blak Cyber podcast with George McPherson, CASP.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune in as George and I discuss certifications, the best way to study for them, and some tips on being fiscally responsible. When your finances are in order, you can be a better practitioner.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune into George&amp;#39;s podcast here: &lt;a href=&#34;https://anchor.fm/blakcyber/episodes&#34; rel=&#34;nofollow&#34;&gt;https://anchor.fm/blakcyber/episodes&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="44266475" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/51e5bc8d-143e-413f-84a9-a4ad81ce5aca/stream.mp3"/>
                
                <guid isPermaLink="false">96bc2a80-79d4-4361-bcdb-4fbb9594dc97</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/51e5bc8d-143e-413f-84a9-a4ad81ce5aca</link>
                <pubDate>Sun, 29 Mar 2020 15:23:09 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/e4945442-6137-483b-bb43-af46233a4ce5_0f918a81-2454-4b01-92aa-0eb123cfdf64_final_image.jpg"/>
                <itunes:duration>2766</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 7 JOBS</itunes:title>
                <title>Season 3 Episode 7 JOBS</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, I will talk about the jobs that were tagged in a recent LinkedIn post. Also, the next several episodes of the podcast will focus on helping people find jobs in the industry.</p><p><br></p><p><strong>Recruiters: </strong></p><p><strong>Renee Small</strong></p><p><a href="https://www.linkedin.com/in/reneebrownsmall/" rel="nofollow">https://www.linkedin.com/in/reneebrownsmall/</a></p><p><strong>Ric Christopher</strong></p><p><a href="https://www.linkedin.com/in/ric-christopher-a9570670/" rel="nofollow">https://www.linkedin.com/in/ric-christopher-a9570670/</a></p><p><strong>Helen Hovey</strong></p><p><a href="https://www.linkedin.com/in/helen-hovey-hovey-7664a36/" rel="nofollow">https://www.linkedin.com/in/helen-hovey-hovey-7664a36/</a></p><p><strong>Raj Mayank</strong></p><p><a href="https://www.linkedin.com/in/mayank-raj-84aa20117/" rel="nofollow">https://www.linkedin.com/in/mayank-raj-84aa20117/</a></p><p><strong>Pete Strouse</strong> (owns talent company)</p><p><a href="https://www.linkedin.com/in/pete-strouse-b2193b42/" rel="nofollow">https://www.linkedin.com/in/pete-strouse-b2193b42/</a></p><p><strong>Neeraj Bhardwaj</strong> - <a href="mailto:neerajkum@etalentnetwork.com" rel="nofollow">neerajkum@etalentnetwork.com</a></p><p><strong>Travis Ralph</strong></p><p><a href="https://www.linkedin.com/in/travis-ralph/" rel="nofollow">https://www.linkedin.com/in/travis-ralph/</a></p><p><strong>Eric W.</strong></p><p><a href="https://www.linkedin.com/in/-eric-w/" rel="nofollow">https://www.linkedin.com/in/-eric-w/</a></p><p><strong>Kory Kiviharju</strong></p><p><a href="https://www.linkedin.com/in/kory-kiviharju-3ab457192/" rel="nofollow">https://www.linkedin.com/in/kory-kiviharju-3ab457192/</a></p><p><strong>Karl Sharman (not recruiter)</strong></p><p><a href="mailto:Karl.sharman@beechermadden.com" rel="nofollow">Karl.sharman@beechermadden.com</a></p><p><a href="https://www.linkedin.com/in/karl-sharmancybersecurity/" rel="nofollow">https://www.linkedin.com/in/karl-sharmancybersecurity/</a></p><p><strong>Drew Klauser</strong> (not recruiter – offering resume review and practice interviews)</p><p><a href="https://www.linkedin.com/in/drewklauser/" rel="nofollow">https://www.linkedin.com/in/drewklauser/</a></p><p><strong>Craig Philip</strong> (friend has an ISSO role open)</p><p><a href="https://www.linkedin.com/in/craig-philip/" rel="nofollow">https://www.linkedin.com/in/craig-philip/</a></p><p><strong>John Haden</strong> (Trend Micro – not a recruiter but had knowledge of some openings)</p><p><a href="https://www.linkedin.com/in/johndhaden/" rel="nofollow">https://www.linkedin.com/in/johndhaden/</a></p><p><strong>Zolile Mvabaza</strong> (had some roles in South Africa)</p><p><a href="https://www.linkedin.com/in/zolile-mvabaza-00599431/" rel="nofollow">https://www.linkedin.com/in/zolile-mvabaza-00599431/</a></p><p><strong>Gargee Chatterjee</strong> (had a role in Ohio)</p><p><a href="https://www.linkedin.com/in/gargee-chatterjee-869596174/" rel="nofollow">https://www.linkedin.com/in/gargee-chatterjee-869596174/</a></p><p><strong>Caleb Mattingly</strong> (has roles open at Aleta Technologies)</p><p><a href="https://www.linkedin.com/in/caleb-mattingly-a15b1343/" rel="nofollow">https://www.linkedin.com/in/caleb-mattingly-a15b1343/</a></p><p><strong>Nadica Hlechner</strong> (had some roles open in Austria)</p><p><a href="https://www.linkedin.com/in/nhlechner/" rel="nofollow">https://www.linkedin.com/in/nhlechner/</a></p><p><strong>Judy (JD) Cole</strong></p><p><a href="https://www.linkedin.com/in/judy-danielle-jd-cole-3ab787154/" rel="nofollow">https://www.linkedin.com/in/judy-danielle-jd-cole-3ab787154/</a></p><p><strong>Charlei P.</strong></p><p><a href="https://www.linkedin.com/in/charlei-p-8353a6a6/" rel="nofollow">https://www.linkedin.com/in/charlei-p-8353a6a6/</a></p><p><br></p><p><br></p><p><strong><u>COMPANIES</u></strong></p><p><br></p><p><strong>Mercury Systems</strong></p><p><a href="https://recruiting.adp.com/srccar/public/RTI.home?c=1162151&d=jobs.mrcy.com&r=5000590579406#/" rel="nofollow">https://recruiting.adp.com/srccar/public/RTI.home?c=1162151&amp;r=5000590579406&amp;d=jobs.mrcy.com#/</a></p><p><strong>Toronto-Dominion Bank</strong></p><p><a href="https://jobs.td.com/" rel="nofollow">https://jobs.td.com/</a></p><p><strong>Secure Strux (clearance probably needed)</strong></p><p><a href="https://securestrux.com/" rel="nofollow">https://securestrux.com/</a></p><p><strong>Excentium</strong></p><p><a href="https://excentium.com/careers/" rel="nofollow">https://excentium.com/careers/</a></p><p><strong>Century Link</strong></p><p><a href="https://jobs.centurylink.com/" rel="nofollow">https://jobs.centurylink.com/</a></p><p><strong>Anavation – need SECRET or higher</strong></p><p><a href="https://anavationllc.com/" rel="nofollow">https://anavationllc.com/</a></p><p><a href="https://www.linkedin.com/company/anavation-llc/" rel="nofollow">https://www.linkedin.com/company/anavation-llc/</a></p><p><strong>Ninja Jobs</strong></p><p><a href="http://www.ninjajobs.org/" rel="nofollow"><strong>http://www.ninjajobs.org/</strong></a><strong> </strong></p><p><strong>CyberSN</strong></p><p><a href="https://www.cybersn.com/" rel="nofollow">https://www.cybersn.com/</a></p><p><strong>Royal Mail Group</strong> (Great Britain jobs)</p><p><a href="https://jobs.royalmailgroup.com/search/" rel="nofollow">https://jobs.royalmailgroup.com/search/</a></p><p><br></p><p><strong>SecuriGence</strong></p><p><a href="https://www.securigence.com/securigence-careers/" rel="nofollow">https://www.securigence.com/securigence-careers/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, I will talk about the jobs that were tagged in a recent LinkedIn post. Also, the next several episodes of the podcast will focus on helping people find jobs in the industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Recruiters: &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Renee Small&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/reneebrownsmall/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/reneebrownsmall/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Ric Christopher&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/ric-christopher-a9570670/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/ric-christopher-a9570670/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Helen Hovey&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/helen-hovey-hovey-7664a36/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/helen-hovey-hovey-7664a36/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Raj Mayank&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/mayank-raj-84aa20117/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/mayank-raj-84aa20117/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Pete Strouse&lt;/strong&gt; (owns talent company)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/pete-strouse-b2193b42/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/pete-strouse-b2193b42/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Neeraj Bhardwaj&lt;/strong&gt; - &lt;a href=&#34;mailto:neerajkum@etalentnetwork.com&#34; rel=&#34;nofollow&#34;&gt;neerajkum@etalentnetwork.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Travis Ralph&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/travis-ralph/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/travis-ralph/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Eric W.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/-eric-w/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/-eric-w/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Kory Kiviharju&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/kory-kiviharju-3ab457192/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/kory-kiviharju-3ab457192/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Karl Sharman (not recruiter)&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;mailto:Karl.sharman@beechermadden.com&#34; rel=&#34;nofollow&#34;&gt;Karl.sharman@beechermadden.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/karl-sharmancybersecurity/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/karl-sharmancybersecurity/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Drew Klauser&lt;/strong&gt; (not recruiter – offering resume review and practice interviews)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/drewklauser/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/drewklauser/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Craig Philip&lt;/strong&gt; (friend has an ISSO role open)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/craig-philip/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/craig-philip/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;John Haden&lt;/strong&gt; (Trend Micro – not a recruiter but had knowledge of some openings)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/johndhaden/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/johndhaden/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Zolile Mvabaza&lt;/strong&gt; (had some roles in South Africa)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/zolile-mvabaza-00599431/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/zolile-mvabaza-00599431/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Gargee Chatterjee&lt;/strong&gt; (had a role in Ohio)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/gargee-chatterjee-869596174/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/gargee-chatterjee-869596174/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Caleb Mattingly&lt;/strong&gt; (has roles open at Aleta Technologies)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/caleb-mattingly-a15b1343/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/caleb-mattingly-a15b1343/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Nadica Hlechner&lt;/strong&gt; (had some roles open in Austria)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/nhlechner/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/nhlechner/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Judy (JD) Cole&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/judy-danielle-jd-cole-3ab787154/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/judy-danielle-jd-cole-3ab787154/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Charlei P.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/charlei-p-8353a6a6/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/charlei-p-8353a6a6/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;COMPANIES&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Mercury Systems&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://recruiting.adp.com/srccar/public/RTI.home?c=1162151&amp;d=jobs.mrcy.com&amp;r=5000590579406#/&#34; rel=&#34;nofollow&#34;&gt;https://recruiting.adp.com/srccar/public/RTI.home?c=1162151&amp;amp;r=5000590579406&amp;amp;d=jobs.mrcy.com#/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Toronto-Dominion Bank&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://jobs.td.com/&#34; rel=&#34;nofollow&#34;&gt;https://jobs.td.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Secure Strux (clearance probably needed)&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://securestrux.com/&#34; rel=&#34;nofollow&#34;&gt;https://securestrux.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Excentium&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://excentium.com/careers/&#34; rel=&#34;nofollow&#34;&gt;https://excentium.com/careers/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Century Link&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://jobs.centurylink.com/&#34; rel=&#34;nofollow&#34;&gt;https://jobs.centurylink.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Anavation – need SECRET or higher&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://anavationllc.com/&#34; rel=&#34;nofollow&#34;&gt;https://anavationllc.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/company/anavation-llc/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/anavation-llc/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Ninja Jobs&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;http://www.ninjajobs.org/&#34; rel=&#34;nofollow&#34;&gt;&lt;strong&gt;http://www.ninjajobs.org/&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CyberSN&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.cybersn.com/&#34; rel=&#34;nofollow&#34;&gt;https://www.cybersn.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Royal Mail Group&lt;/strong&gt; (Great Britain jobs)&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://jobs.royalmailgroup.com/search/&#34; rel=&#34;nofollow&#34;&gt;https://jobs.royalmailgroup.com/search/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SecuriGence&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.securigence.com/securigence-careers/&#34; rel=&#34;nofollow&#34;&gt;https://www.securigence.com/securigence-careers/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="11252715" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/aac5aac6-f181-4445-afaf-a9a12c4f289b/stream.mp3"/>
                
                <guid isPermaLink="false">0b3da372-6376-48f1-a138-5d0ece3417fe</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/aac5aac6-f181-4445-afaf-a9a12c4f289b</link>
                <pubDate>Thu, 26 Mar 2020 04:41:05 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/bf22f532-25aa-4637-891e-1d8165265d5f_977f3640-7a05-47a0-bb5b-b0035ed35969_final_image.jpg"/>
                <itunes:duration>703</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 6 Coronavirus with Eric Taylor, FNP-C</itunes:title>
                <title>Season 3 Episode 6 Coronavirus with Eric Taylor, FNP-C</title>

                
                <itunes:season>3</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                <itunes:subtitle>The real scoop on Coronavirus.</itunes:subtitle>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this special episode as I discuss COVID-19 with Family Nurse Practitioner Eric Taylor. Eric will tell us what we really need to do and cut through the media hype surrounding this virus.</p><p><br></p><p>Connect with Eric on LinkedIn</p><p><a href="https://www.linkedin.com/in/pryority-male-llc-826a4b20/" rel="nofollow">https://www.linkedin.com/in/pryority-male-llc-826a4b20/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this special episode as I discuss COVID-19 with Family Nurse Practitioner Eric Taylor. Eric will tell us what we really need to do and cut through the media hype surrounding this virus.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Eric on LinkedIn&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/pryority-male-llc-826a4b20/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/pryority-male-llc-826a4b20/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="27622504" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/cad0a206-fa43-46d5-a389-6a0e17bf4703/stream.mp3"/>
                
                <guid isPermaLink="false">4e14a2c6-df6c-4631-ad8d-b32e45e891ab</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/cad0a206-fa43-46d5-a389-6a0e17bf4703</link>
                <pubDate>Sat, 14 Mar 2020 23:45:37 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/99c00c1e-0763-4912-a892-800bec965587_60626133-d033-46de-8fa5-0a13b0b24f5b_3bbbc74a-a1da-4063-a2b3-6ce86c9f18e2_final_image.jpg"/>
                <itunes:duration>1726</itunes:duration>
                
                
                <itunes:explicit>yes</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 5: Jason and Brittany Hyman talk about Community Wealth</itunes:title>
                <title>Season 3 Episode 5: Jason and Brittany Hyman talk about Community Wealth</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I speak with real estate and community investors Jason and Brittany Hyman.</p><p><br></p><p>You can connect with them and learn how you can help your community here: <a href="https://www.jasonthyman.com/" rel="nofollow">https://www.jasonthyman.com/</a></p><p><br></p><p>Also, connect with them on LinkedIn.</p><p><br></p><p>Jason: <a href="https://www.linkedin.com/in/jasonthyman/" rel="nofollow">https://www.linkedin.com/in/jasonthyman/</a></p><p>Brittany: <a href="https://www.linkedin.com/in/brittany-hyman-9b417737/" rel="nofollow">https://www.linkedin.com/in/brittany-hyman-9b417737/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I speak with real estate and community investors Jason and Brittany Hyman.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;You can connect with them and learn how you can help your community here: &lt;a href=&#34;https://www.jasonthyman.com/&#34; rel=&#34;nofollow&#34;&gt;https://www.jasonthyman.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Also, connect with them on LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Jason: &lt;a href=&#34;https://www.linkedin.com/in/jasonthyman/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/jasonthyman/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Brittany: &lt;a href=&#34;https://www.linkedin.com/in/brittany-hyman-9b417737/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/brittany-hyman-9b417737/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="29405100" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/2e0a4637-89f6-4ebd-a22e-6197e788b614/stream.mp3"/>
                
                <guid isPermaLink="false">bda8a826-be0d-4747-b346-47ff6dea434e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/2e0a4637-89f6-4ebd-a22e-6197e788b614</link>
                <pubDate>Wed, 26 Feb 2020 08:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/8aea4f7e-4cfa-405a-b5f4-a873b1d84835_17bd2b93-4ed9-4b13-9522-dcd3899e25b8_final_image.jpg"/>
                <itunes:duration>1837</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 4: HOU.SEC.CON with Michael Farnum and Sam Van Ryder</itunes:title>
                <title>Season 3 Episode 4: HOU.SEC.CON with Michael Farnum and Sam Van Ryder</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, I&#39;m joined by two industry veterans, Michael Farnum and Sam Van Ryder, as they discuss why they started up HOU.SEC.CON and how attending can benefit you.</p><p><br></p><p>Get your tickets to HOU.SEC.CON here:</p><p><a href="https://www.eventbrite.com/e/houseccon-100-2020-sessions-tickets-75777136455" rel="nofollow">https://www.eventbrite.com/e/houseccon-100-2020-sessions-tickets-75777136455</a></p><p><br></p><p>Connect with Michael and Sam via LinkedIn.</p><p><br></p><p>Michael Farnum</p><p><a href="https://www.linkedin.com/in/mfarnum/" rel="nofollow">https://www.linkedin.com/in/mfarnum/</a></p><p><br></p><p>Sam Van Ryder</p><p><a href="https://www.linkedin.com/in/svanryder/" rel="nofollow">https://www.linkedin.com/in/svanryder/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, I&amp;#39;m joined by two industry veterans, Michael Farnum and Sam Van Ryder, as they discuss why they started up HOU.SEC.CON and how attending can benefit you.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Get your tickets to HOU.SEC.CON here:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.eventbrite.com/e/houseccon-100-2020-sessions-tickets-75777136455&#34; rel=&#34;nofollow&#34;&gt;https://www.eventbrite.com/e/houseccon-100-2020-sessions-tickets-75777136455&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Michael and Sam via LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Michael Farnum&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/mfarnum/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/mfarnum/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Sam Van Ryder&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/svanryder/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/svanryder/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="26089012" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/fe751705-a808-4bcf-9954-76b5efcbe938/stream.mp3"/>
                
                <guid isPermaLink="false">bd876615-1c83-424a-b60f-158004d69da7</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/fe751705-a808-4bcf-9954-76b5efcbe938</link>
                <pubDate>Thu, 20 Feb 2020 10:35:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/7f32979f-b89f-4e04-a773-deefa8e27429_42452d51-5d30-4e04-bcce-237b0dc7ebf9_final_image.jpg"/>
                <itunes:duration>1630</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 3 Slow Down with Jason Nickola</itunes:title>
                <title>Season 3 Episode 3 Slow Down with Jason Nickola</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I speak with penetration testing expert and COO, Jason Nickola, of Pulsar Security.</p><p><br></p><p>Connect with Jason here:</p><p><strong>Twitter</strong> - chm0dx</p><p><strong>LinkedIn</strong> - jasonnickola</p><p><a href="https://www.linkedin.com/in/jasonnickola/" rel="nofollow">https://www.linkedin.com/in/jasonnickola/</a></p><p><br></p><p>Jason is a Senior Security Consultant and COO at Pulsar Security, specializing in pentesting and red teaming. Equally passionate about enabling others in their journeys as he is about security and technology, Jason is an organizer of the BSides NH conference, A SANS instructor for SEC560: Network Pentesting and Ethical Hacking, a frequent speaker and trainer at both local and national events, and a founder of TechRamp, a nonprofit which aids in the transition to technical careers. He is a three-time Core Netwars Tournament champion and one of just 23 people in the world named by the SANS Institute as both a Red Team and Blue Team Cyber Guardian. </p><p><br></p><p>Jason has earned a long list of technical certifications including GIAC Security Expert (GSE), Offensive Security Certified Expert (OSCE), GXPN, GWAPT, GPEN, GREM, GCIA, GMON, GMOB, GNFA, GCUX, GCIH, GCWN, GCCC, GAWN, GSEC, GPYC, GSNA, GDAT, GCFA, GCDA, GCFE, GLEG, Certified Ethical Hacker, Security+, Network+, and OSCP.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I speak with penetration testing expert and COO, Jason Nickola, of Pulsar Security.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Jason here:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Twitter&lt;/strong&gt; - chm0dx&lt;/p&gt;&lt;p&gt;&lt;strong&gt;LinkedIn&lt;/strong&gt; - jasonnickola&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/jasonnickola/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/jasonnickola/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Jason is a Senior Security Consultant and COO at Pulsar Security, specializing in pentesting and red teaming. Equally passionate about enabling others in their journeys as he is about security and technology, Jason is an organizer of the BSides NH conference, A SANS instructor for SEC560: Network Pentesting and Ethical Hacking, a frequent speaker and trainer at both local and national events, and a founder of TechRamp, a nonprofit which aids in the transition to technical careers. He is a three-time Core Netwars Tournament champion and one of just 23 people in the world named by the SANS Institute as both a Red Team and Blue Team Cyber Guardian. &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Jason has earned a long list of technical certifications including GIAC Security Expert (GSE), Offensive Security Certified Expert (OSCE), GXPN, GWAPT, GPEN, GREM, GCIA, GMON, GMOB, GNFA, GCUX, GCIH, GCWN, GCCC, GAWN, GSEC, GPYC, GSNA, GDAT, GCFA, GCDA, GCFE, GLEG, Certified Ethical Hacker, Security&#43;, Network&#43;, and OSCP.&lt;/p&gt;</content:encoded>
                
                <enclosure length="36870687" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/eeb91686-ee66-4e98-adf2-73e4f7ffd0d7/stream.mp3"/>
                
                <guid isPermaLink="false">ef4d6f59-3495-4d7d-ad93-efa2b304418e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/eeb91686-ee66-4e98-adf2-73e4f7ffd0d7</link>
                <pubDate>Thu, 13 Feb 2020 06:30:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/c652f6ab-1b45-43db-b071-783f25207c7c_237d023a-7ff3-45ad-a403-5da6ce030e3a_final_image.jpg"/>
                <itunes:duration>2304</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3.2 Isiah&#39;s First Time</itunes:title>
                <title>Season 3.2 Isiah&#39;s First Time</title>

                <itunes:episode>2</itunes:episode>
                <itunes:season>3</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I speak with the myth, the man, and the ICS legend, Isiah Jones.</p><p><br></p><p>Find out what we mean by Isiah&#39;s first time and how he thinks we can fill the employment gap in the critical infrastructure space.</p><p><br></p><p>Connect with Isiah on social.</p><p><a href="https://www.linkedin.com/in/isiahjonesakaizzy/" rel="nofollow">https://www.linkedin.com/in/isiahjonesakaizzy/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I speak with the myth, the man, and the ICS legend, Isiah Jones.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Find out what we mean by Isiah&amp;#39;s first time and how he thinks we can fill the employment gap in the critical infrastructure space.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Isiah on social.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/isiahjonesakaizzy/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/isiahjonesakaizzy/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="42032065" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/3a1fd499-1587-4f0a-85fd-1e5407a56861/stream.mp3"/>
                
                <guid isPermaLink="false">8c4de36e-55dc-473a-b2dd-4950bbaa09aa</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/3a1fd499-1587-4f0a-85fd-1e5407a56861</link>
                <pubDate>Fri, 07 Feb 2020 07:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/9044cc6a-db71-43b0-b2c4-f694cae4cc8b_50486042-f447-4144-a414-026013c1830b_final_image.jpg"/>
                <itunes:duration>2627</itunes:duration>
                
                
                <itunes:explicit>yes</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 3 Episode 1: Brian Davidson &#34;The Sales Guy&#34;</itunes:title>
                <title>Season 3 Episode 1: Brian Davidson &#34;The Sales Guy&#34;</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>3</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join Brian Davidson and I in this episode as we dive into the secretive world of technology sales and take a deeper dive into Faith.</p><p><br></p><p>Connect with Brian on Linkedin.</p><p><a href="https://www.linkedin.com/in/bdavidson/" rel="nofollow">https://www.linkedin.com/in/bdavidson/</a></p><p><br></p><p><br></p><p>And be sure to check out his company.</p><p><a href="https://illyricum.io/" rel="nofollow">https://illyricum.io/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join Brian Davidson and I in this episode as we dive into the secretive world of technology sales and take a deeper dive into Faith.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Brian on Linkedin.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/bdavidson/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/bdavidson/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;And be sure to check out his company.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://illyricum.io/&#34; rel=&#34;nofollow&#34;&gt;https://illyricum.io/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="44569913" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5365c9b1-05d4-4093-8bfe-2b7af7009ad6/stream.mp3"/>
                
                <guid isPermaLink="false">83efe4fe-8ea4-483e-a682-b112a38a115a</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/5365c9b1-05d4-4093-8bfe-2b7af7009ad6</link>
                <pubDate>Mon, 27 Jan 2020 06:25:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/fa090266-3984-4586-994a-1905382a8312_903c9a9f-ee3b-48b0-b67c-23991fdfac43_final_image.jpg"/>
                <itunes:duration>2785</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 2 Episode 4: Adriana Bito</itunes:title>
                <title>Season 2 Episode 4: Adriana Bito</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>As we approach the end of the year, many of us take time for personal reflection. Join Adriana Bito, Founder of H Consulting, and I in this episode, where we talk about being happier in your life.</p><p><br></p><p>Adriana worked internationally as an engineer, making great money, but something was missing.</p><p><br></p><p>Listen to this episode and learn to be happier in life. Life is too short not to be happy.</p><p><br></p><p>Connect with Adriana.</p><p><br></p><p>Website: <a href="https://www.honestym.com/" rel="nofollow">https://www.honestym.com/</a></p><p><br></p><p>LinkedIn: <a href="https://www.linkedin.com/in/adriana-bito-honesty/" rel="nofollow">https://www.linkedin.com/in/adriana-bito-honesty/</a></p><p><br></p><p>Subscribe on YouTube: <a href="https://www.youtube.com/channel/UCAZxg-LIokQUifcgaNVKsmA" rel="nofollow">https://www.youtube.com/channel/UCAZxg-LIokQUifcgaNVKsmA</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;As we approach the end of the year, many of us take time for personal reflection. Join Adriana Bito, Founder of H Consulting, and I in this episode, where we talk about being happier in your life.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Adriana worked internationally as an engineer, making great money, but something was missing.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Listen to this episode and learn to be happier in life. Life is too short not to be happy.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Adriana.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Website: &lt;a href=&#34;https://www.honestym.com/&#34; rel=&#34;nofollow&#34;&gt;https://www.honestym.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;LinkedIn: &lt;a href=&#34;https://www.linkedin.com/in/adriana-bito-honesty/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/adriana-bito-honesty/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Subscribe on YouTube: &lt;a href=&#34;https://www.youtube.com/channel/UCAZxg-LIokQUifcgaNVKsmA&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCAZxg-LIokQUifcgaNVKsmA&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="10055262" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/eaa5296b-1f60-4399-ad2e-3f6a03411c59/stream.mp3"/>
                
                <guid isPermaLink="false">e8191b69-805b-4e5c-b19c-59fd3fe0efdb</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/eaa5296b-1f60-4399-ad2e-3f6a03411c59</link>
                <pubDate>Mon, 23 Dec 2019 15:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/097f9b4a-06ac-4136-b042-4331d431e70c_82326713-c56f-40f6-9029-916606861fd8_final_image.jpg"/>
                <itunes:duration>628</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 2 Episode 3: Aisha Griggs the CyberSec Nurse</itunes:title>
                <title>Season 2 Episode 3: Aisha Griggs the CyberSec Nurse</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join the legendary cybersecurity nurse Aisha Griggs and I in this episode as we talk about her new app (GUISE) on the Google App store and the book she&#39;s working on.</p><p><br></p><p>Does Aisha like puzzles? You have to listen to find out.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join the legendary cybersecurity nurse Aisha Griggs and I in this episode as we talk about her new app (GUISE) on the Google App store and the book she&amp;#39;s working on.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Does Aisha like puzzles? You have to listen to find out.&lt;/p&gt;</content:encoded>
                
                <enclosure length="27376744" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/73b0d066-74d2-4205-b362-b341841d31ef/stream.mp3"/>
                
                <guid isPermaLink="false">a8e792aa-3fdd-40d2-86f1-1eefae327562</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/73b0d066-74d2-4205-b362-b341841d31ef</link>
                <pubDate>Sun, 17 Nov 2019 12:35:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/e68f6ea3-5310-4e64-9a6e-f6b1b0825b8a_e68806c4-0e5a-43fd-a6e6-8165208f8e0e_final_image.jpg"/>
                <itunes:duration>1711</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 2: Episode 2 Tomiko Evans the Drone security expert</itunes:title>
                <title>Season 2: Episode 2 Tomiko Evans the Drone security expert</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join <strong>Tomiko Evans</strong> and I in this special episode of the Cyber Life podcast. Tomiko is an expert in drone security and a well-known cybersecurity rapper. She is also a business owner.</p><p><br></p><p>Check out Tomiko&#39;s mixed beat on policy at the start of this episode.</p><p><br></p><p>Connect with Tomiko on social media.</p><p><a href="https://www.linkedin.com/in/tomikokevans/" rel="nofollow">https://www.linkedin.com/in/tomikokevans/</a></p><p><br></p><p><br></p><p>Don&#39;t forget to subscribe to the Cyber Life podcast.</p><p>https://redcircle.com/shows/cyber-life</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join &lt;strong&gt;Tomiko Evans&lt;/strong&gt; and I in this special episode of the Cyber Life podcast. Tomiko is an expert in drone security and a well-known cybersecurity rapper. She is also a business owner.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Check out Tomiko&amp;#39;s mixed beat on policy at the start of this episode.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Tomiko on social media.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/tomikokevans/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/tomikokevans/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Don&amp;#39;t forget to subscribe to the Cyber Life podcast.&lt;/p&gt;&lt;p&gt;https://redcircle.com/shows/cyber-life&lt;/p&gt;</content:encoded>
                
                <enclosure length="53050305" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7534be21-c3d7-4955-8a0c-600db78001b7/stream.mp3"/>
                
                <guid isPermaLink="false">570843f0-f0c2-4df1-9574-1597c19e4d5a</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/7534be21-c3d7-4955-8a0c-600db78001b7</link>
                <pubDate>Sun, 10 Nov 2019 14:56:57 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/7d1bdc1b-0869-4c99-9a1f-36a6c3a22b38_56660aca-cd1e-4e39-870d-7807020af7d8_final_image.jpg"/>
                <itunes:duration>3315</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Season 2 Episode 1: The App Sec Queen Tanya Janca</itunes:title>
                <title>Season 2 Episode 1: The App Sec Queen Tanya Janca</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>2</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Welcome back to the Cyber Life podcast. We kick off Season 2 by speaking with Tanya Janca, an AppSec and development expert, and the CEO of Security Sidekick ( <a href="https://www.securitysidekick.dev/" rel="nofollow">https://www.securitysidekick.dev/</a> ).</p><p><br></p><p>Tanya gives some great career and life advice. You also get to learn about the special project she was working on the day we recorded the interview.</p><p><br></p><p>Connect with her:</p><p><a href="https://www.linkedin.com/in/tanya-janca/" rel="nofollow">https://www.linkedin.com/in/tanya-janca/</a></p><p><br></p><p>Find out more about the OWASP DevSlop project here:</p><p><a href="https://www.owasp.org/index.php/OWASP_DevSlop_Project" rel="nofollow">https://www.owasp.org/index.php/OWASP_DevSlop_Project</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Welcome back to the Cyber Life podcast. We kick off Season 2 by speaking with Tanya Janca, an AppSec and development expert, and the CEO of Security Sidekick ( &lt;a href=&#34;https://www.securitysidekick.dev/&#34; rel=&#34;nofollow&#34;&gt;https://www.securitysidekick.dev/&lt;/a&gt; ).&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tanya gives some great career and life advice. You also get to learn about the special project she was working on the day we recorded the interview.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with her:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/tanya-janca/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/tanya-janca/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Find out more about the OWASP DevSlop project here:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.owasp.org/index.php/OWASP_DevSlop_Project&#34; rel=&#34;nofollow&#34;&gt;https://www.owasp.org/index.php/OWASP_DevSlop_Project&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="35424130" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/85956e85-0034-4958-b689-28ef59261b6b/stream.mp3"/>
                
                <guid isPermaLink="false">1e88ce06-0a55-4904-9dc4-7a9c6fddf969</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/85956e85-0034-4958-b689-28ef59261b6b</link>
                <pubDate>Sun, 03 Nov 2019 12:30:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/d6bdbca1-1258-4334-aae5-504fac60acb2_532a2a36-185c-4211-85cd-376248c5edfc_7a1b0506-5db0-43e5-a3a0-8c275847815a_final_image.jpg"/>
                <itunes:duration>2213</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 21: Security Tips for Small Business Owners</itunes:title>
                <title>Episode 21: Security Tips for Small Business Owners</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I discuss some things every small business owner needs to think through for their security.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I discuss some things every small business owner needs to think through for their security.&lt;/p&gt;</content:encoded>
                
                <enclosure length="19740212" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/2099462e-578d-43cb-91c3-89504a39bd5a/stream.mp3"/>
                
                <guid isPermaLink="false">80da1757-36ae-4dfa-9129-7fa4d0a46baf</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/2099462e-578d-43cb-91c3-89504a39bd5a</link>
                <pubDate>Mon, 16 Sep 2019 11:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/f461ea67-978d-4e2f-9f1e-d34cf68661af_fb87000c-b24e-40c7-985c-e01394162a7b_final_image.jpg"/>
                <itunes:duration>1233</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 20: Terry Cutler &#34;The Magician Hacker&#34;</itunes:title>
                <title>Episode 20: Terry Cutler &#34;The Magician Hacker&#34;</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I interview an ethical hacker, business owner, and most importantly, <strong>magician</strong>, Terry Cutler, CEH. Terry has been a thought leader in the industry for many years and spends much of his time helping businesses secure their data.</p><p><br></p><p>Learn more abut Terry at the links below.</p><p><a href="https://terrycutler.com/" rel="nofollow">https://terrycutler.com/</a></p><p><br></p><p><a href="https://www.udemy.com/user/terry-cutler/" rel="nofollow">https://www.udemy.com/user/terry-cutler/</a></p><p><br></p><p>https://www.youtube.com/watch?v=p1Ovttle_3M</p><p><br></p><p><br></p><p>Also, grab some free financial training by clicking the link below.</p><p><a href="https://retire180.com/optin" rel="nofollow">https://retire180.com/optin</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I interview an ethical hacker, business owner, and most importantly, &lt;strong&gt;magician&lt;/strong&gt;, Terry Cutler, CEH. Terry has been a thought leader in the industry for many years and spends much of his time helping businesses secure their data.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn more abut Terry at the links below.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://terrycutler.com/&#34; rel=&#34;nofollow&#34;&gt;https://terrycutler.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.udemy.com/user/terry-cutler/&#34; rel=&#34;nofollow&#34;&gt;https://www.udemy.com/user/terry-cutler/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;https://www.youtube.com/watch?v=p1Ovttle_3M&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Also, grab some free financial training by clicking the link below.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://retire180.com/optin&#34; rel=&#34;nofollow&#34;&gt;https://retire180.com/optin&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="26086504" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7d5d8ec9-314f-4225-a9f8-84c46798d9db/stream.mp3"/>
                
                <guid isPermaLink="false">bceee2d3-02af-4b89-8bab-23a8dfea39d8</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/7d5d8ec9-314f-4225-a9f8-84c46798d9db</link>
                <pubDate>Sun, 08 Sep 2019 13:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/19b9b8d3-c2af-469b-83f1-db436835e7e8_b983ff08-8ee5-4a9c-8eae-450ff45058b2_c5218e7e-d84e-4adf-8294-a9cb8fe97832_5be7bce0-bfc4-4f25-9def-22551a00fedf_final_image.jpg"/>
                <itunes:duration>1630</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 19: The Man, the Myth, and the Legend: Dwaine Roberts</itunes:title>
                <title>Episode 19: The Man, the Myth, and the Legend: Dwaine Roberts</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I chat with the <strong>legendary</strong> Dwaine &#34;Rob&#34; Roberts.</p><p><br></p><p>Are you thinking about joining the military? You should probably listen to this episode first.</p><p><br></p><p>Does it take hard work to run a business? Tune in to find out.</p><p><br></p><p>Should you do an MBA degree? Tune in to hear our opinions.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I chat with the &lt;strong&gt;legendary&lt;/strong&gt; Dwaine &amp;#34;Rob&amp;#34; Roberts.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Are you thinking about joining the military? You should probably listen to this episode first.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Does it take hard work to run a business? Tune in to find out.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Should you do an MBA degree? Tune in to hear our opinions.&lt;/p&gt;</content:encoded>
                
                <enclosure length="51924323" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/cafce042-1cf9-4dec-9076-1e974476ea87/stream.mp3"/>
                
                <guid isPermaLink="false">694b310e-a6e2-4a9f-8558-adb63efcd639</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/cafce042-1cf9-4dec-9076-1e974476ea87</link>
                <pubDate>Sun, 01 Sep 2019 10:35:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/ba143019-3ff7-46e4-b8d4-ef3e4f04347e_de074325-b243-418e-bf8a-a9d651e6ef9e_final_image.jpg"/>
                <itunes:duration>3245</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 18: Push Through (Special Episode)</itunes:title>
                <title>Episode 18: Push Through (Special Episode)</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me as I peel back my iron curtain and expose some of the challenges I have faced in life. Someone out there needs to hear this. <strong>It will be the best 20 minutes you invested this week.</strong></p><p><br></p><p>This is a special presentation I did in my speaking mastermind group.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me as I peel back my iron curtain and expose some of the challenges I have faced in life. Someone out there needs to hear this. &lt;strong&gt;It will be the best 20 minutes you invested this week.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;This is a special presentation I did in my speaking mastermind group.&lt;/p&gt;</content:encoded>
                
                <enclosure length="21776927" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/bd50acd1-9412-4861-9af1-212b32580e0e/stream.mp3"/>
                
                <guid isPermaLink="false">ec6e5178-a35a-4a27-8f23-b0ea38a93f5c</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/bd50acd1-9412-4861-9af1-212b32580e0e</link>
                <pubDate>Wed, 28 Aug 2019 18:47:22 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/e31765b0-681a-4092-8971-14a604ede99d_2c707598-8626-4538-864b-b9b8d2357a3d_2d10f567-db94-4ec1-98a1-b7586e8cc7e8_final_image.jpg"/>
                <itunes:duration>1361</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 17: Financial Freedom</itunes:title>
                <title>Episode 17: Financial Freedom</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Welcome to episode 17 of the Cyber Life podcast.</p><p><br></p><p><strong>Money</strong>. Do you have it? Do you want it?</p><p><br></p><p>In this episode, I&#39;m going to break down the math to earn $120,000 and one million dollars per year.</p><p><br></p><p>Hint: It&#39;s easier then you think to hit these numbers.</p><p><br></p><p>We&#39;ll also talk about your personal finances.</p><p><br></p><p>If you&#39;re living paycheck to paycheck, like many Americans right now, this episode is one you don&#39;t want to miss.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Welcome to episode 17 of the Cyber Life podcast.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Money&lt;/strong&gt;. Do you have it? Do you want it?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, I&amp;#39;m going to break down the math to earn $120,000 and one million dollars per year.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Hint: It&amp;#39;s easier then you think to hit these numbers.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;We&amp;#39;ll also talk about your personal finances.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If you&amp;#39;re living paycheck to paycheck, like many Americans right now, this episode is one you don&amp;#39;t want to miss.&lt;/p&gt;</content:encoded>
                
                <enclosure length="28374413" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/ece15ed3-d9da-4310-bd61-f21d75dd60f6/stream.mp3"/>
                
                <guid isPermaLink="false">4fc06dce-ffe3-4b7a-8d3c-1636ab4bbe00</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/ece15ed3-d9da-4310-bd61-f21d75dd60f6</link>
                <pubDate>Mon, 26 Aug 2019 07:40:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/edac222f-5f42-498a-bf78-aaf5c44a5a87_a131a877-7528-44de-b6f4-e901960a035d_final_image.jpg"/>
                <itunes:duration>1773</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 16: &#34;Command Center&#34; with Teneyia Wilson</itunes:title>
                <title>Episode 16: &#34;Command Center&#34; with Teneyia Wilson</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in Episode 16, where I interview a young woman who is literally &#34;doing it all,&#34; Teneyia Wilson. Teneyia is a military spouse, mom, networking expert (working on her CCNP), car racer, fitness expert, and more!</p><p><br></p><p>Learn what it means, when Teneyia says &#34;<strong>hottie in the hot car</strong>&#34; in this episode.</p><p><br></p><p>She&#39;s also going to drop nuggets of &#34;<strong>knowledge gold</strong>.&#34;</p><p><br></p><p><strong><u>You don&#39;t want to miss this episode.</u></strong></p><p><br></p><p>Connect with Teneyia here:</p><p>LinkedIn</p><p><a href="https://www.linkedin.com/in/teneyia-wilson/" rel="nofollow">https://www.linkedin.com/in/teneyia-wilson/</a></p><p><br></p><p>Twitter @Teneyiaw</p><p><br></p><p>Instagram @Teneyialifts</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in Episode 16, where I interview a young woman who is literally &amp;#34;doing it all,&amp;#34; Teneyia Wilson. Teneyia is a military spouse, mom, networking expert (working on her CCNP), car racer, fitness expert, and more!&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Learn what it means, when Teneyia says &amp;#34;&lt;strong&gt;hottie in the hot car&lt;/strong&gt;&amp;#34; in this episode.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;She&amp;#39;s also going to drop nuggets of &amp;#34;&lt;strong&gt;knowledge gold&lt;/strong&gt;.&amp;#34;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;You don&amp;#39;t want to miss this episode.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Teneyia here:&lt;/p&gt;&lt;p&gt;LinkedIn&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/teneyia-wilson/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/teneyia-wilson/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Twitter @Teneyiaw&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Instagram @Teneyialifts&lt;/p&gt;</content:encoded>
                
                <enclosure length="28502308" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/47409f87-f0df-4b02-a73b-872a3f252290/stream.mp3"/>
                
                <guid isPermaLink="false">5ce72b7a-72a2-48d3-a137-0ef7dfdae852</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/47409f87-f0df-4b02-a73b-872a3f252290</link>
                <pubDate>Mon, 19 Aug 2019 07:45:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/e15e0d5d-5d92-4089-a8b6-d1c9ae5aa308_b31b069a-231f-440b-bd42-86c5b414f21a_final_image.jpg"/>
                <itunes:duration>1781</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 15: Black Hat USA Recap</itunes:title>
                <title>Episode 15: Black Hat USA Recap</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Just a quick overview of my experience at <strong>Black Hat USA</strong> this year.</p><p><br></p><p>Enjoy!</p><p><br></p><p>Don&#39;t forget to share this podcast with your friends and keep an eye out for future episodes.</p><p>A new episode is now released every Sunday to help you start your week off right!</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Just a quick overview of my experience at &lt;strong&gt;Black Hat USA&lt;/strong&gt; this year.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enjoy!&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Don&amp;#39;t forget to share this podcast with your friends and keep an eye out for future episodes.&lt;/p&gt;&lt;p&gt;A new episode is now released every Sunday to help you start your week off right!&lt;/p&gt;</content:encoded>
                
                <enclosure length="10223699" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/0c14a12e-cd49-4a6f-b79b-aaaf65b00081/stream.mp3"/>
                
                <guid isPermaLink="false">ad096a13-230a-43e8-9de4-ad2af19a2e8f</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/0c14a12e-cd49-4a6f-b79b-aaaf65b00081</link>
                <pubDate>Thu, 15 Aug 2019 16:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/1453f2a7-362a-4271-8662-83e7bdf8c4f3_851c16be-2fc8-436e-a99d-fa8adc990e3d_final_image.jpg"/>
                <itunes:duration>638</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 14: A Lovely Lady</itunes:title>
                <title>Episode 14: A Lovely Lady</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join my lovely spouse and I in this special episode as we talk about some of the sacrifices family members make to help you on your journey to success. Want to know what it takes? Tune in to find out.</p><p><br></p><p><strong>And don&#39;t forget to get your Cyber Life swag here:</strong></p><p><a href="https://teespring.com/new-cyber-life-podcast" rel="nofollow">https://teespring.com/new-cyber-life-podcast</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join my lovely spouse and I in this special episode as we talk about some of the sacrifices family members make to help you on your journey to success. Want to know what it takes? Tune in to find out.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;And don&amp;#39;t forget to get your Cyber Life swag here:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://teespring.com/new-cyber-life-podcast&#34; rel=&#34;nofollow&#34;&gt;https://teespring.com/new-cyber-life-podcast&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="11366400" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5cea9b19-23b9-4ba2-babb-9bfd4c8e26f5/stream.mp3"/>
                
                <guid isPermaLink="false">55f5cfc0-5b2f-4d93-939f-f1b9bcf300e5</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/5cea9b19-23b9-4ba2-babb-9bfd4c8e26f5</link>
                <pubDate>Sun, 11 Aug 2019 10:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/05322e73-baa0-43cf-9cf6-f47be8809610_6b286da6-ccc4-406a-9502-cbf76a713262_final_image.jpg"/>
                <itunes:duration>710</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 13: Hanging out on Marc Davenport&#39;s show</itunes:title>
                <title>Episode 13: Hanging out on Marc Davenport&#39;s show</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode of the Cyber Life podcast, you will get to listen in on my guest appearance on Marc Davenport&#39;s &#34;Straight to the Top&#34; show.</p><p><br></p><p><strong>Will Marc ever use apps on his phone again?</strong></p><p>Tune in to find out.</p><p><br></p><p>And don&#39;t forget to get your Cyber Life swag at the link below:</p><p><a href="https://teespring.com/new-cyber-life-podcast" rel="nofollow">https://teespring.com/new-cyber-life-podcast</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode of the Cyber Life podcast, you will get to listen in on my guest appearance on Marc Davenport&amp;#39;s &amp;#34;Straight to the Top&amp;#34; show.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Will Marc ever use apps on his phone again?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Tune in to find out.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;And don&amp;#39;t forget to get your Cyber Life swag at the link below:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://teespring.com/new-cyber-life-podcast&#34; rel=&#34;nofollow&#34;&gt;https://teespring.com/new-cyber-life-podcast&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="45029250" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4a5cfffe-9480-41d4-a94b-6b0314d06f31/stream.mp3"/>
                
                <guid isPermaLink="false">8eabac6f-78e9-4073-9902-32e0e0b88b11</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/4a5cfffe-9480-41d4-a94b-6b0314d06f31</link>
                <pubDate>Thu, 08 Aug 2019 05:15:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/8288348d-bd57-48e9-a15c-309808bd3fbc_6b9c893c-deb3-4891-9b88-ea7edae0433b_final_image.jpg"/>
                <itunes:duration>2814</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 12: &#34;Bet on Yourself FIRST&#34; with O&#39;Shea Bowens</itunes:title>
                <title>Episode 12: &#34;Bet on Yourself FIRST&#34; with O&#39;Shea Bowens</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join the world-famous cybersecurity defender, O&#39;Shea Bowens, and I in this episode as we discuss his journey into the industry.</p><p><br></p><p>Why did O&#39;Shea initially go for a fashion design degree in college?</p><p><strong>Hint:</strong> I became a nurse for a similar reason.</p><p><br></p><p>Tune in to find out his answer to that question and to hear great advice for people getting into the industry, experienced people in the industry, and business owners.</p><p><br></p><p>Don&#39;t forget to get your Cyber Life swag here:</p><p><a href="https://teespring.com/new-cyber-life-podcast" rel="nofollow">https://teespring.com/new-cyber-life-podcast</a></p><p><br></p><p><br></p><p>Also, connect with him on social media and check out his podcast below.</p><p><br></p><p>Twitter: <a href="https://twitter.com/SirMuDbl00d/media" rel="nofollow">https://twitter.com/SirMuDbl00d/media</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/o-shea-bowens-52344915/" rel="nofollow">https://www.linkedin.com/in/o-shea-bowens-52344915/</a></p><p>Company: <a href="https://nullhatsecurity.org/" rel="nofollow">https://nullhatsecurity.org/</a></p><p>Podcast: <a href="https://intrusionds.com/podcast/" rel="nofollow">https://intrusionds.com/podcast/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join the world-famous cybersecurity defender, O&amp;#39;Shea Bowens, and I in this episode as we discuss his journey into the industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Why did O&amp;#39;Shea initially go for a fashion design degree in college?&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hint:&lt;/strong&gt; I became a nurse for a similar reason.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune in to find out his answer to that question and to hear great advice for people getting into the industry, experienced people in the industry, and business owners.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Don&amp;#39;t forget to get your Cyber Life swag here:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://teespring.com/new-cyber-life-podcast&#34; rel=&#34;nofollow&#34;&gt;https://teespring.com/new-cyber-life-podcast&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Also, connect with him on social media and check out his podcast below.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Twitter: &lt;a href=&#34;https://twitter.com/SirMuDbl00d/media&#34; rel=&#34;nofollow&#34;&gt;https://twitter.com/SirMuDbl00d/media&lt;/a&gt;&lt;/p&gt;&lt;p&gt;LinkedIn: &lt;a href=&#34;https://www.linkedin.com/in/o-shea-bowens-52344915/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/o-shea-bowens-52344915/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Company: &lt;a href=&#34;https://nullhatsecurity.org/&#34; rel=&#34;nofollow&#34;&gt;https://nullhatsecurity.org/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Podcast: &lt;a href=&#34;https://intrusionds.com/podcast/&#34; rel=&#34;nofollow&#34;&gt;https://intrusionds.com/podcast/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="34547252" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/eb969300-da8b-4fa6-a8f8-281a6357d2fc/stream.mp3"/>
                
                <guid isPermaLink="false">76382344-101f-4ff5-b93f-dccbafc8c87a</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/eb969300-da8b-4fa6-a8f8-281a6357d2fc</link>
                <pubDate>Sun, 04 Aug 2019 08:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/583c8fed-68a5-4934-abf1-94b57113b992_6ce12d9d-7d29-49b3-9bce-91daf1388deb_e5ac5fce-a2b8-41c3-b0c8-cc48f5d0ea4e_0fbc9917-73d9-4e1c-834b-d1ce3b487084_bb26b739-5697-41e9-96ed-2e76a24fe3e1_1c8aaae2-e0d8-4a4f-ae7e-b9b2056b5e2a_cyber_life.jpg"/>
                <itunes:duration>2159</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Special Episode 2: Teaching Assistant Shout Out</itunes:title>
                <title>Special Episode 2: Teaching Assistant Shout Out</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I give a shout out to the teaching assistants that helped me on a recent project for the Black Hat USA conference.</p><p><br></p><p><br></p><p>Connect with them on LinkedIn.</p><p><br></p><p><strong>Alec Mather-Shapiro</strong></p><p><a href="https://www.linkedin.com/in/alec-mather-shapiro/" rel="nofollow">https://www.linkedin.com/in/alec-mather-shapiro/</a></p><p><br></p><p><strong>Claudia Morris</strong></p><p><a href="https://www.linkedin.com/in/claudiamorr15/" rel="nofollow">https://www.linkedin.com/in/claudiamorr15/</a></p><p><br></p><p><strong>Jimmy Savage</strong></p><p><a href="https://www.linkedin.com/in/jimmy-savage-5a31b943/" rel="nofollow">https://www.linkedin.com/in/jimmy-savage-5a31b943/</a></p><p><br></p><p><strong>Madhuri Javiya</strong></p><p><a href="https://www.linkedin.com/in/madhuri-javiya/" rel="nofollow">https://www.linkedin.com/in/madhuri-javiya/</a></p><p><br></p><p><strong>Kjartan Leroy</strong></p><p><a href="https://www.linkedin.com/in/kjsl/" rel="nofollow">https://www.linkedin.com/in/kjsl/</a></p><p><br></p><p><strong>S M Zia Ur Rashid</strong></p><p><a href="https://www.linkedin.com/in/ziaurrashid/" rel="nofollow">https://www.linkedin.com/in/ziaurrashid/</a></p><p><br></p><p><strong>Nazarene Abejar</strong></p><p><a href="https://www.linkedin.com/in/itsecurity3/" rel="nofollow">https://www.linkedin.com/in/itsecurity3/</a></p><p><br></p><p><strong>Afifa Abbas</strong></p><p><a href="https://www.linkedin.com/in/afifa-abbas-0b107a90/" rel="nofollow">https://www.linkedin.com/in/afifa-abbas-0b107a90/</a></p><p><br></p><p><strong>Yohannes Tikuye</strong></p><p><a href="https://www.linkedin.com/in/yohannestikuye/" rel="nofollow">https://www.linkedin.com/in/yohannestikuye/</a></p><p><br></p><p><strong>Kuldeepsinh Sodha</strong></p><p><a href="https://www.linkedin.com/in/kusodha/" rel="nofollow">https://www.linkedin.com/in/kusodha/</a></p><p><br></p><p><strong>Mark Grover</strong></p><p><a href="https://www.linkedin.com/in/markgrovermsscience1406/" rel="nofollow">https://www.linkedin.com/in/markgrovermsscience1406/</a></p><p><br></p><p><strong>Tahir Ibrahim</strong></p><p><a href="https://www.linkedin.com/in/tahir-ibrahim/" rel="nofollow">https://www.linkedin.com/in/tahir-ibrahim/</a></p><p><br></p><p><strong>Abdul Ali Khan</strong></p><p><a href="https://www.linkedin.com/in/abdul-ali-khan-620632144/" rel="nofollow">https://www.linkedin.com/in/abdul-ali-khan-620632144/</a></p><p><br></p><p><strong>Mehmet Leblebici</strong></p><p><a href="https://www.linkedin.com/in/mehmetleblebici/" rel="nofollow">https://www.linkedin.com/in/mehmetleblebici/</a></p><p><br></p><p><strong>Samia Oukemeni</strong></p><p><a href="https://www.linkedin.com/in/SamiaOukemeni/" rel="nofollow">https://www.linkedin.com/in/SamiaOukemeni/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I give a shout out to the teaching assistants that helped me on a recent project for the Black Hat USA conference.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with them on LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Alec Mather-Shapiro&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/alec-mather-shapiro/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/alec-mather-shapiro/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Claudia Morris&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/claudiamorr15/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/claudiamorr15/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Jimmy Savage&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/jimmy-savage-5a31b943/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/jimmy-savage-5a31b943/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Madhuri Javiya&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/madhuri-javiya/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/madhuri-javiya/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Kjartan Leroy&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/kjsl/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/kjsl/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;S M Zia Ur Rashid&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/ziaurrashid/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/ziaurrashid/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Nazarene Abejar&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/itsecurity3/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/itsecurity3/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Afifa Abbas&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/afifa-abbas-0b107a90/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/afifa-abbas-0b107a90/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Yohannes Tikuye&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/yohannestikuye/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/yohannestikuye/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Kuldeepsinh Sodha&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/kusodha/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/kusodha/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Mark Grover&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/markgrovermsscience1406/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/markgrovermsscience1406/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Tahir Ibrahim&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/tahir-ibrahim/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/tahir-ibrahim/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Abdul Ali Khan&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/abdul-ali-khan-620632144/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/abdul-ali-khan-620632144/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Mehmet Leblebici&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/mehmetleblebici/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/mehmetleblebici/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Samia Oukemeni&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/SamiaOukemeni/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/SamiaOukemeni/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="29759111" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/123f2272-3984-42d9-8917-7ec44730e0f1/stream.mp3"/>
                
                <guid isPermaLink="false">ee2ff0da-5919-4950-9b67-d482a121c2b8</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/123f2272-3984-42d9-8917-7ec44730e0f1</link>
                <pubDate>Sat, 03 Aug 2019 06:01:48 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/50504d9b-732b-4d88-819e-323c7487b4de_d216a6b6-0b46-4f1b-9ec0-6f25b6598540_9156f307-4435-4f52-ba41-e1bf0d91241b_cyber_life.jpg"/>
                <itunes:duration>1859</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Special Episode 1: Instructor Shout Out</itunes:title>
                <title>Special Episode 1: Instructor Shout Out</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode of the Cyber Life podcast, I give a special shout out to some instructors that recently helped me on a project for the Black Hat USA conference.</p><p><br></p><p><br></p><p><br></p><p><strong>Rasha Sharif</strong></p><p><a href="https://www.linkedin.com/in/rasha-sharif-41359825/" rel="nofollow">https://www.linkedin.com/in/rasha-sharif-41359825/</a></p><p><br></p><p><strong>Dustin Parry</strong></p><p><a href="https://www.linkedin.com/in/parryd/" rel="nofollow">https://www.linkedin.com/in/parryd/</a></p><p><br></p><p><strong>Isaac Bewarang</strong></p><p><a href="https://www.linkedin.com/in/isaac-bewarang-2a615510/" rel="nofollow">https://www.linkedin.com/in/isaac-bewarang-2a615510/</a></p><p><br></p><p><strong>David Biser</strong></p><p><a href="https://www.linkedin.com/in/david-biser-37875533/" rel="nofollow">https://www.linkedin.com/in/david-biser-37875533/</a></p><p><br></p><p><strong>Gerri Roberts</strong></p><p><a href="https://www.linkedin.com/in/gerrianne-roberts-9b09a811/" rel="nofollow">https://www.linkedin.com/in/gerrianne-roberts-9b09a811/</a></p><p><br></p><p><strong>Adalberto Garcia</strong></p><p><a href="https://www.linkedin.com/in/adalberto-jos%C3%A9-g-4b735255/" rel="nofollow">https://www.linkedin.com/in/adalberto-jos%C3%A9-g-4b735255/</a></p><p><br></p><p><strong>Nick Moy</strong></p><p><a href="https://www.linkedin.com/in/nicolasisaiahmoy/" rel="nofollow">https://www.linkedin.com/in/nicolasisaiahmoy/</a></p><p><br></p><p><strong>Ayokunle Olaniyi </strong></p><p><a href="https://www.linkedin.com/in/ayokunle-olaniyi-a49007150/" rel="nofollow">https://www.linkedin.com/in/ayokunle-olaniyi-a49007150/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode of the Cyber Life podcast, I give a special shout out to some instructors that recently helped me on a project for the Black Hat USA conference.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Rasha Sharif&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/rasha-sharif-41359825/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/rasha-sharif-41359825/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Dustin Parry&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/parryd/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/parryd/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Isaac Bewarang&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/isaac-bewarang-2a615510/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/isaac-bewarang-2a615510/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;David Biser&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/david-biser-37875533/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/david-biser-37875533/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Gerri Roberts&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/gerrianne-roberts-9b09a811/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/gerrianne-roberts-9b09a811/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Adalberto Garcia&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/adalberto-jos%C3%A9-g-4b735255/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/adalberto-jos%C3%A9-g-4b735255/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Nick Moy&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/nicolasisaiahmoy/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/nicolasisaiahmoy/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Ayokunle Olaniyi &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/ayokunle-olaniyi-a49007150/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/ayokunle-olaniyi-a49007150/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="7579271" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/300d3dd4-e1c2-494f-b790-ee6d77591d7c/stream.mp3"/>
                
                <guid isPermaLink="false">61d035a2-5ddf-40da-b506-b10748bd5c44</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/300d3dd4-e1c2-494f-b790-ee6d77591d7c</link>
                <pubDate>Thu, 01 Aug 2019 12:11:47 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/70b8e1ba-ffaa-4473-8964-4215d2c06abe_0d876b28-18f0-44e8-9404-c3a9cada0ddb_af03812d-d6ce-4337-aca4-b9ad625f73de_cyber_life.jpg"/>
                <itunes:duration>473</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 11: &#34;Branding&#34; with Matt Scheurer</itunes:title>
                <title>Episode 11: &#34;Branding&#34; with Matt Scheurer</title>

                
                
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join me in this episode as I speak with Matt Scheurer. Matt is an Ambassador for Bugcrowd and works as a Security Engineer at an undisclosed organization.</p><p><br></p><p><br></p><p><br></p><p><br></p><p>Listen in as Matt and I chat about his path into cybersecurity and find out what conferences he will be speaking at.</p><p><br></p><p>Also check out the great presentation he did at OISF on continuous skills improvement here:</p><p><a href="https://youtu.be/Se-qPMIfLRI" rel="nofollow">https://youtu.be/Se-qPMIfLRI</a></p><p><br></p><p>Matt also gives us his position on the &#34;trifecta&#34; of certifications, experience, and college degrees.</p><p><br></p><p>You don&#39;t want to miss this episode.</p><p><br></p><p>Connect with Matt on LinkedIn.</p><p><a href="https://www.linkedin.com/in/mattscheurer/" rel="nofollow">https://www.linkedin.com/in/mattscheurer/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join me in this episode as I speak with Matt Scheurer. Matt is an Ambassador for Bugcrowd and works as a Security Engineer at an undisclosed organization.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Listen in as Matt and I chat about his path into cybersecurity and find out what conferences he will be speaking at.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Also check out the great presentation he did at OISF on continuous skills improvement here:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://youtu.be/Se-qPMIfLRI&#34; rel=&#34;nofollow&#34;&gt;https://youtu.be/Se-qPMIfLRI&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Matt also gives us his position on the &amp;#34;trifecta&amp;#34; of certifications, experience, and college degrees.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;You don&amp;#39;t want to miss this episode.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Matt on LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/mattscheurer/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/mattscheurer/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="22174824" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/3cd46b3b-13b3-47c2-8a60-f8e63325eeef/stream.mp3"/>
                
                <guid isPermaLink="false">bf4f987e-17d0-48db-a638-ca0e471903fa</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/3cd46b3b-13b3-47c2-8a60-f8e63325eeef</link>
                <pubDate>Thu, 01 Aug 2019 10:05:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/62578eb8-f921-457e-88d8-eafd0cfb99a0_46010955d_74517f5d-d008-4724-8249-0f36fe8146eb_7be6ba1e-35cd-4d99-b4dc-97db2946dde1_ed2c606c-f975-4449-9030-293958993e55_3fbe9ec7-3342-46af-bc23-a38da370c2e8_ab896657-48f1-4ac8-ab5e-3b229658a805_1.jpg"/>
                <itunes:duration>1385</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 10: &#34;Make sure you&#39;re doing it for the right reasons&#34; with Chris Foulon, CISSP, CRISC</itunes:title>
                <title>Episode 10: &#34;Make sure you&#39;re doing it for the right reasons&#34; with Chris Foulon, CISSP, CRISC</title>

                <itunes:episode>10</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>&#34;<strong>Make sure you&#39;re doing it for the right reasons</strong>.&#34;</p><p><br></p><p>In Episode 10 of the Cyber Life podcast, join cybersecurity expert Chris Foulon, CISSP, CRISC as we discuss some sound advice for people looking to get into the industry.</p><p><br></p><p><br></p><p><br></p><p>Take a journey with Chris as he reminisces from his sales days to discovering his true calling in cybersecurity.</p><p><br></p><p>Chris also explains what &#34;Digital Transformation&#34; means.</p><p><br></p><p><strong><u>Connect with Chris on LinkedIn</u></strong></p><p><a href="https://www.linkedin.com/in/christophefoulon/" rel="nofollow">https://www.linkedin.com/in/christophefoulon/</a></p><p><br></p><p><strong><u>Book one-on-one consulting with Chris</u></strong></p><p><a href="https://cpfcoaching.wordpress.com/" rel="nofollow">https://cpfcoaching.wordpress.com/</a></p><p><br></p><p><strong><u>Check out Chris and Renee&#39;s podcast</u></strong></p><p>Are you interested in Breaking into Cybersecurity? Curious as to what it takes? Check out our series <a href="https://www.linkedin.com/feed/hashtag/?keywords=%23BreakingIntoCybersecurity" rel="nofollow">#BreakingIntoCybersecurity</a> on Podcast<a href="https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698" rel="nofollow">https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698</a> on YouTube <a href="https://www.youtube.com/channel/UCM3YAEDu6W7JmQc0kb-CNtw/featured" rel="nofollow">https://www.youtube.com/channel/UCM3YAEDu6W7JmQc0kb-CNtw/featured</a>on OnDemand at <a href="https://www.crowdcast.io/e/breaking-into-2/" rel="nofollow">https://www.crowdcast.io/e/breaking-into-2/</a></p><p>Sharing it with others is appreciated, as it helps to raise awareness.</p><p><br></p><p><br></p><p><strong><u>Renee&#39;s book on hiring</u></strong></p><p><a href="https://www.amazon.com/Magnetic-Hiring-Companys-Attracting-Security-ebook/dp/B07H9L27Y7/ref=sr_1_1?crid=1J1FPRW43FXUX&keywords=magnetic+hiring&qid=1563588829&s=gateway&sprefix=magnetic+hiring%2Caps%2C172&sr=8-1" rel="nofollow">https://www.amazon.com/Magnetic-Hiring-Companys-Attracting-Security-ebook/dp/B07H9L27Y7/ref=sr_1_1?crid=1J1FPRW43FXUX&amp;keywords=magnetic+hiring&amp;qid=1563588829&amp;s=gateway&amp;sprefix=magnetic+hiring%2Caps%2C172&amp;sr=8-1</a></p><p><br></p><p><br></p><p><strong><u>Keirsten Brager, CISSP&#39;s book we mention in this episode.</u></strong></p><p><a href="https://keirstenbrager.tech/securetheinfosecbag/" rel="nofollow">https://keirstenbrager.tech/securetheinfosecbag/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&amp;#34;&lt;strong&gt;Make sure you&amp;#39;re doing it for the right reasons&lt;/strong&gt;.&amp;#34;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In Episode 10 of the Cyber Life podcast, join cybersecurity expert Chris Foulon, CISSP, CRISC as we discuss some sound advice for people looking to get into the industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Take a journey with Chris as he reminisces from his sales days to discovering his true calling in cybersecurity.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Chris also explains what &amp;#34;Digital Transformation&amp;#34; means.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Connect with Chris on LinkedIn&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/christophefoulon/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/christophefoulon/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Book one-on-one consulting with Chris&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://cpfcoaching.wordpress.com/&#34; rel=&#34;nofollow&#34;&gt;https://cpfcoaching.wordpress.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Check out Chris and Renee&amp;#39;s podcast&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Are you interested in Breaking into Cybersecurity? Curious as to what it takes? Check out our series &lt;a href=&#34;https://www.linkedin.com/feed/hashtag/?keywords=%23BreakingIntoCybersecurity&#34; rel=&#34;nofollow&#34;&gt;#BreakingIntoCybersecurity&lt;/a&gt; on Podcast&lt;a href=&#34;https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698&#34; rel=&#34;nofollow&#34;&gt;https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698&lt;/a&gt; on YouTube &lt;a href=&#34;https://www.youtube.com/channel/UCM3YAEDu6W7JmQc0kb-CNtw/featured&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCM3YAEDu6W7JmQc0kb-CNtw/featured&lt;/a&gt;on OnDemand at &lt;a href=&#34;https://www.crowdcast.io/e/breaking-into-2/&#34; rel=&#34;nofollow&#34;&gt;https://www.crowdcast.io/e/breaking-into-2/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Sharing it with others is appreciated, as it helps to raise awareness.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Renee&amp;#39;s book on hiring&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.amazon.com/Magnetic-Hiring-Companys-Attracting-Security-ebook/dp/B07H9L27Y7/ref=sr_1_1?crid=1J1FPRW43FXUX&amp;keywords=magnetic&#43;hiring&amp;qid=1563588829&amp;s=gateway&amp;sprefix=magnetic&#43;hiring%2Caps%2C172&amp;sr=8-1&#34; rel=&#34;nofollow&#34;&gt;https://www.amazon.com/Magnetic-Hiring-Companys-Attracting-Security-ebook/dp/B07H9L27Y7/ref=sr_1_1?crid=1J1FPRW43FXUX&amp;amp;keywords=magnetic&#43;hiring&amp;amp;qid=1563588829&amp;amp;s=gateway&amp;amp;sprefix=magnetic&#43;hiring%2Caps%2C172&amp;amp;sr=8-1&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Keirsten Brager, CISSP&amp;#39;s book we mention in this episode.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://keirstenbrager.tech/securetheinfosecbag/&#34; rel=&#34;nofollow&#34;&gt;https://keirstenbrager.tech/securetheinfosecbag/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="26852205" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/dd45780a-e601-48b9-a5cb-2d730f276c77/stream.mp3"/>
                
                <guid isPermaLink="false">6a666675-b3fe-4275-a15d-f82a79f0c3c8</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/dd45780a-e601-48b9-a5cb-2d730f276c77</link>
                <pubDate>Sun, 28 Jul 2019 10:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/57fe0c6b-c6da-4939-b7bc-767e6b66ed10__ce00ca3f-e58e-4930-9aa7-bdc2226abafb_fd05213f-8a36-41bd-85c6-9341dfd1d08f_6b831661-a72e-420a-b201-99e9a90e98a0_53b9e0af-9d67-4bcb-8baa-abfa556922fa_78f6e154-374a-481a-a5e0-1f9c2b211b2f_cyber_life.jpg"/>
                <itunes:duration>1678</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 9: &#34;Have a service mindset&#34; with Matt Armstrong</itunes:title>
                <title>Episode 9: &#34;Have a service mindset&#34; with Matt Armstrong</title>

                <itunes:episode>9</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join us in Episode 9 of the Cyber Life podcast, where I chat with Matt Armstrong, CCNA, Sec+, Pentest+.</p><p><br></p><p><br></p><p>Matt works as a Network Infrastructure Engineer for a university and is one of the most humble people I know.</p><p><br></p><p>Join Matt and I as we discuss his journey from the <strong>treacherous dungeon</strong> of running network cables, to the exciting world of firewall configuration. Matt also shares 2 of the tools he recommends everyone learn.</p><p>What are they?</p><p>It&#39;s a SECRET, unless you listen.</p><p><br></p><p>You may be wondering:</p><p><strong>Has Matt ever had to do pushups, like they do in the military?</strong></p><p><br></p><p>Tune in to find out.</p><p><br></p><p>...and just when you thought this episode couldn&#39;t get any better...Matt and I will also talk about the importance of <strong>gratitude</strong>.</p><p><br></p><p>Why are you still reading this? Listen to the episode now.</p><p><br></p><p>Spoiler Alert: Matt&#39;s Top 5 Games</p><p>1. Overwatch</p><p>2. Counter-Strike: Source</p><p>3. Battlefield 1942</p><p>4. Age of Empires 2</p><p>5. Myst</p><p><br></p><p><br></p><p>Connect with Matt on LinkedIn</p><p><a href="https://www.linkedin.com/in/marmstrong94/" rel="nofollow">https://www.linkedin.com/in/marmstrong94/</a></p><p><br></p><p>Matt also talks about CompTIA stackable certifications. Check out more information at the link below.</p><p><br></p><p>https://certification.comptia.org/certifications/which-certification/stackable-certifications</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join us in Episode 9 of the Cyber Life podcast, where I chat with Matt Armstrong, CCNA, Sec&#43;, Pentest&#43;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Matt works as a Network Infrastructure Engineer for a university and is one of the most humble people I know.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join Matt and I as we discuss his journey from the &lt;strong&gt;treacherous dungeon&lt;/strong&gt; of running network cables, to the exciting world of firewall configuration. Matt also shares 2 of the tools he recommends everyone learn.&lt;/p&gt;&lt;p&gt;What are they?&lt;/p&gt;&lt;p&gt;It&amp;#39;s a SECRET, unless you listen.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;You may be wondering:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Has Matt ever had to do pushups, like they do in the military?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune in to find out.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;...and just when you thought this episode couldn&amp;#39;t get any better...Matt and I will also talk about the importance of &lt;strong&gt;gratitude&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Why are you still reading this? Listen to the episode now.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Spoiler Alert: Matt&amp;#39;s Top 5 Games&lt;/p&gt;&lt;p&gt;1. Overwatch&lt;/p&gt;&lt;p&gt;2. Counter-Strike: Source&lt;/p&gt;&lt;p&gt;3. Battlefield 1942&lt;/p&gt;&lt;p&gt;4. Age of Empires 2&lt;/p&gt;&lt;p&gt;5. Myst&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Matt on LinkedIn&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/marmstrong94/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/marmstrong94/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Matt also talks about CompTIA stackable certifications. Check out more information at the link below.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;https://certification.comptia.org/certifications/which-certification/stackable-certifications&lt;/p&gt;</content:encoded>
                
                <enclosure length="28875128" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/98b05ad3-d576-4875-a8e9-ab26c4512a3d/stream.mp3"/>
                
                <guid isPermaLink="false">624baa31-4752-4c58-9e42-cd7a99b839f4</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/98b05ad3-d576-4875-a8e9-ab26c4512a3d</link>
                <pubDate>Thu, 25 Jul 2019 09:10:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/0ddd210a-da33-44cd-a191-8fae3d9945be__6285ed69-3394-47b9-9df2-69b3a8b640d1_87bcf778-9f1f-411b-95e1-369d308011e9_483396a5-22f6-4061-a159-099b33f15d9d_441cde1b-f7d7-41e3-b41e-6012ac18d148_6f50f3f2-088a-4bdf-8b96-54d6d4aab5fa_cyber_life.jpg"/>
                <itunes:duration>1804</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 8: &#34;NIST Barbie&#34; with Katoria Henry</itunes:title>
                <title>Episode 8: &#34;NIST Barbie&#34; with Katoria Henry</title>

                <itunes:episode>8</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Join us in this episode as I speak with a future CISO, Katoria Henry, M.S. Katoria is a mentor to many people in the industry and took an unconventional approach to getting into the industry.</p><p><br></p><p><strong>Katoria is also affectionately known as the &#34;NIST Barbie.&#34;</strong></p><p><br></p><p>Tune in to find out why.</p><p><br></p><p>Katoria also shares her story of being an identity theft victim and also shares some advice on keeping your data safe.</p><p><br></p><p>This is an action-packed episode, with tons of good advice.</p><p><br></p><p>Connect with Katoria on LinkedIn</p><p><a href="https://www.linkedin.com/in/katoria-henry-2018/" rel="nofollow">https://www.linkedin.com/in/katoria-henry-2018/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Join us in this episode as I speak with a future CISO, Katoria Henry, M.S. Katoria is a mentor to many people in the industry and took an unconventional approach to getting into the industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Katoria is also affectionately known as the &amp;#34;NIST Barbie.&amp;#34;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune in to find out why.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Katoria also shares her story of being an identity theft victim and also shares some advice on keeping your data safe.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;This is an action-packed episode, with tons of good advice.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with Katoria on LinkedIn&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/katoria-henry-2018/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/katoria-henry-2018/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="50432626" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/e333a0ba-d168-4c7b-b750-9e8d8325a559/stream.mp3"/>
                
                <guid isPermaLink="false">3a494841-f6f5-4dc1-bb1d-1aa6c1e71883</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/e333a0ba-d168-4c7b-b750-9e8d8325a559</link>
                <pubDate>Sun, 21 Jul 2019 11:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/470a2458-fc4b-42e4-bc8b-970593ddc60f__0c6cbe04-9014-4da0-b34c-d4196c75ac39_ad400b3d-d47a-4ffd-b56e-8fae365abcca_65172f63-0516-445f-829e-0d5adbafbee4_505b4b30-a6af-43bb-829e-ed9df24ec9af_cfbb53fb-92b5-46e2-8f54-53757dd0be6f_cyber_life.jpg"/>
                <itunes:duration>3152</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 7: &#34;Don&#39;t be paper&#34; with George McPherson</itunes:title>
                <title>Episode 7: &#34;Don&#39;t be paper&#34; with George McPherson</title>

                <itunes:episode>7</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode of the Cyber Life podcast, I interview George McPherson, CASP, CEH.</p><p><br></p><p>George holds over 20 certifications in the industry and is a military veteran. You can often find George mentoring newcomers to the industry on LinkedIn.</p><p><br></p><p>In this episode, we talk about George&#39;s journey into the industry and he gives great advice on what it really takes to make it (Hint: sitting on your couch eating a bag of chips is not the key to making it).</p><p><br></p><p>What does George mean by &#34;Don&#39;t be paper?&#34;</p><p><br></p><p>Tune into this episode to find out.</p><p><br></p><p>Connect with George on LinkedIn:</p><p><a href="https://www.linkedin.com/in/georgemcpherson77/" rel="nofollow">https://www.linkedin.com/in/georgemcpherson77/</a></p><p><br></p><p>George&#39;s Cybersecurity Blog Link:</p><p><a href="https://cybergeorge.home.blog/author/mcphersongcyber/" rel="nofollow">https://cybergeorge.home.blog/author/mcphersongcyber/</a></p><p><br></p><p>George&#39;s Twitter:</p><p><a href="https://twitter.com/theitsecguru" rel="nofollow">https://twitter.com/theitsecguru</a></p><p><br></p><p>[Other interests]</p><p>George&#39;s Voiceover Site:</p><p><a href="https://www.mcphersonvo.com/" rel="nofollow">https://www.mcphersonvo.com/</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode of the Cyber Life podcast, I interview George McPherson, CASP, CEH.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;George holds over 20 certifications in the industry and is a military veteran. You can often find George mentoring newcomers to the industry on LinkedIn.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, we talk about George&amp;#39;s journey into the industry and he gives great advice on what it really takes to make it (Hint: sitting on your couch eating a bag of chips is not the key to making it).&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;What does George mean by &amp;#34;Don&amp;#39;t be paper?&amp;#34;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune into this episode to find out.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Connect with George on LinkedIn:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/georgemcpherson77/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/georgemcpherson77/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;George&amp;#39;s Cybersecurity Blog Link:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://cybergeorge.home.blog/author/mcphersongcyber/&#34; rel=&#34;nofollow&#34;&gt;https://cybergeorge.home.blog/author/mcphersongcyber/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;George&amp;#39;s Twitter:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://twitter.com/theitsecguru&#34; rel=&#34;nofollow&#34;&gt;https://twitter.com/theitsecguru&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;[Other interests]&lt;/p&gt;&lt;p&gt;George&amp;#39;s Voiceover Site:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.mcphersonvo.com/&#34; rel=&#34;nofollow&#34;&gt;https://www.mcphersonvo.com/&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="24279666" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/480acb70-e5b6-4112-a20a-66b83e2e80ba/stream.mp3"/>
                
                <guid isPermaLink="false">4e729a03-06a2-42af-83fe-c8a6db4e0440</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/480acb70-e5b6-4112-a20a-66b83e2e80ba</link>
                <pubDate>Thu, 18 Jul 2019 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/f990e1e4-b997-484e-a393-81f47a484a72__06bfc352-378a-4ea7-9713-63f236292dcf_e53f0287-87e9-42d8-abd4-77b4aee18901_eda2918e-e861-4805-98be-8b7cc94b825c_7b400de1-659e-48bd-8310-0f1d2dcbc165_43f7724e-13d3-4064-9ac3-0271bc3cc1ef_cyber_life.jpg"/>
                <itunes:duration>1517</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 6: What it &#34;really takes&#34; to be successful with Corey Charles</itunes:title>
                <title>Episode 6: What it &#34;really takes&#34; to be successful with Corey Charles</title>

                <itunes:episode>6</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Welcome to Episode 6 of the Cyber Life podcast, where I interview Vulnerability Management and Forensic expert, <strong>Corey Charles, PhD</strong>.</p><p><br></p><p><br></p><p>Corey owns his own consulting company, is an online educator, author, and mentors many people in the cybersecurity industry.</p><p><br></p><p><strong>He is also a Martial Arts expert </strong>and family man.</p><p><br></p><p>What does Corey think are some of the keys to success in business?</p><p><br></p><p><strong>...&#34;Be led by helping others.&#34;</strong></p><p><br></p><p>Tune in to hear some other <strong>Secret Advice</strong> on life and your career from Corey Charles.</p><p><br></p><p><strong><u>Connect with Corey on LinkedIn</u></strong></p><p><a href="https://www.linkedin.com/in/corey-charles-08753323/" rel="nofollow">https://www.linkedin.com/in/corey-charles-08753323/</a></p><p><br></p><p><br></p><p><strong><u>Check out Corey&#39;s books on Amazon</u></strong></p><p><a href="https://www.amazon.com/Corey-Charles/e/B07PZ1YG2J?qid=1563132333&ref=sr_ntt_srch_lnk_1&sr=8-1" rel="nofollow">https://www.amazon.com/Corey-Charles/e/B07PZ1YG2J?ref=sr_ntt_srch_lnk_1&amp;qid=1563132333&amp;sr=8-1</a></p><p><br></p><p><strong><u>Schedule a consultation for your business with Corey here</u></strong></p><p>https://calendly.com/corey-charles </p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Welcome to Episode 6 of the Cyber Life podcast, where I interview Vulnerability Management and Forensic expert, &lt;strong&gt;Corey Charles, PhD&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Corey owns his own consulting company, is an online educator, author, and mentors many people in the cybersecurity industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;He is also a Martial Arts expert &lt;/strong&gt;and family man.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;What does Corey think are some of the keys to success in business?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;...&amp;#34;Be led by helping others.&amp;#34;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune in to hear some other &lt;strong&gt;Secret Advice&lt;/strong&gt; on life and your career from Corey Charles.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Connect with Corey on LinkedIn&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.linkedin.com/in/corey-charles-08753323/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/corey-charles-08753323/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Check out Corey&amp;#39;s books on Amazon&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.amazon.com/Corey-Charles/e/B07PZ1YG2J?qid=1563132333&amp;ref=sr_ntt_srch_lnk_1&amp;sr=8-1&#34; rel=&#34;nofollow&#34;&gt;https://www.amazon.com/Corey-Charles/e/B07PZ1YG2J?ref=sr_ntt_srch_lnk_1&amp;amp;qid=1563132333&amp;amp;sr=8-1&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Schedule a consultation for your business with Corey here&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;https://calendly.com/corey-charles &lt;/p&gt;</content:encoded>
                
                <enclosure length="25508466" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/989cee3d-4697-46c2-b829-0c939a1edb6d/stream.mp3"/>
                
                <guid isPermaLink="false">1e72db6b-d918-406c-97a3-aed69f321712</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/989cee3d-4697-46c2-b829-0c939a1edb6d</link>
                <pubDate>Sun, 14 Jul 2019 19:27:22 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/6da47cfb-4176-4be6-ab05-7398c439bbff__57dd19e5-dea2-47c9-a83d-8ee9f395be63_b7c142f1-b79c-45b3-bf5d-142798e2d22d_367a7180-1653-4dd9-b48e-c9dee5135a58_d17b5698-d743-4937-9536-c1f50eeadaaf_d038ba89-b05a-48a3-ab7b-1e840e9ae67e_cyber_life.jpg"/>
                <itunes:duration>1594</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 5: Career Advice from Katia Dean</itunes:title>
                <title>Episode 5: Career Advice from Katia Dean</title>

                <itunes:episode>5</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, join me as I interview cyber security expert, Katia Dean and she shares advice on how to break into the cyber security industry.</p><p><br></p><p>We&#39;ll also talk about some of the projects that Katia is working on and of course, <strong>her loving furbaby, Buster</strong>.</p><p><br></p><p>If you&#39;ve ever wanted the real scoop from those working in the industry, check out this episode.</p><p><br></p><p><strong>Katia&#39;s LinkedIn</strong> (Be sure to send a message with any connection requests): <a href="https://www.linkedin.com/in/katiadean/" rel="nofollow">https://www.linkedin.com/in/katiadean/</a></p><p><br></p><p><strong>Katia&#39;s cyber security career blog</strong>: https://katiascylife.tech </p><p><br></p><p><strong>Katia&#39;s resume and career coaching services</strong>: katiascylife@gmail.com</p><p><br></p><p><strong>Katia&#39;s Pet Business </strong></p><p>Peaceful Paws: <a href="https://peacefulpawsnaturalcare.com/" rel="nofollow">https://peacefulpawsnaturalcare.com/</a></p><p><br></p><p><strong><u>Don&#39;t forget to complete this survey and help Katia out!</u></strong></p><p>https://docs.google.com/forms/d/e/1FAIpQLScf5UxRP-Z8nZ1w-TPYmn4sBG4REm60rruea1nWGVMrwPWLyg/viewform?vc=0&amp;c=0&amp;w=1</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, join me as I interview cyber security expert, Katia Dean and she shares advice on how to break into the cyber security industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;We&amp;#39;ll also talk about some of the projects that Katia is working on and of course, &lt;strong&gt;her loving furbaby, Buster&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;If you&amp;#39;ve ever wanted the real scoop from those working in the industry, check out this episode.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Katia&amp;#39;s LinkedIn&lt;/strong&gt; (Be sure to send a message with any connection requests): &lt;a href=&#34;https://www.linkedin.com/in/katiadean/&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/in/katiadean/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Katia&amp;#39;s cyber security career blog&lt;/strong&gt;: https://katiascylife.tech &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Katia&amp;#39;s resume and career coaching services&lt;/strong&gt;: katiascylife@gmail.com&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Katia&amp;#39;s Pet Business &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Peaceful Paws: &lt;a href=&#34;https://peacefulpawsnaturalcare.com/&#34; rel=&#34;nofollow&#34;&gt;https://peacefulpawsnaturalcare.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Don&amp;#39;t forget to complete this survey and help Katia out!&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;https://docs.google.com/forms/d/e/1FAIpQLScf5UxRP-Z8nZ1w-TPYmn4sBG4REm60rruea1nWGVMrwPWLyg/viewform?vc=0&amp;amp;c=0&amp;amp;w=1&lt;/p&gt;</content:encoded>
                
                <enclosure length="31985998" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/989e370f-b8f1-4c8e-8ba7-a9a3d6511c03/stream.mp3"/>
                
                <guid isPermaLink="false">5b591ceb-44ef-443d-8e5f-f0748ff4839c</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/989e370f-b8f1-4c8e-8ba7-a9a3d6511c03</link>
                <pubDate>Fri, 12 Jul 2019 00:26:50 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/84cfae2c-af54-4ba5-9be5-b6d6f8e14cf5__3ce92efb-6436-46de-a7d6-a25aeb50cca1_fd76a284-fef9-4e0c-acc2-fdbf2673b002_c955e71a-dfb3-4798-bfb5-f861ba48ab35_7ee9f965-c671-4963-8ad1-b0ed7f88ee26_db213311-9e9f-430a-b187-35f6ee360e86_cyber_life.jpg"/>
                <itunes:duration>1999</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 4: Unicorn Employees</itunes:title>
                <title>Episode 4: Unicorn Employees</title>

                <itunes:episode>4</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, we talk about the right way to treat employees in your company. You will hear some examples of top-tier people that have left their jobs (or even the industry) because they were not treated well.</p><p><br></p><p><br></p><p>What&#39;s the key to retaining employees?</p><p>Hint: It&#39;s not salary alone.</p><p><br></p><p>Tune in to find out the answer.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, we talk about the right way to treat employees in your company. You will hear some examples of top-tier people that have left their jobs (or even the industry) because they were not treated well.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;What&amp;#39;s the key to retaining employees?&lt;/p&gt;&lt;p&gt;Hint: It&amp;#39;s not salary alone.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Tune in to find out the answer.&lt;/p&gt;</content:encoded>
                
                <enclosure length="22398014" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7d8d8818-7527-4d7c-a30c-2a9c0c47600e/stream.mp3"/>
                
                <guid isPermaLink="false">827f7349-d409-4474-b622-fde5486e4fb4</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/7d8d8818-7527-4d7c-a30c-2a9c0c47600e</link>
                <pubDate>Tue, 09 Jul 2019 04:58:11 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/e5457e9f-378e-4492-81ab-19e038568cef__54b1b706-4d4f-43d9-a225-712ee4c4e438_9cc06ac8-aad8-4905-923c-18a486b8a245_f235c770-ede8-42cf-9966-3d66d9339709_7603acd1-aed7-4229-990c-77106b1c90e6_b987d032-5388-40a5-914c-646ce0e44de0_cyber_life.jpg"/>
                <itunes:duration>1399</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 3: The Power Grid</itunes:title>
                <title>Episode 3: The Power Grid</title>

                <itunes:episode>3</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>Welcome to Episode 3 of the Cyber Life podcast!</p><p>In this episode, we briefly discuss the government&#39;s plan to revert to a manual process to protect our critical infrastructure. Their goal is to reduce the impact of a cyber attack that cripples the infrastructure.</p><p><br></p><p>What are your thoughts?</p><p><br></p><p>Do you think that the Securing Energy Infrastructure Act (SEIA) should be passed?</p><p><br></p><p>Will it really help?</p><p><br></p><p>Read more at the Forbes article here:</p><p><a href="https://www.forbes.com/sites/kateoflahertyuk/2019/07/03/u-s-government-makes-surprise-move-to-secure-power-grid-from-cyber-attacks/#382126163191" rel="nofollow">https://www.forbes.com/sites/kateoflahertyuk/2019/07/03/u-s-government-makes-surprise-move-to-secure-power-grid-from-cyber-attacks/#382126163191</a></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Welcome to Episode 3 of the Cyber Life podcast!&lt;/p&gt;&lt;p&gt;In this episode, we briefly discuss the government&amp;#39;s plan to revert to a manual process to protect our critical infrastructure. Their goal is to reduce the impact of a cyber attack that cripples the infrastructure.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;What are your thoughts?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Do you think that the Securing Energy Infrastructure Act (SEIA) should be passed?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Will it really help?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Read more at the Forbes article here:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.forbes.com/sites/kateoflahertyuk/2019/07/03/u-s-government-makes-surprise-move-to-secure-power-grid-from-cyber-attacks/#382126163191&#34; rel=&#34;nofollow&#34;&gt;https://www.forbes.com/sites/kateoflahertyuk/2019/07/03/u-s-government-makes-surprise-move-to-secure-power-grid-from-cyber-attacks/#382126163191&lt;/a&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="5405466" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/dc8acd2a-d68e-47ea-9352-9098d9e4fb17/stream.mp3"/>
                
                <guid isPermaLink="false">fa207f19-6606-4e8e-91a3-54859ff6355e</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/dc8acd2a-d68e-47ea-9352-9098d9e4fb17</link>
                <pubDate>Sat, 06 Jul 2019 02:16:29 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/43621bd0-1b1f-497e-934c-fcdb4fac753e__ddf03dbf-5746-4552-ac15-e56e27c138e3_3f7fa89c-f081-4630-be6f-6344ae0a3537_84568bf7-02a5-4b9e-b43a-7913cae06677_3ebe7ec0-359d-4310-a8b1-7b1107fd6d82_44a1fc95-1107-41a5-a8c4-e06546ffc707_cyber_life.jpg"/>
                <itunes:duration>337</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 2: &#34;Cybersecurity Bootcamps&#34;</itunes:title>
                <title>Episode 2: &#34;Cybersecurity Bootcamps&#34;</title>

                <itunes:episode>2</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, I provide a delicious rant on the &#34;cybersecurity bootcamps&#34; that have been rising up in the industry the past few years.</p><p><br></p><p><br></p><p>Want to know my opinion on what you should do? Tune in to find out.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, I provide a delicious rant on the &amp;#34;cybersecurity bootcamps&amp;#34; that have been rising up in the industry the past few years.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Want to know my opinion on what you should do? Tune in to find out.&lt;/p&gt;</content:encoded>
                
                <enclosure length="30335895" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/c949e2d2-c814-4356-a0fb-e8e77e774c2f/stream.mp3"/>
                
                <guid isPermaLink="false">e5e593ff-4386-457e-b543-ad63f316db1a</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/c949e2d2-c814-4356-a0fb-e8e77e774c2f</link>
                <pubDate>Thu, 04 Jul 2019 04:18:47 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/b8a37bda-76fd-439f-a2f6-a93934eb6d20__f7960c33-3001-456a-8e24-d114504fab1c_501bb282-32d8-4242-b3d4-4b9b429c8fa7_f781cfce-8055-47ec-aa9e-0549111bec69_a1ab51e1-7c9d-443b-add3-38a1eac2f303_95d40420-2008-43a9-9251-9093bccfcc23_cyber_life.jpg"/>
                <itunes:duration>1895</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Episode 1: Cyber Security Jobs</itunes:title>
                <title>Episode 1: Cyber Security Jobs</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Ken Underhill</itunes:author>
                <itunes:summary>In this episode, we talk about getting jobs in the cyber security industry. Do you need a PhD to get a job? What about certifications? Find out the secrets in this episode.</itunes:summary>
                <description><![CDATA[<p><span>👕 Get your official Cyber Life swag here: </span>https://bit.ly/CyberLifeSwag   </p><p>Subscribe to the Cyber Life TV YouTube Channel</p><p><a href="https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug" rel="nofollow">https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug</a><span> </span></p><p><br></p><p>Follow us on LinkedIn: <a href="https://www.linkedin.com/company/cyber-life" rel="nofollow">https://www.linkedin.com/company/cyber-life</a><span> </span></p><p><br></p><p>Follow us across other social media in the coming months as well.</p><p><span>👉 Facebook https://www.facebook.com/therealcyberlife </span></p><p><span>👉 InstaGram https://www.instagram.com/officialcyberlife/</span></p><p><span>👉 Twitter https://twitter.com/RealCyberLife</span></p><p><br></p><p>www.cyberlife.tv</p><p><br></p><p>In this episode, we talk about getting jobs in the cyber security industry. Do you need a PhD to get a job? What about certifications? Find out the secrets in this episode.</p><p><br></p><p><strong> </strong></p><p><br></p><p><strong><u>Episode Transcript</u></strong></p><p><br></p><p><strong> </strong>[00:00:00] Hi everyone welcome to episode one of the cyber life podcast. My name is Ken Underhill. I&#39;ll be your host. In today&#39;s episode, we&#39;re going to talk about cyber security jobs. Now there&#39;s a lot of myths out there on how you should get a job right. Should I get a go get a masters degree in cyber security should I go get a doctorate degree and the reality behind that is a degree is not going to help you get a job necessarily. Now for some jobs they want you to have a bachelors degree or maybe a Masters if you&#39;re in certain jobs, or doctorate if for teaching at the university level. But for the most part it&#39;s about skills. And this industry, unfortunately, is very, very heavy on certifications. That being said there are so many certifications. I literally know people that have like 40 or 50 certifications. Now will certifications get you a job. Not necessarily. So there are some certs that might help you get your foot in the door. You know maybe help you get past that robotic resume filter that H.R. departments have. And there are some key ones. There are things like CompTIA&#39;s Security Plus. That&#39;s kind of an entry level generalized security certification. Also, I want to state that I&#39;m not endorsing any of these certifications. I don&#39;t have any special deal or anything with them. Other entry level ones that may be beneficial to you are things like the Amazon AWS certifications or even like Google Cloud certification. Primarily though AmazonAWS. One thing to note about this industry is you really have to network quite a bit and then you also need to brand yourself. So you&#39;ve got to show why are you different. Right. And it&#39;s not just you saying like &#34;oh yeah I can do this job right&#34; or &#34;I have these skills I can do this.&#34; You really need to show that. So, whether that&#39;s you maybe creating an online course, maybe that&#39;s you having a YouTube channel where you throw up some videos. For example let&#39;s say you want to be a SOC Analyst. And so you throw up some YouTube videos showing you using you know the free version of Splunk and analyzing some data. Right. Or it shows you analyzing packets with Wireshark. Just something that actually shows an employer that you actually have a skill. Right. And then I mentioned networking and it&#39;s not so much of having like five million LinkedIn connections or five million Facebook page likes. That&#39;s not networking. Networking is you getting off your rear-end, going out to different conferences or meetings in your areas and building those real relationships. And then from there, after you&#39;ve delivered some value to those people, saying &#34;hey by the way I&#39;m looking for a job. If you hear something that might be a good fit let me know.&#34; You know. Or &#34;Hey I&#39;m trying to get into company X. I noticed that you work there. I know we&#39;ve been chatting a bit at this meetup. Are there any positions open you know of, even if they&#39;re not cyber security-related? I just want to really get my foot in the door at that company.&#34; Something that a lot of people don&#39;t know about, at least I don&#39;t think they know about a lot of times, is that companies if they want you, they&#39;ll just create a job for you you know and a lot of times it&#39;s about the person that you connect with going back to their boss and saying &#34;hey this person is really, really good. What can we do to get them working here? Can we get them in here part-time or in an internship or something just to get them working here because they&#39;re really, really good.&#34; And like I said a lot of times it&#39;s all about the fact that you&#39;ve networked with different people within that organization. The other thing I want to talk about, briefly is resume&#39;s. So I notice a lot of cookie-cutter resumes out there and some of them are very terrible. You know some people want to use like fancy fonts and different colorings and just try to make it look super, super cool. The reality is a lot of times that doesn&#39;t even get through the filter for the H.R. department. And honestly the best way to get through the filters is by handing a human your resumé or you know writing a letter in and we&#39;ll talk about kind of how to get into your your quote on quote dream company in just a second. So with your resumé just some key things that I recommend. Again, I&#39;ll flat out say I&#39;m not a resume writing expert. I don&#39;t sell you a resume writing template or anything like that. I have no financial gain by you getting a better resume. So I&#39;m just gonna tell you what&#39;s worked for me and if you want to use that great. If you don&#39;t, hopefully you get that job, you know, hopefully you get an interview and get the job. So, the first thing is I always like to throw a quote at the very top of my resume from someone you know maybe a professor or maybe a past manager just somebody that would give you a quote you know like &#34;hey, this person is a hard worker&#34; or whatever the case might be. Now with that, make sure it&#39;s somebody that kind of has some credentials so don&#39;t just pick like the lowest level helpdesk person to write you a review. That&#39;s fine if that&#39;s all you can get, but try to get somebody like a manager or you know somebody with an advanced degree or advanced certifications. Basically, you just want somebody that you can throw a bunch of alphabet soup after their name, a bunch of different letters that tries to impress the H.R. person looking at your resume.</p><p><br></p><p><strong> </strong>[00:05:07] After that quote, you know because again a quote helps a lot, like if you think of you going to Amazon for example and you go to buy a product, you&#39;re going to look at the reviews right. At least most people are going to look through those reviews and if you see a people leaving reviews on a product you&#39;re more likely to buy that one if it&#39;s got five star reviews or four star reviews than a product with no reviews, right. Most of us do it that way. Some people still want to buy the product with no reviews, but most people are going to buy a product that has the four or five star reviews, similar psychology philosophy here.</p><p><br></p><p><strong> </strong>[00:05:36] We&#39;re trying to get the H.R. person or the hiring manager that&#39;s looking at your résumé to say &#34;oh, this person that has all these credentials after their name is saying that this person is really good. So, why don&#39;t I go ahead and set them up for an interview?&#34;.</p><p><br></p><p><strong> </strong>[00:05:51] The next part on the resumé I would do is bullet points. So right after that quote you list from somebody, go ahead and put bullet points listing out some of the key things you have done. Not you know &#34;I was responsible for this or that&#34; but instead list quantifiable information. &#34;I completed this project that directly led to five thousand dollars extra a month for the company.&#34; Right. Or I closed this deal that netted the company one hundred million dollars. I reduced the time to launch on this product by implementing you know my strategy of X, which made this project more successful. Measurable things, so that way somebody can quickly look at that and say &#34;Ok, this person produces results&#34; because at the end of the day if I&#39;m trying to hire you, I want to know that you can come in and produce results for me. You don&#39;t have to know everything technically right up front. Right. I can train you on a lot of stuff, but if I see that you&#39;re producing results for somebody else already it&#39;s a lot easier to make that decision to bring you in for an interview.</p><p><br></p><p><strong> </strong>[00:06:56] The next area I would go with is your education. So just quickly listing out you if you have a bachelor&#39;s degree, master&#39;s, or associates. If you don&#39;t have a college degree you can just skip part that. Or if you&#39;ve done some kind of like a boot camp training then you can put that in there, like a coding boot camp or whatever. After that, put any type of awards or certifications you have. This is so the HR search will find you when they are looking for a Security Plus, CASP, CEH, Pentest Plus, whatever. You could also list awards you got in college, so for example if you received an award for a 4.0 GPA, you could list that.</p><p><br></p><p><strong> </strong>[00:07:37] After that section, list out anything you&#39;ve done in the industry, so anything you&#39;ve done to contribute to the industry. So after you&#39;ve listed out any awards and certifications, the next section should be your contributions to the community. Now, if you don&#39;t have any then just leave that section off your resume. But if you&#39;ve done any type of volunteer work, if you volunteered at different events, like a security conference for example, list that on there. It just shows that you&#39;re really in for the long haul with the industry.</p><p><br></p><p><strong> </strong>[00:08:24] The next section is going to be any other type of give back type of stuff, so volunteer work or whatever. And then after that move into your actual work experience.</p><p><br></p><p><strong> </strong>[00:08:35] What you&#39;re trying to do there with that format I use is you&#39;re just trying to somewhat lay it on thick of all the stuff you&#39;ve done because most people don&#39;t care about your work experience. If they see that you&#39;ve got all these other criteria in their head that&#39;s the reality of it.</p><p><br></p><p><strong> </strong>[00:08:51] There was some study that was done a while ago and I read through it. I forget the name of it. Basically, they went around and interviewed all these hiring managers. And they were asking them &#34;what is important to you of these criteria that are listed out in the survey&#34; and surprisingly work experience was the last thing they cared about, it was like maybe 6 percent of the time. That was one of the last things they looked for, but they looked mostly for what kind of things were you accomplishing. What were the specific measurable things that you were doing. And then also, what were you doing to contribute back to whatever industry you were trying to get a job in. Those two were I think were 65 percent combined or 70 percent combined of what hiring managers were looking for. So essentially, it&#39;s like you had those things kind of locked down and you were really delivering results here at your current company, a previous company and then you were also really giving back to whatever industry you were trying to get a job in, then essentially in most cases you would get called for an interview. Your work experience could be McDonald&#39;s right and you were still getting called for an interview because you hit those areas. So that&#39;s just something to keep in mind. And that&#39;s exactly why I format my résumé the way I do.</p><p><br></p><p><strong> </strong>[00:10:14] And I&#39;ll tell you something else, when I talked earlier about networking and then also branding yourself most of the time that&#39;s how you get the interview in most cases. You actually get employers reaching out to you. I have that frequently I have people reaching out to me saying &#34;hey not sure if you&#39;re in the market but here&#39;s you know this type of thing available. Just want to see if you&#39;re interested in it or if you know somebody else interested in it.&#34;.</p><p><br></p><p><strong> </strong>[00:10:38] And that&#39;s the way it works in this particular industry. It&#39;s different from other places where you know you get a certain degree you get a certain certification and you kind of automatically get a job right. Like if you go to medical school and you get your doctor&#39;s license you&#39;re pretty much guaranteed to be a doctor right. You can get a job as a doctor in most cases. This industry is a little different in the aspect of you need to network. I mean you need to do it before you need the job obviously. Right now you&#39;re listening to this and you&#39;re like I need a job right now. Then start going to whatever free conferences or meetups are in town. You basically have to put in the work. If there are no meetups in your area then do them online or start volunteering to different things online. Of course you&#39;re not getting paid, but it&#39;s a way to network and something else to throw in your resume. You also need to think outside the box to get into the industry, specifically into the companies that you want. A lot of times people are strictly like I want to be a penetration tester. And the company never hires for that role. They only hire for maybe a SOC Analyst or Cybersecurity analyst, or security engineer. So be mindful of that. What are they actually hiring for at the company.</p><p><br></p><p><strong> </strong>[00:11:43] And then also look at their jobs that are currently open and figure out which one of these you could actually do. They may not be cybersecurity specific, but if you really want to work at that company a lot of times if you get your foot in the door and then you start talking about &#34;hey I really want to transition into the Cyber Security Department here&#34; many times they&#39;ll create a position for you after they see you working hard for like three to six months. So just keep all of that in mind. Again this industry has a lot of the myths around if you get a bunch of certifications and college degrees you will be all set for jobs. And I know a bunch of people that have that all of that stuff and have no job right now.</p><p><br></p><p><strong> </strong>[00:12:27] So you just just keep that in mind. The other thing along those lines that I want to mention is you need to think outside the box.</p><p><br></p><p><strong> </strong>[00:12:38] You also just need to realize again that it&#39;s all about branding yourself. You have to differentiate yourself. There&#39;s so many people trying to get into this industry right now because they see the media talking about millions of job openings and the reality is a lot of those jobs that are open require security clearances. A lot of them are government jobs and many people don&#39;t qualify or, if you&#39;ve ever experienced clearance process, it takes years to get cleared. And who really has time to wait for two years on a security clearance when you have to feed your family, right?</p><p><br></p><p><strong> </strong>[00:13:15] And then the other thing is that employers a lot of times make these job postings unrealistic. I&#39;ve literally seen some that are like &#34;hey we&#39;re hiring for this entry level role. We want somebody with at least five years experience. And you must have at least four certifications or you know we want you to have the CISSP certificartion, which you have to have 5 work experience to be able to even hold. And we want you to have all that stuff and be skilled in all these different technology areas. And by the way again this is an entry level role and the pay as you know is 10 bucks an hour right now.&#34;.</p><p><br></p><p><strong> </strong>[00:14:05] You know most of those job descriptions out there are unrealistic and that&#39;s why I really encourage you if you&#39;re listening to this to actually focus on branding yourself number one. Number two getting out there and networking. So going to conferences in your area going to meetups. Meetup groups are generally free. So do those, connect with people, get a LinkedIn profile if you don&#39;t have one already have one, put all your skills and stuff in your profile and really make it look nice look. You can google search how to make your LinkedIn profile look professional. And then from there, start following the companies you want to work for. Connect with their employees. Start following their posts to see what they&#39;re doing. Like their posts and comment on their posts.</p><p><br></p><p><strong> </strong>[00:14:52] Use what I call the three by three by three method, so basically what you&#39;re going to do to grow your network you&#39;re going to comment on three different people&#39;s post today, so positive comments you know contribute. Don&#39;t just be like I hate this stuff you know be positive about it. You&#39;re also going to like three other people&#39;s posts and then you&#39;re going to send three other people a message each day like &#34;Hey I see that you work at company X or I see that you posted about this or that or that you&#39;re skilled in this area. If I can ever help you on this project or if I can ever help you in any way let me know.&#34;.</p><p><br></p><p><strong> </strong>[00:15:34] Just something to reach out, so you kind of cut through all that noise and they say oh who is this person. And they go look at your profile because what they may know, that you don&#39;t know, is that there&#39;s a job that just opened up at that company that you&#39;d be perfect for. And they go look at your profile and say &#34;well this person has all these skills. Let me let me message them back because we have a job they would be perfect for.&#34;.</p><p><br></p><p><strong> </strong>[00:15:58] That&#39;s how getting jobs happens in this industry. It does not happen by you getting 12 college degrees and getting 48 certifications and begging people for jobs, that doesn&#39;t work. What works is branding yourself, networking like crazy and delivering value to others first before you ask for a job. I can&#39;t tell you how many people connect with me on LinkedIn and then automatically are blasting my inbox like &#34;I need a job&#34; or &#34;I need a work visa&#34; and it makes me want to scream.</p><p><br></p><p><strong> </strong>[00:16:32] You&#39;re not showing any value of what you do and I go look at your profile I&#39;m like there&#39;s nothing there. You&#39;re literally just talking about how you need a job and you don&#39;t even have skills listed on your profile for me to try and pitch to hiring managers or recruiters. That not going to get you a job. Sorry.</p><p><br></p><p><strong> </strong>[00:16:42] If you&#39;re listening to this and you&#39;re like &#34;he doesn&#39;t know what he&#39;s talking about,&#34; I help people get jobs all the time in this industry. So that&#39;s my street cred on that. You&#39;re welcome to continue not having a job or you can hopefully take the information that I&#39;m talking about if it&#39;s new to you and implement it and actually get yourself a job in the cyber security industry.</p><p><br></p><p><strong> </strong>[00:17:01] So this first episode again was just talking about dispelling some myths about getting a job in the cybersecurity industry and some of the key tactics that I recommend you do. I&#39;ll see you in the next episode.</p>]]></description>
                <content:encoded>&lt;p&gt;&lt;span&gt;👕 Get your official Cyber Life swag here: &lt;/span&gt;https://bit.ly/CyberLifeSwag   &lt;/p&gt;&lt;p&gt;Subscribe to the Cyber Life TV YouTube Channel&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us on LinkedIn: &lt;a href=&#34;https://www.linkedin.com/company/cyber-life&#34; rel=&#34;nofollow&#34;&gt;https://www.linkedin.com/company/cyber-life&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Follow us across other social media in the coming months as well.&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Facebook https://www.facebook.com/therealcyberlife &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 InstaGram https://www.instagram.com/officialcyberlife/&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;👉 Twitter https://twitter.com/RealCyberLife&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;www.cyberlife.tv&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In this episode, we talk about getting jobs in the cyber security industry. Do you need a PhD to get a job? What about certifications? Find out the secrets in this episode.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Episode Transcript&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:00:00] Hi everyone welcome to episode one of the cyber life podcast. My name is Ken Underhill. I&amp;#39;ll be your host. In today&amp;#39;s episode, we&amp;#39;re going to talk about cyber security jobs. Now there&amp;#39;s a lot of myths out there on how you should get a job right. Should I get a go get a masters degree in cyber security should I go get a doctorate degree and the reality behind that is a degree is not going to help you get a job necessarily. Now for some jobs they want you to have a bachelors degree or maybe a Masters if you&amp;#39;re in certain jobs, or doctorate if for teaching at the university level. But for the most part it&amp;#39;s about skills. And this industry, unfortunately, is very, very heavy on certifications. That being said there are so many certifications. I literally know people that have like 40 or 50 certifications. Now will certifications get you a job. Not necessarily. So there are some certs that might help you get your foot in the door. You know maybe help you get past that robotic resume filter that H.R. departments have. And there are some key ones. There are things like CompTIA&amp;#39;s Security Plus. That&amp;#39;s kind of an entry level generalized security certification. Also, I want to state that I&amp;#39;m not endorsing any of these certifications. I don&amp;#39;t have any special deal or anything with them. Other entry level ones that may be beneficial to you are things like the Amazon AWS certifications or even like Google Cloud certification. Primarily though AmazonAWS. One thing to note about this industry is you really have to network quite a bit and then you also need to brand yourself. So you&amp;#39;ve got to show why are you different. Right. And it&amp;#39;s not just you saying like &amp;#34;oh yeah I can do this job right&amp;#34; or &amp;#34;I have these skills I can do this.&amp;#34; You really need to show that. So, whether that&amp;#39;s you maybe creating an online course, maybe that&amp;#39;s you having a YouTube channel where you throw up some videos. For example let&amp;#39;s say you want to be a SOC Analyst. And so you throw up some YouTube videos showing you using you know the free version of Splunk and analyzing some data. Right. Or it shows you analyzing packets with Wireshark. Just something that actually shows an employer that you actually have a skill. Right. And then I mentioned networking and it&amp;#39;s not so much of having like five million LinkedIn connections or five million Facebook page likes. That&amp;#39;s not networking. Networking is you getting off your rear-end, going out to different conferences or meetings in your areas and building those real relationships. And then from there, after you&amp;#39;ve delivered some value to those people, saying &amp;#34;hey by the way I&amp;#39;m looking for a job. If you hear something that might be a good fit let me know.&amp;#34; You know. Or &amp;#34;Hey I&amp;#39;m trying to get into company X. I noticed that you work there. I know we&amp;#39;ve been chatting a bit at this meetup. Are there any positions open you know of, even if they&amp;#39;re not cyber security-related? I just want to really get my foot in the door at that company.&amp;#34; Something that a lot of people don&amp;#39;t know about, at least I don&amp;#39;t think they know about a lot of times, is that companies if they want you, they&amp;#39;ll just create a job for you you know and a lot of times it&amp;#39;s about the person that you connect with going back to their boss and saying &amp;#34;hey this person is really, really good. What can we do to get them working here? Can we get them in here part-time or in an internship or something just to get them working here because they&amp;#39;re really, really good.&amp;#34; And like I said a lot of times it&amp;#39;s all about the fact that you&amp;#39;ve networked with different people within that organization. The other thing I want to talk about, briefly is resume&amp;#39;s. So I notice a lot of cookie-cutter resumes out there and some of them are very terrible. You know some people want to use like fancy fonts and different colorings and just try to make it look super, super cool. The reality is a lot of times that doesn&amp;#39;t even get through the filter for the H.R. department. And honestly the best way to get through the filters is by handing a human your resumé or you know writing a letter in and we&amp;#39;ll talk about kind of how to get into your your quote on quote dream company in just a second. So with your resumé just some key things that I recommend. Again, I&amp;#39;ll flat out say I&amp;#39;m not a resume writing expert. I don&amp;#39;t sell you a resume writing template or anything like that. I have no financial gain by you getting a better resume. So I&amp;#39;m just gonna tell you what&amp;#39;s worked for me and if you want to use that great. If you don&amp;#39;t, hopefully you get that job, you know, hopefully you get an interview and get the job. So, the first thing is I always like to throw a quote at the very top of my resume from someone you know maybe a professor or maybe a past manager just somebody that would give you a quote you know like &amp;#34;hey, this person is a hard worker&amp;#34; or whatever the case might be. Now with that, make sure it&amp;#39;s somebody that kind of has some credentials so don&amp;#39;t just pick like the lowest level helpdesk person to write you a review. That&amp;#39;s fine if that&amp;#39;s all you can get, but try to get somebody like a manager or you know somebody with an advanced degree or advanced certifications. Basically, you just want somebody that you can throw a bunch of alphabet soup after their name, a bunch of different letters that tries to impress the H.R. person looking at your resume.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:05:07] After that quote, you know because again a quote helps a lot, like if you think of you going to Amazon for example and you go to buy a product, you&amp;#39;re going to look at the reviews right. At least most people are going to look through those reviews and if you see a people leaving reviews on a product you&amp;#39;re more likely to buy that one if it&amp;#39;s got five star reviews or four star reviews than a product with no reviews, right. Most of us do it that way. Some people still want to buy the product with no reviews, but most people are going to buy a product that has the four or five star reviews, similar psychology philosophy here.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:05:36] We&amp;#39;re trying to get the H.R. person or the hiring manager that&amp;#39;s looking at your résumé to say &amp;#34;oh, this person that has all these credentials after their name is saying that this person is really good. So, why don&amp;#39;t I go ahead and set them up for an interview?&amp;#34;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:05:51] The next part on the resumé I would do is bullet points. So right after that quote you list from somebody, go ahead and put bullet points listing out some of the key things you have done. Not you know &amp;#34;I was responsible for this or that&amp;#34; but instead list quantifiable information. &amp;#34;I completed this project that directly led to five thousand dollars extra a month for the company.&amp;#34; Right. Or I closed this deal that netted the company one hundred million dollars. I reduced the time to launch on this product by implementing you know my strategy of X, which made this project more successful. Measurable things, so that way somebody can quickly look at that and say &amp;#34;Ok, this person produces results&amp;#34; because at the end of the day if I&amp;#39;m trying to hire you, I want to know that you can come in and produce results for me. You don&amp;#39;t have to know everything technically right up front. Right. I can train you on a lot of stuff, but if I see that you&amp;#39;re producing results for somebody else already it&amp;#39;s a lot easier to make that decision to bring you in for an interview.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:06:56] The next area I would go with is your education. So just quickly listing out you if you have a bachelor&amp;#39;s degree, master&amp;#39;s, or associates. If you don&amp;#39;t have a college degree you can just skip part that. Or if you&amp;#39;ve done some kind of like a boot camp training then you can put that in there, like a coding boot camp or whatever. After that, put any type of awards or certifications you have. This is so the HR search will find you when they are looking for a Security Plus, CASP, CEH, Pentest Plus, whatever. You could also list awards you got in college, so for example if you received an award for a 4.0 GPA, you could list that.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:07:37] After that section, list out anything you&amp;#39;ve done in the industry, so anything you&amp;#39;ve done to contribute to the industry. So after you&amp;#39;ve listed out any awards and certifications, the next section should be your contributions to the community. Now, if you don&amp;#39;t have any then just leave that section off your resume. But if you&amp;#39;ve done any type of volunteer work, if you volunteered at different events, like a security conference for example, list that on there. It just shows that you&amp;#39;re really in for the long haul with the industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:08:24] The next section is going to be any other type of give back type of stuff, so volunteer work or whatever. And then after that move into your actual work experience.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:08:35] What you&amp;#39;re trying to do there with that format I use is you&amp;#39;re just trying to somewhat lay it on thick of all the stuff you&amp;#39;ve done because most people don&amp;#39;t care about your work experience. If they see that you&amp;#39;ve got all these other criteria in their head that&amp;#39;s the reality of it.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:08:51] There was some study that was done a while ago and I read through it. I forget the name of it. Basically, they went around and interviewed all these hiring managers. And they were asking them &amp;#34;what is important to you of these criteria that are listed out in the survey&amp;#34; and surprisingly work experience was the last thing they cared about, it was like maybe 6 percent of the time. That was one of the last things they looked for, but they looked mostly for what kind of things were you accomplishing. What were the specific measurable things that you were doing. And then also, what were you doing to contribute back to whatever industry you were trying to get a job in. Those two were I think were 65 percent combined or 70 percent combined of what hiring managers were looking for. So essentially, it&amp;#39;s like you had those things kind of locked down and you were really delivering results here at your current company, a previous company and then you were also really giving back to whatever industry you were trying to get a job in, then essentially in most cases you would get called for an interview. Your work experience could be McDonald&amp;#39;s right and you were still getting called for an interview because you hit those areas. So that&amp;#39;s just something to keep in mind. And that&amp;#39;s exactly why I format my résumé the way I do.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:10:14] And I&amp;#39;ll tell you something else, when I talked earlier about networking and then also branding yourself most of the time that&amp;#39;s how you get the interview in most cases. You actually get employers reaching out to you. I have that frequently I have people reaching out to me saying &amp;#34;hey not sure if you&amp;#39;re in the market but here&amp;#39;s you know this type of thing available. Just want to see if you&amp;#39;re interested in it or if you know somebody else interested in it.&amp;#34;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:10:38] And that&amp;#39;s the way it works in this particular industry. It&amp;#39;s different from other places where you know you get a certain degree you get a certain certification and you kind of automatically get a job right. Like if you go to medical school and you get your doctor&amp;#39;s license you&amp;#39;re pretty much guaranteed to be a doctor right. You can get a job as a doctor in most cases. This industry is a little different in the aspect of you need to network. I mean you need to do it before you need the job obviously. Right now you&amp;#39;re listening to this and you&amp;#39;re like I need a job right now. Then start going to whatever free conferences or meetups are in town. You basically have to put in the work. If there are no meetups in your area then do them online or start volunteering to different things online. Of course you&amp;#39;re not getting paid, but it&amp;#39;s a way to network and something else to throw in your resume. You also need to think outside the box to get into the industry, specifically into the companies that you want. A lot of times people are strictly like I want to be a penetration tester. And the company never hires for that role. They only hire for maybe a SOC Analyst or Cybersecurity analyst, or security engineer. So be mindful of that. What are they actually hiring for at the company.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:11:43] And then also look at their jobs that are currently open and figure out which one of these you could actually do. They may not be cybersecurity specific, but if you really want to work at that company a lot of times if you get your foot in the door and then you start talking about &amp;#34;hey I really want to transition into the Cyber Security Department here&amp;#34; many times they&amp;#39;ll create a position for you after they see you working hard for like three to six months. So just keep all of that in mind. Again this industry has a lot of the myths around if you get a bunch of certifications and college degrees you will be all set for jobs. And I know a bunch of people that have that all of that stuff and have no job right now.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:12:27] So you just just keep that in mind. The other thing along those lines that I want to mention is you need to think outside the box.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:12:38] You also just need to realize again that it&amp;#39;s all about branding yourself. You have to differentiate yourself. There&amp;#39;s so many people trying to get into this industry right now because they see the media talking about millions of job openings and the reality is a lot of those jobs that are open require security clearances. A lot of them are government jobs and many people don&amp;#39;t qualify or, if you&amp;#39;ve ever experienced clearance process, it takes years to get cleared. And who really has time to wait for two years on a security clearance when you have to feed your family, right?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:13:15] And then the other thing is that employers a lot of times make these job postings unrealistic. I&amp;#39;ve literally seen some that are like &amp;#34;hey we&amp;#39;re hiring for this entry level role. We want somebody with at least five years experience. And you must have at least four certifications or you know we want you to have the CISSP certificartion, which you have to have 5 work experience to be able to even hold. And we want you to have all that stuff and be skilled in all these different technology areas. And by the way again this is an entry level role and the pay as you know is 10 bucks an hour right now.&amp;#34;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:14:05] You know most of those job descriptions out there are unrealistic and that&amp;#39;s why I really encourage you if you&amp;#39;re listening to this to actually focus on branding yourself number one. Number two getting out there and networking. So going to conferences in your area going to meetups. Meetup groups are generally free. So do those, connect with people, get a LinkedIn profile if you don&amp;#39;t have one already have one, put all your skills and stuff in your profile and really make it look nice look. You can google search how to make your LinkedIn profile look professional. And then from there, start following the companies you want to work for. Connect with their employees. Start following their posts to see what they&amp;#39;re doing. Like their posts and comment on their posts.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:14:52] Use what I call the three by three by three method, so basically what you&amp;#39;re going to do to grow your network you&amp;#39;re going to comment on three different people&amp;#39;s post today, so positive comments you know contribute. Don&amp;#39;t just be like I hate this stuff you know be positive about it. You&amp;#39;re also going to like three other people&amp;#39;s posts and then you&amp;#39;re going to send three other people a message each day like &amp;#34;Hey I see that you work at company X or I see that you posted about this or that or that you&amp;#39;re skilled in this area. If I can ever help you on this project or if I can ever help you in any way let me know.&amp;#34;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:15:34] Just something to reach out, so you kind of cut through all that noise and they say oh who is this person. And they go look at your profile because what they may know, that you don&amp;#39;t know, is that there&amp;#39;s a job that just opened up at that company that you&amp;#39;d be perfect for. And they go look at your profile and say &amp;#34;well this person has all these skills. Let me let me message them back because we have a job they would be perfect for.&amp;#34;.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:15:58] That&amp;#39;s how getting jobs happens in this industry. It does not happen by you getting 12 college degrees and getting 48 certifications and begging people for jobs, that doesn&amp;#39;t work. What works is branding yourself, networking like crazy and delivering value to others first before you ask for a job. I can&amp;#39;t tell you how many people connect with me on LinkedIn and then automatically are blasting my inbox like &amp;#34;I need a job&amp;#34; or &amp;#34;I need a work visa&amp;#34; and it makes me want to scream.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:16:32] You&amp;#39;re not showing any value of what you do and I go look at your profile I&amp;#39;m like there&amp;#39;s nothing there. You&amp;#39;re literally just talking about how you need a job and you don&amp;#39;t even have skills listed on your profile for me to try and pitch to hiring managers or recruiters. That not going to get you a job. Sorry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:16:42] If you&amp;#39;re listening to this and you&amp;#39;re like &amp;#34;he doesn&amp;#39;t know what he&amp;#39;s talking about,&amp;#34; I help people get jobs all the time in this industry. So that&amp;#39;s my street cred on that. You&amp;#39;re welcome to continue not having a job or you can hopefully take the information that I&amp;#39;m talking about if it&amp;#39;s new to you and implement it and actually get yourself a job in the cyber security industry.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;[00:17:01] So this first episode again was just talking about dispelling some myths about getting a job in the cybersecurity industry and some of the key tactics that I recommend you do. I&amp;#39;ll see you in the next episode.&lt;/p&gt;</content:encoded>
                
                <enclosure length="16674899" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5b4355fc-3e37-42c0-b75e-67da59138777/stream.mp3"/>
                
                <guid isPermaLink="false">f63f261e-c654-4ee9-972e-76c6fcab9e89</guid>
                <link>https://redcircle.com/shows/707eef5d-612a-45d0-b073-06b6166f7b5e/episodes/5b4355fc-3e37-42c0-b75e-67da59138777</link>
                <pubDate>Wed, 19 Jun 2019 13:48:54 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/1/19/3/2ef2fe04-0b86-4bd8-bdbe-85eab41566d1__1dd984be-c7a5-40ef-8cb9-7e11ec7d8c8d_f6201d33-0394-4a8e-bd56-5c4c5f872ee8_9a9906e2-5c18-44ca-9f8a-915114951c65_bf1a22fd-21bb-41e1-989a-3c157d429579_251ac84c-3ef6-4458-98a6-dbffa1ed6c72_cyber_life.jpg"/>
                <itunes:duration>1042</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
    </channel>
</rss>
