<?xml version="1.0" encoding="UTF-8"?>
<rss 
  version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:atom="http://www.w3.org/2005/Atom"
  xmlns:media="http://search.yahoo.com/mrss/"
  xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:rawvoice="http://www.rawvoice.com/rawvoiceRssModule/"
  xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0">

  <channel>
    <atom:link href="https://distillingsecurity.com/rss/" rel="self" type="application/rss+xml" />
    <title>Distilling Security</title>
    <link>https://distillingsecurity.com</link>
    <description>Consumable security, privacy, and compliance</description>
    <language>en</language>
    <copyright>Distilling Security Copyright 2026</copyright>
    <lastBuildDate>Thu, 09 Apr 2026 11:30:55 +0000</lastBuildDate>
    <itunes:author>Distilling Security</itunes:author>
    <itunes:summary>Consumable security, privacy, and compliance</itunes:summary>
    <itunes:owner>
      <itunes:name>Your Name</itunes:name>
      <itunes:email>youremail@example.com</itunes:email>
    </itunes:owner>
    <itunes:explicit>no</itunes:explicit>
    <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2026/01/Distilling-Security-Flask-Logo-Concept---Light.png" />
    <itunes:category text="Technology"></itunes:category>

        <item>
          <title>Episode 68 - Doorbells Ring Hollow</title>
          <link>https://distillingsecurity.com/episode-68-doorbells-ring-hollow/</link>
          <description></description>
          <pubDate>Mon, 23 Feb 2026 13:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 69a614fb8e6f310001500dda ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/79fd7340-77b3-4559-96d1-bece606ab44c/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/vODDDRev_P4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 68 - Doorbells Ring Hollow"></iframe></figure><p>What on earth were Ring and Amazon thinking when they aired their Super Bowl advert that previewed a “there’s nowhere you can hide” type of dystopian future masked as a way to find your lost dog?&nbsp; With cameras everywhere, are we safer or just more exposed? When camera data is deleted, is it really gone (spoiler alert: not necessarily), and more. Are we approaching the new location of the “creepy line” or as a society are we content to trade privacy for security? And what happens when the glasses with cameras become more pervasive? Are we all on cam all the time whether we like it or not?</p><p>Show notes:</p><ul><li>Ring Super Bowl Advert - <a href="https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html?ref=distillingsecurity.com">https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html</a>&nbsp;</li><li>Decoder Podcast - Let’s talk about Ring, lost dogs, and the surveillance state - https://youtu.be/QQjW68B7s8g</li><li>Ring and Flock cancel partnership - <a href="https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/?ref=distillingsecurity.com">https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/</a></li><li>Savanna Guthrie Nest Video Retrieval - <a href="https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage?ref=distillingsecurity.com">https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage</a></li><li>Apple San Bernardino Matter - <a href="https://epic.org/documents/apple-v-fbi-2/?ref=distillingsecurity.com">https://epic.org/documents/apple-v-fbi-2/</a></li><li>DJI robot vacuum cameras accessible via Internet - <a href="https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt?ref=distillingsecurity.com">https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt</a></li><li>Unifi protect cameras - <a href="https://geni.us/isNyY2?ref=distillingsecurity.com"><u>https://geni.us/isNyY2</u></a></li><li>Zuck in court to testify on social media addiction - <a href="https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b?ref=distillingsecurity.com">https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b</a>&nbsp;</li><li>Glassholes are back - and forbidden in court -&nbsp; <a href="https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/?ref=distillingsecurity.com">https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/</a></li><li>Movie recommendation&nbsp; - Happy Gilmore - <a href="https://geni.us/v96XEgb?ref=distillingsecurity.com"><u>https://geni.us/v96XEgb</u></a></li><li>Meta/Facebook studies on addictiveness of social media - <a href="https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features?ref=distillingsecurity.com">https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features</a></li><li>LinkedIn/Microsoft Verification data being shared with many others, including Persona -= <a href="https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/?ref=distillingsecurity.com">https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 68 - Doorbells Ring Hollow</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/79fd7340-77b3-4559-96d1-bece606ab44c/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/vODDDRev_P4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 68 - Doorbells Ring Hollow"></iframe></figure><p>What on earth were Ring and Amazon thinking when they aired their Super Bowl advert that previewed a “there’s nowhere you can hide” type of dystopian future masked as a way to find your lost dog?&nbsp; With cameras everywhere, are we safer or just more exposed? When camera data is deleted, is it really gone (spoiler alert: not necessarily), and more. Are we approaching the new location of the “creepy line” or as a society are we content to trade privacy for security? And what happens when the glasses with cameras become more pervasive? Are we all on cam all the time whether we like it or not?</p><p>Show notes:</p><ul><li>Ring Super Bowl Advert - <a href="https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html?ref=distillingsecurity.com">https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html</a>&nbsp;</li><li>Decoder Podcast - Let’s talk about Ring, lost dogs, and the surveillance state - https://youtu.be/QQjW68B7s8g</li><li>Ring and Flock cancel partnership - <a href="https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/?ref=distillingsecurity.com">https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/</a></li><li>Savanna Guthrie Nest Video Retrieval - <a href="https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage?ref=distillingsecurity.com">https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage</a></li><li>Apple San Bernardino Matter - <a href="https://epic.org/documents/apple-v-fbi-2/?ref=distillingsecurity.com">https://epic.org/documents/apple-v-fbi-2/</a></li><li>DJI robot vacuum cameras accessible via Internet - <a href="https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt?ref=distillingsecurity.com">https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt</a></li><li>Unifi protect cameras - <a href="https://geni.us/isNyY2?ref=distillingsecurity.com"><u>https://geni.us/isNyY2</u></a></li><li>Zuck in court to testify on social media addiction - <a href="https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b?ref=distillingsecurity.com">https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b</a>&nbsp;</li><li>Glassholes are back - and forbidden in court -&nbsp; <a href="https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/?ref=distillingsecurity.com">https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/</a></li><li>Movie recommendation&nbsp; - Happy Gilmore - <a href="https://geni.us/v96XEgb?ref=distillingsecurity.com"><u>https://geni.us/v96XEgb</u></a></li><li>Meta/Facebook studies on addictiveness of social media - <a href="https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features?ref=distillingsecurity.com">https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features</a></li><li>LinkedIn/Microsoft Verification data being shared with many others, including Persona -= <a href="https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/?ref=distillingsecurity.com">https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2026/03/GSD-68---New-Look---Square-Cover---Scaled.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 67 - Complacency in the Loop</title>
          <link>https://distillingsecurity.com/episode-67-complacency-in-the-loop/</link>
          <description></description>
          <pubDate>Mon, 09 Feb 2026 15:56:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 69a5b1948e6f310001500c81 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/ee56e385-40f2-4ab0-ab50-f5d879fb45f9/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/B3VHOqnaQng?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 67: Complacency in the Loop"></iframe></figure><p>AI is growing in use within information security, but are we ready to trust it to do all the things we hope it can, and do so automatically without doing harm?&nbsp; Context is king, and training to that level is only possible when you give all your experience to the AI. What are the tradeoffs to doing so? What happens when we depend on AI and forget (or worse, never learn) the underpinnings of what makes the AI system work (remember the calculator debates of the 1980s?). And does the end justify the means when it comes to AI use? And what is that “ends” anyway? Efficiency, automation, knowledge? Erik, Dan, and Brian discuss it all in this week’s Great Security Debate!</p><p>Thanks for being part of the debate!</p><p>Show Notes</p><ul><li>Report on reasons Israel didn’t catch oct 7 attacks - <a href="https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack?ref=distillingsecurity.com">https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack</a></li><li>Shin Bet Report - Source Doc (Hebrew) - <a href="https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/?ref=distillingsecurity.com#document/p1">https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/#document/p1</a></li><li>Waymo hits student on bicycle - <a href="https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries?ref=distillingsecurity.com">https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries</a></li><li>Waymo violates school bus rules - <a href="https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/?ref=distillingsecurity.com">https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/</a></li><li>Podcast Recommendation - Agentic Dan - <a href="https://distillingsecurity.com/episode-64-agentic-dan/">https://distillingsecurity.com/episode-64-agentic-dan/</a></li><li>TV Recommendation - Pluribus - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza?ref=distillingsecurity.com">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li><li>Trust Issues in AI -&nbsp;</li><li>“I bought this Tesla before Elon went crazy” magnet -&nbsp; <a href="https://geni.us/DXQYk?ref=distillingsecurity.com">https://geni.us/DXQYk</a></li><li>OpenAI adds ads - <a href="https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1?ref=distillingsecurity.com">https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1</a></li><li>Satya Nadella AI Internal Memo - <a href="https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52?ref=distillingsecurity.com">https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52</a></li><li>FDA AI Rules - <a href="https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological?ref=distillingsecurity.com">https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological</a></li><li>Utah AI Prescriptions - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122?ref=distillingsecurity.com">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a></li><li>Movie Recommendation: Terminator - <a href="https://geni.us/59025?ref=distillingsecurity.com">https://geni.us/59025</a></li><li>Book Recommendation:&nbsp; The Cuckoos Egg - <a href="https://geni.us/hYE9?ref=distillingsecurity.com">https://geni.us/hYE9</a></li><li>Book Recommendation: &nbsp; AI 2041 - <a href="https://geni.us/5dtV54h?ref=distillingsecurity.com">https://geni.us/5dtV54h</a></li><li>Anthropic Super Bowl Ad - <a href="https://fortune.com/2026/02/09/what-was-anthropic-super-bowl-ad-chatgpt-therapy-sam-altman-reaction/?ref=distillingsecurity.com">Scott Galloway on why Anthropic's Super Bowl ad got to Sam ... - Fortune</a></li><li>China facial recognition payments - <a href="https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/?ref=distillingsecurity.com">https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/</a></li><li>Movie Recommendation:&nbsp; Sneakers - <a href="https://geni.us/P7SB?ref=distillingsecurity.com">https://geni.us/P7SB</a></li><li>The Dawn of the Post Literate Society - <a href="https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1?ref=distillingsecurity.com">https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1</a></li><li>Leading Causes of Death in the US, 2023 - <a href="https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm?ref=distillingsecurity.com">https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm</a></li><li>Automated car sex in backseat - <a href="https://dailydot.com/driverless-car-sex-autonomous?ref=distillingsecurity.com">https://dailydot.com/driverless-car-sex-autonomous</a></li><li>Podcast Recommendation: The Final Act - <a href="https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/">https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/</a></li><li>Calculators and Children - <a href="https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/?ref=distillingsecurity.com">https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/</a></li><li>Podcast Recommendation: Mentorcore - <a href="https://distillingsecurity.com/tag/mentorcore/">https://distillingsecurity.com/tag/mentorcore/</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 67 - Complacency in the Loop</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/ee56e385-40f2-4ab0-ab50-f5d879fb45f9/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/B3VHOqnaQng?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 67: Complacency in the Loop"></iframe></figure><p>AI is growing in use within information security, but are we ready to trust it to do all the things we hope it can, and do so automatically without doing harm?&nbsp; Context is king, and training to that level is only possible when you give all your experience to the AI. What are the tradeoffs to doing so? What happens when we depend on AI and forget (or worse, never learn) the underpinnings of what makes the AI system work (remember the calculator debates of the 1980s?). And does the end justify the means when it comes to AI use? And what is that “ends” anyway? Efficiency, automation, knowledge? Erik, Dan, and Brian discuss it all in this week’s Great Security Debate!</p><p>Thanks for being part of the debate!</p><p>Show Notes</p><ul><li>Report on reasons Israel didn’t catch oct 7 attacks - <a href="https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack?ref=distillingsecurity.com">https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack</a></li><li>Shin Bet Report - Source Doc (Hebrew) - <a href="https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/?ref=distillingsecurity.com#document/p1">https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/#document/p1</a></li><li>Waymo hits student on bicycle - <a href="https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries?ref=distillingsecurity.com">https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries</a></li><li>Waymo violates school bus rules - <a href="https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/?ref=distillingsecurity.com">https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/</a></li><li>Podcast Recommendation - Agentic Dan - <a href="https://distillingsecurity.com/episode-64-agentic-dan/">https://distillingsecurity.com/episode-64-agentic-dan/</a></li><li>TV Recommendation - Pluribus - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza?ref=distillingsecurity.com">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li><li>Trust Issues in AI -&nbsp;</li><li>“I bought this Tesla before Elon went crazy” magnet -&nbsp; <a href="https://geni.us/DXQYk?ref=distillingsecurity.com">https://geni.us/DXQYk</a></li><li>OpenAI adds ads - <a href="https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1?ref=distillingsecurity.com">https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1</a></li><li>Satya Nadella AI Internal Memo - <a href="https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52?ref=distillingsecurity.com">https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52</a></li><li>FDA AI Rules - <a href="https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological?ref=distillingsecurity.com">https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological</a></li><li>Utah AI Prescriptions - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122?ref=distillingsecurity.com">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a></li><li>Movie Recommendation: Terminator - <a href="https://geni.us/59025?ref=distillingsecurity.com">https://geni.us/59025</a></li><li>Book Recommendation:&nbsp; The Cuckoos Egg - <a href="https://geni.us/hYE9?ref=distillingsecurity.com">https://geni.us/hYE9</a></li><li>Book Recommendation: &nbsp; AI 2041 - <a href="https://geni.us/5dtV54h?ref=distillingsecurity.com">https://geni.us/5dtV54h</a></li><li>Anthropic Super Bowl Ad - <a href="https://fortune.com/2026/02/09/what-was-anthropic-super-bowl-ad-chatgpt-therapy-sam-altman-reaction/?ref=distillingsecurity.com">Scott Galloway on why Anthropic's Super Bowl ad got to Sam ... - Fortune</a></li><li>China facial recognition payments - <a href="https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/?ref=distillingsecurity.com">https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/</a></li><li>Movie Recommendation:&nbsp; Sneakers - <a href="https://geni.us/P7SB?ref=distillingsecurity.com">https://geni.us/P7SB</a></li><li>The Dawn of the Post Literate Society - <a href="https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1?ref=distillingsecurity.com">https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1</a></li><li>Leading Causes of Death in the US, 2023 - <a href="https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm?ref=distillingsecurity.com">https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm</a></li><li>Automated car sex in backseat - <a href="https://dailydot.com/driverless-car-sex-autonomous?ref=distillingsecurity.com">https://dailydot.com/driverless-car-sex-autonomous</a></li><li>Podcast Recommendation: The Final Act - <a href="https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/">https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/</a></li><li>Calculators and Children - <a href="https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/?ref=distillingsecurity.com">https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/</a></li><li>Podcast Recommendation: Mentorcore - <a href="https://distillingsecurity.com/tag/mentorcore/">https://distillingsecurity.com/tag/mentorcore/</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2026/03/GSD-67---New-Look---Square-Cover-2.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 66 - WOPR Was Right</title>
          <link>https://distillingsecurity.com/episode-66-wopr-was-right/</link>
          <description>Join the Great Security Debate as experts discuss cyber warfare, critical infrastructure, and the ethics of security in today&#x27;s world.</description>
          <pubDate>Mon, 12 Jan 2026 15:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 69656326ac725100012888b4 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/8ecc79ee-de3d-426b-8e71-13e4697b34a8/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/doKLAHmq3Es?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 66 - WOPR Was Right"></iframe></figure><p>Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security practitioners have a role (or an obligation, or even a liability) to close vulnerabilities that can be used in primary or retaliatory scenarios. How much of human nature makes cyber retaliation a foregone conclusion, or can we find ways to reduce the need or use or availability of ways in via the technology. From Stuxnet to Iran to Caracas, using cybersecurity is a prevalent vector of retaliation, but does it always have to be that way?&nbsp; Or will it end with WOPR’s recognition that the only way to win the game is not to play at all?</p><p>It’s hard to talk about modern cybersecurity and not bring in current events, and even harder to keep it from turning political. We tried very hard to do a good job in the latter as we talked about the former.&nbsp;</p><p>Thanks for being part of the debate!</p><p>Show Notes:</p><ul><li>Caracas Invasion - <a href="https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598&ref=distillingsecurity.com">https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598</a></li><li>Stuxnet Explained - <a href="https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html?ref=distillingsecurity.com">https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html</a></li><li>Book Recommendation: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon - <a href="https://geni.us/swbN?ref=distillingsecurity.com"><u>https://geni.us/swbN</u></a></li><li>San Bernardino vs Apple - <a href="https://epic.org/documents/apple-v-fbi-2/?ref=distillingsecurity.com">https://epic.org/documents/apple-v-fbi-2/</a></li><li>Movie Recommendation: Real Genius - <a href="https://geni.us/abYUYT?ref=distillingsecurity.com"><u>https://geni.us/abYUYT</u></a></li><li>Book Recommendation: The Creature from Jekyll Island: A Second Look at the Federal Reserve - <a href="https://geni.us/SL21a?ref=distillingsecurity.com"><u>https://geni.us/SL21a</u></a></li><li>CIA Triad - <a href="https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/?ref=distillingsecurity.com">https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/</a></li><li>Book Recommendation: Atomic Habits - <a href="https://geni.us/Nn2GSYr?ref=distillingsecurity.com"><u>https://geni.us/Nn2GSYr</u></a></li><li>Michigan Council of Women in Technology -<a href="https://mcwt.org/?ref=distillingsecurity.com">https://mcwt.org</a></li><li>Critical Infrastructure (Sectors) - <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors?ref=distillingsecurity.com">https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors</a></li><li>Shadowbrokers - <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/?ref=distillingsecurity.com">https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/</a></li><li>AI Prescriptions (Utah) - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122?ref=distillingsecurity.com">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a>&nbsp;</li><li>Japanese Omoiyari - <a href="https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&utm_medium=member_desktop&rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE">https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE</a></li><li>GSD Episode on Japanese Parking Culture - <a href="https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/">https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/</a></li><li>Book Recommendation: Plato’s Republic - <a href="https://geni.us/vLBu4?ref=distillingsecurity.com"><u>https://geni.us/vLBu4</u></a></li><li>Movie Recommendation: Angela’s Christmas - <a href="https://geni.us/Vn9n?ref=distillingsecurity.com"><u>https://geni.us/Vn9n</u></a></li><li>Movie Recommendation: Die Hard - <a href="https://geni.us/eMASs?ref=distillingsecurity.com"><u>https://geni.us/eMASs</u></a></li><li>Movie Recommendation: Wargames - <a href="https://geni.us/L2R5Ij?ref=distillingsecurity.com"><u>https://geni.us/L2R5Ij</u></a></li><li>TV Recommendation: West Wing - Proportional Response -&nbsp; <a href="https://geni.us/9mU1k4?ref=distillingsecurity.com"><u>https://geni.us/9mU1k4</u></a></li><li>Movie Recommendation: Goldeneye - <a href="https://geni.us/0dO0b?ref=distillingsecurity.com"><u>https://geni.us/0dO0b</u></a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 66 - WOPR Was Right</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle>Join the Great Security Debate as experts discuss cyber warfare, critical infrastructure, and the ethics of security in today&#x27;s world.</itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/8ecc79ee-de3d-426b-8e71-13e4697b34a8/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/doKLAHmq3Es?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 66 - WOPR Was Right"></iframe></figure><p>Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security practitioners have a role (or an obligation, or even a liability) to close vulnerabilities that can be used in primary or retaliatory scenarios. How much of human nature makes cyber retaliation a foregone conclusion, or can we find ways to reduce the need or use or availability of ways in via the technology. From Stuxnet to Iran to Caracas, using cybersecurity is a prevalent vector of retaliation, but does it always have to be that way?&nbsp; Or will it end with WOPR’s recognition that the only way to win the game is not to play at all?</p><p>It’s hard to talk about modern cybersecurity and not bring in current events, and even harder to keep it from turning political. We tried very hard to do a good job in the latter as we talked about the former.&nbsp;</p><p>Thanks for being part of the debate!</p><p>Show Notes:</p><ul><li>Caracas Invasion - <a href="https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598&ref=distillingsecurity.com">https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598</a></li><li>Stuxnet Explained - <a href="https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html?ref=distillingsecurity.com">https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html</a></li><li>Book Recommendation: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon - <a href="https://geni.us/swbN?ref=distillingsecurity.com"><u>https://geni.us/swbN</u></a></li><li>San Bernardino vs Apple - <a href="https://epic.org/documents/apple-v-fbi-2/?ref=distillingsecurity.com">https://epic.org/documents/apple-v-fbi-2/</a></li><li>Movie Recommendation: Real Genius - <a href="https://geni.us/abYUYT?ref=distillingsecurity.com"><u>https://geni.us/abYUYT</u></a></li><li>Book Recommendation: The Creature from Jekyll Island: A Second Look at the Federal Reserve - <a href="https://geni.us/SL21a?ref=distillingsecurity.com"><u>https://geni.us/SL21a</u></a></li><li>CIA Triad - <a href="https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/?ref=distillingsecurity.com">https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/</a></li><li>Book Recommendation: Atomic Habits - <a href="https://geni.us/Nn2GSYr?ref=distillingsecurity.com"><u>https://geni.us/Nn2GSYr</u></a></li><li>Michigan Council of Women in Technology -<a href="https://mcwt.org/?ref=distillingsecurity.com">https://mcwt.org</a></li><li>Critical Infrastructure (Sectors) - <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors?ref=distillingsecurity.com">https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors</a></li><li>Shadowbrokers - <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/?ref=distillingsecurity.com">https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/</a></li><li>AI Prescriptions (Utah) - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122?ref=distillingsecurity.com">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a>&nbsp;</li><li>Japanese Omoiyari - <a href="https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&utm_medium=member_desktop&rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE">https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE</a></li><li>GSD Episode on Japanese Parking Culture - <a href="https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/">https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/</a></li><li>Book Recommendation: Plato’s Republic - <a href="https://geni.us/vLBu4?ref=distillingsecurity.com"><u>https://geni.us/vLBu4</u></a></li><li>Movie Recommendation: Angela’s Christmas - <a href="https://geni.us/Vn9n?ref=distillingsecurity.com"><u>https://geni.us/Vn9n</u></a></li><li>Movie Recommendation: Die Hard - <a href="https://geni.us/eMASs?ref=distillingsecurity.com"><u>https://geni.us/eMASs</u></a></li><li>Movie Recommendation: Wargames - <a href="https://geni.us/L2R5Ij?ref=distillingsecurity.com"><u>https://geni.us/L2R5Ij</u></a></li><li>TV Recommendation: West Wing - Proportional Response -&nbsp; <a href="https://geni.us/9mU1k4?ref=distillingsecurity.com"><u>https://geni.us/9mU1k4</u></a></li><li>Movie Recommendation: Goldeneye - <a href="https://geni.us/0dO0b?ref=distillingsecurity.com"><u>https://geni.us/0dO0b</u></a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2026/01/GSD-66---New-Look---1080-Cover--Video----Scaled.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 65 - Signs. Signs. Everywhere A Sign.</title>
          <link>https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/</link>
          <description></description>
          <pubDate>Mon, 29 Dec 2025 18:58:46 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6952cf0a2f1b1a00012edb63 ]]></guid>
          <category><![CDATA[  ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/0305c8fc-7dc8-4764-bec4-5acd7d737325/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/ww2akK4ICDY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 65 - Signs. Signs. Everywhere A Sign."></iframe></figure><p>Rules are made and policies are established. But the “how” of implementing and meeting those regulations or policies will be very context specific. In this episode of the Great Security Debate, Dan, Erik, and Brian cover a number of key policies and requirements and some different ways to think about implementing them and how the specific situation, company, risk will affect the way you meet the rule. From driving a car to incident response and everything in between. We debate the need to look back at old rules and see if they all still make sense (a great programme called Kill Stupid Rules), and flexibility in control implementation to meet evolving business needs, to move quickly, and keeping the whole picture of the business, customer, and employees in mind.</p><p>Thanks for Listening!</p><p>Show Notes:</p><ul><li>Passing on the right in Michigan: <a href="https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637&ref=distillingsecurity.com">https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637</a></li><li>Overtake time in Triathlon: <a href="https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/?ref=distillingsecurity.com">https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/</a></li><li>Reflex Security (Agentic Tabletop Exercises and Training): <a href="https://reflexsecurity.io/?ref=distillingsecurity.com">https://reflexsecurity.io</a></li><li>Kill Stupid Rules: <a href="https://www.wsb.com/blog/employee-retention-secret/?ref=distillingsecurity.com">https://www.wsb.com/blog/employee-retention-secret/</a></li><li>GM Dress Code Change (2020): <a href="https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/?ref=distillingsecurity.com">https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/</a></li><li>Silly State Rules: <a href="https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe?ref=distillingsecurity.com">https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe</a></li><li>Sex in Full Self Driving Cars (Clean): <a href="https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029?ref=distillingsecurity.com">https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029</a></li><li>Movie Recommendation - The Usual Suspects: <a href="https://geni.us/wVrLOCB?ref=distillingsecurity.com">https://geni.us/wVrLOCB</a></li><li>John Bingham, COO, Speak by Design: <a href="https://www.speakbydesign.com/about-us?ref=distillingsecurity.com">https://www.speakbydesign.com/about-us</a></li><li>Movie Recommendation - Gremlins: <a href="https://geni.us/qE6NAC?ref=distillingsecurity.com">https://geni.us/qE6NAC</a></li><li>Movie Recommendation -Die Hard: <a href="https://geni.us/eMASs?ref=distillingsecurity.com">https://geni.us/eMASs</a></li><li>Movie Recommendation - Love Actually: <a href="https://geni.us/yj8Fqh?ref=distillingsecurity.com">https://geni.us/yj8Fqh</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 65 - Signs. Signs. Everywhere A Sign.</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/0305c8fc-7dc8-4764-bec4-5acd7d737325/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/ww2akK4ICDY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 65 - Signs. Signs. Everywhere A Sign."></iframe></figure><p>Rules are made and policies are established. But the “how” of implementing and meeting those regulations or policies will be very context specific. In this episode of the Great Security Debate, Dan, Erik, and Brian cover a number of key policies and requirements and some different ways to think about implementing them and how the specific situation, company, risk will affect the way you meet the rule. From driving a car to incident response and everything in between. We debate the need to look back at old rules and see if they all still make sense (a great programme called Kill Stupid Rules), and flexibility in control implementation to meet evolving business needs, to move quickly, and keeping the whole picture of the business, customer, and employees in mind.</p><p>Thanks for Listening!</p><p>Show Notes:</p><ul><li>Passing on the right in Michigan: <a href="https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637&ref=distillingsecurity.com">https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637</a></li><li>Overtake time in Triathlon: <a href="https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/?ref=distillingsecurity.com">https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/</a></li><li>Reflex Security (Agentic Tabletop Exercises and Training): <a href="https://reflexsecurity.io/?ref=distillingsecurity.com">https://reflexsecurity.io</a></li><li>Kill Stupid Rules: <a href="https://www.wsb.com/blog/employee-retention-secret/?ref=distillingsecurity.com">https://www.wsb.com/blog/employee-retention-secret/</a></li><li>GM Dress Code Change (2020): <a href="https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/?ref=distillingsecurity.com">https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/</a></li><li>Silly State Rules: <a href="https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe?ref=distillingsecurity.com">https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe</a></li><li>Sex in Full Self Driving Cars (Clean): <a href="https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029?ref=distillingsecurity.com">https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029</a></li><li>Movie Recommendation - The Usual Suspects: <a href="https://geni.us/wVrLOCB?ref=distillingsecurity.com">https://geni.us/wVrLOCB</a></li><li>John Bingham, COO, Speak by Design: <a href="https://www.speakbydesign.com/about-us?ref=distillingsecurity.com">https://www.speakbydesign.com/about-us</a></li><li>Movie Recommendation - Gremlins: <a href="https://geni.us/qE6NAC?ref=distillingsecurity.com">https://geni.us/qE6NAC</a></li><li>Movie Recommendation -Die Hard: <a href="https://geni.us/eMASs?ref=distillingsecurity.com">https://geni.us/eMASs</a></li><li>Movie Recommendation - Love Actually: <a href="https://geni.us/yj8Fqh?ref=distillingsecurity.com">https://geni.us/yj8Fqh</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/12/GSD-65---New-Look---1080-Cover--Video-.png" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 64 - Agentic Dan</title>
          <link>https://distillingsecurity.com/episode-64-agentic-dan/</link>
          <description></description>
          <pubDate>Mon, 15 Dec 2025 19:58:54 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 694067a3e529b800010e6c6d ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/37860e49-629f-4063-b408-e9eb6a1bdb5b/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/aDdm7mh5skc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="GSD 64   Agentic Dan"></iframe></figure><p>We are back for another Great Security Debate. </p><p>In this episode: we discuss the potential role of agentic AI in security, from true “copilot” to automated decider of things, and whether LLMs are just a really cool search engine. Brian, Erik, and Dan also debate the means and extent to which we could replace ourselves with agents and what the inhibitors and risks are (spoiler alert: trust and survival of that agent after employment were big factors), and how do we train those agents of all the steps our brains take to make the decisions that the humans make, and do so without polluting it with aspirational versions of ourselves (think: Instagram vs Reality). And it all leads to a parenting lesson by Brian and an&nbsp;automotive process lesson by Erik? It’s quite a debate.&nbsp;</p><p>Thanks for listening! We might do one more episode in 2026, but if not have a wonderful holidays and a happy new year!</p><p>Here’s the quote that Brian references at the end of the episode by Tolstoy:</p><blockquote>Patience is waiting.&nbsp;Not passively waiting.&nbsp;That is laziness.&nbsp;But to Keep going when the going is hard and slow - that is patience.&nbsp;The two most powerful warriors are patience and time. The value lies not in reducing "power" (computational energy) but in leveraging that processing power to achieve outcomes that are difficult, slow, or impossible for humans to manage alone.</blockquote><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>Reflex Security - <a href="https://reflexsecurity.io/?ref=distillingsecurity.com" rel="noopener noreferrer">https://reflexsecurity.io</a></li><li>Movie Recommendation: Multiplicity - <a href="https://geni.us/7vgKO?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/7vgKO</a></li><li>Plaid Privacy Policy - <a href="https://plaid.com/legal/?ref=distillingsecurity.com" rel="noopener noreferrer">https://plaid.com/legal/</a></li><li><a href="http://prompts.ai/?ref=distillingsecurity.com" rel="noopener noreferrer">Prompts.ai</a> - <a href="https://www.prompts.ai/en?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.prompts.ai/en</a></li><li>Music Recommendation: Take On Me - A-ha - <a href="https://www.youtube.com/watch?v=djV11Xbc914&ref=distillingsecurity.com" rel="noopener noreferrer">https://www.youtube.com/watch?v=djV11Xbc914</a></li><li>Book Recommendation: The Toyota Way - Book - <a href="https://geni.us/3LcpM?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/3LcpM</a></li><li>Book Recommendation: Six Sigma - <a href="https://geni.us/CS8ql?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/CS8ql</a></li><li>Book Recommendation: Matricide -&nbsp;<a href="https://geni.us/Xfn2MB?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/Xfn2MB</a></li><li>Book Recommendation: The Lorax - <a href="https://geni.us/Fy8X4b?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/Fy8X4b</a></li><li>Perplexity - <a href="https://www.perplexity.ai/?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.perplexity.ai</a></li><li>TV Recommendation - Pluribus (Apple TV+) - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza?ref=distillingsecurity.com" rel="noopener noreferrer">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 64 - Agentic Dan</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/37860e49-629f-4063-b408-e9eb6a1bdb5b/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/aDdm7mh5skc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="GSD 64   Agentic Dan"></iframe></figure><p>We are back for another Great Security Debate. </p><p>In this episode: we discuss the potential role of agentic AI in security, from true “copilot” to automated decider of things, and whether LLMs are just a really cool search engine. Brian, Erik, and Dan also debate the means and extent to which we could replace ourselves with agents and what the inhibitors and risks are (spoiler alert: trust and survival of that agent after employment were big factors), and how do we train those agents of all the steps our brains take to make the decisions that the humans make, and do so without polluting it with aspirational versions of ourselves (think: Instagram vs Reality). And it all leads to a parenting lesson by Brian and an&nbsp;automotive process lesson by Erik? It’s quite a debate.&nbsp;</p><p>Thanks for listening! We might do one more episode in 2026, but if not have a wonderful holidays and a happy new year!</p><p>Here’s the quote that Brian references at the end of the episode by Tolstoy:</p><blockquote>Patience is waiting.&nbsp;Not passively waiting.&nbsp;That is laziness.&nbsp;But to Keep going when the going is hard and slow - that is patience.&nbsp;The two most powerful warriors are patience and time. The value lies not in reducing "power" (computational energy) but in leveraging that processing power to achieve outcomes that are difficult, slow, or impossible for humans to manage alone.</blockquote><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>Reflex Security - <a href="https://reflexsecurity.io/?ref=distillingsecurity.com" rel="noopener noreferrer">https://reflexsecurity.io</a></li><li>Movie Recommendation: Multiplicity - <a href="https://geni.us/7vgKO?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/7vgKO</a></li><li>Plaid Privacy Policy - <a href="https://plaid.com/legal/?ref=distillingsecurity.com" rel="noopener noreferrer">https://plaid.com/legal/</a></li><li><a href="http://prompts.ai/?ref=distillingsecurity.com" rel="noopener noreferrer">Prompts.ai</a> - <a href="https://www.prompts.ai/en?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.prompts.ai/en</a></li><li>Music Recommendation: Take On Me - A-ha - <a href="https://www.youtube.com/watch?v=djV11Xbc914&ref=distillingsecurity.com" rel="noopener noreferrer">https://www.youtube.com/watch?v=djV11Xbc914</a></li><li>Book Recommendation: The Toyota Way - Book - <a href="https://geni.us/3LcpM?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/3LcpM</a></li><li>Book Recommendation: Six Sigma - <a href="https://geni.us/CS8ql?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/CS8ql</a></li><li>Book Recommendation: Matricide -&nbsp;<a href="https://geni.us/Xfn2MB?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/Xfn2MB</a></li><li>Book Recommendation: The Lorax - <a href="https://geni.us/Fy8X4b?ref=distillingsecurity.com" rel="noopener noreferrer">https://geni.us/Fy8X4b</a></li><li>Perplexity - <a href="https://www.perplexity.ai/?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.perplexity.ai</a></li><li>TV Recommendation - Pluribus (Apple TV+) - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza?ref=distillingsecurity.com" rel="noopener noreferrer">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/12/GSD-64---New-Look---Square-Cover---Scaled.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 63 - Give a Sh!t Posture Management</title>
          <link>https://distillingsecurity.com/episode-63-give-a-sh-t-posture-management/</link>
          <description></description>
          <pubDate>Mon, 17 Nov 2025 23:58:07 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 691baf275337170001e16f6a ]]></guid>
          <category><![CDATA[  ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/cedb110d-1e1f-4665-9453-3af8ecc0108e/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/XhfXzC1wmQw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 63 - Give a Sh!t Posture Management"></iframe></figure><p>On this weeks’ Debate, Brian brings a truckload of acronyms for more single panes of glass to help us consolidate our various single panes of glass, Erik may actually be Brian (or maybe Brian is Erik), and Dan confirms he still (and likely always will) spend the rest of his days living in the house he just built deep in the Trough of Disillusionment.</p><p>What started out as a chat about some new technologies in the space turned into a treatise on the state of leadership and the future talent pipeline’s need for more curiosity (and why we think they are starved of the opportunity to learn to be curious). Along the way we talk about what motivates organisations to do security right from the get go vs leaving it alone based on difficulty to remediate, and the risk balances of both (think: productivity vs security). Throw in a little “binary opinions have dragged us into the mire” and you’ve got a full episode of The Great Security Debate.</p><p>We also drop some hints about a new show coming from The Distilling Security network in 2026 called The Final Act which will bring guests in the later stages of their careers about the urgency of our careers in security and tech, what they want to leave behind as legacy, and what they are doing to prepare their orgs for their eventual departure. Add on how they have and will give back to the community, and what their successors want to see done before this first generation of security and tech leaders hit the road.</p><p>Please subscribe and leave a comment.&nbsp; If you’d like to sponsor the network, please email sponsors@distillingsecurity.com</p><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>What is Data Security Posture Management (DSPM) - <a href="https://www.ibm.com/think/topics/data-security-posture-management?ref=distillingsecurity.com">https://www.ibm.com/think/topics/data-security-posture-management</a></li><li>What is Identity Security Posture Management (ISPM) - <a href="https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/?ref=distillingsecurity.com">https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/</a></li><li>What is an Institutional Review Board (IRB) - <a href="https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html?ref=distillingsecurity.com">https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html</a></li><li>Lucy pulls the football (hand egg) away from Charlie Brown - <a href="https://www.youtube.com/watch?v=9dsm7K1Xkn4&ref=distillingsecurity.com">https://www.youtube.com/watch?v=9dsm7K1Xkn4</a></li><li>Healthy foods are more costly - <a href="https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html?ref=distillingsecurity.com">https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html</a></li><li>Why Ford cancelled the Bronco after OJ - <a href="https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/?ref=distillingsecurity.com">https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/</a></li><li>Not enough data - GSD Episode 62 [Audio] - <a href="https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511&ref=distillingsecurity.com">https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511</a></li><li>Not enough data - GSD Episode 62 [Video] -&nbsp;</li><li>Book Recommendation - Anxious Generation by Jonathan Haidt - <a href="https://geni.us/lDrdn3?ref=distillingsecurity.com"><u>https://geni.us/lDrdn3</u></a></li><li>Book Recommendation - The Coddling of the American Mind by Jonathan Haidt - <a href="https://geni.us/Xqary2V?ref=distillingsecurity.com"><u>https://geni.us/Xqary2V</u></a></li><li>Ford has 5000 skilled mechanic jobs they can’t fill - <a href="https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/?ref=distillingsecurity.com">https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 63 - Give a Sh!t Posture Management</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/cedb110d-1e1f-4665-9453-3af8ecc0108e/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/XhfXzC1wmQw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 63 - Give a Sh!t Posture Management"></iframe></figure><p>On this weeks’ Debate, Brian brings a truckload of acronyms for more single panes of glass to help us consolidate our various single panes of glass, Erik may actually be Brian (or maybe Brian is Erik), and Dan confirms he still (and likely always will) spend the rest of his days living in the house he just built deep in the Trough of Disillusionment.</p><p>What started out as a chat about some new technologies in the space turned into a treatise on the state of leadership and the future talent pipeline’s need for more curiosity (and why we think they are starved of the opportunity to learn to be curious). Along the way we talk about what motivates organisations to do security right from the get go vs leaving it alone based on difficulty to remediate, and the risk balances of both (think: productivity vs security). Throw in a little “binary opinions have dragged us into the mire” and you’ve got a full episode of The Great Security Debate.</p><p>We also drop some hints about a new show coming from The Distilling Security network in 2026 called The Final Act which will bring guests in the later stages of their careers about the urgency of our careers in security and tech, what they want to leave behind as legacy, and what they are doing to prepare their orgs for their eventual departure. Add on how they have and will give back to the community, and what their successors want to see done before this first generation of security and tech leaders hit the road.</p><p>Please subscribe and leave a comment.&nbsp; If you’d like to sponsor the network, please email sponsors@distillingsecurity.com</p><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>What is Data Security Posture Management (DSPM) - <a href="https://www.ibm.com/think/topics/data-security-posture-management?ref=distillingsecurity.com">https://www.ibm.com/think/topics/data-security-posture-management</a></li><li>What is Identity Security Posture Management (ISPM) - <a href="https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/?ref=distillingsecurity.com">https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/</a></li><li>What is an Institutional Review Board (IRB) - <a href="https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html?ref=distillingsecurity.com">https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html</a></li><li>Lucy pulls the football (hand egg) away from Charlie Brown - <a href="https://www.youtube.com/watch?v=9dsm7K1Xkn4&ref=distillingsecurity.com">https://www.youtube.com/watch?v=9dsm7K1Xkn4</a></li><li>Healthy foods are more costly - <a href="https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html?ref=distillingsecurity.com">https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html</a></li><li>Why Ford cancelled the Bronco after OJ - <a href="https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/?ref=distillingsecurity.com">https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/</a></li><li>Not enough data - GSD Episode 62 [Audio] - <a href="https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511&ref=distillingsecurity.com">https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511</a></li><li>Not enough data - GSD Episode 62 [Video] -&nbsp;</li><li>Book Recommendation - Anxious Generation by Jonathan Haidt - <a href="https://geni.us/lDrdn3?ref=distillingsecurity.com"><u>https://geni.us/lDrdn3</u></a></li><li>Book Recommendation - The Coddling of the American Mind by Jonathan Haidt - <a href="https://geni.us/Xqary2V?ref=distillingsecurity.com"><u>https://geni.us/Xqary2V</u></a></li><li>Ford has 5000 skilled mechanic jobs they can’t fill - <a href="https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/?ref=distillingsecurity.com">https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/GSD-63---New-Look---Square-Cover.png" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>New Podcast Coming Soon: The Final Act</title>
          <link>https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/</link>
          <description></description>
          <pubDate>Tue, 11 Nov 2025 14:53:43 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 69134c946d83a300016d8eed ]]></guid>
          <category><![CDATA[ The Final Act ]]></category>
          <content:encoded><![CDATA[ <p><strong>Announcing <em>The Final Act</em>: Navigating the Next Chapter of Tech and Security Leadership</strong></p><p><em>Click the <strong>Subscribe</strong> button at the upper right of the screen to be notified when new episodes of Distilling Security podcasts, including The Final Act are available.</em></p><p>We've all been there – heads down, building, innovating, leading teams through the ever-accelerating landscape of technology and cybersecurity. For many of us, this journey began decades ago, shaping not just our careers, but the very field we work in and the fabric of the organisations we serve. But what happens when the time comes to look beyond the daily grind? What does it mean to "leave well"?</p><p>Today, we're thrilled to announce a new podcast from the Distilling Security Network designed to explore these crucial, infrequently-discussed questions: <em>The Final Act</em>.</p><p><em>The Final Act</em> isn't just about hanging up your boots. It’s about understanding the profound implications of leadership transition in fields that grew up around us. If you're a seasoned tech or security leader, you know your fingerprints are all over the systems, the culture, and the strategy of your organisation. How do you prepare for your departure in a way that truly sets your successors up for success?</p><p>Our intent with this podcast is to provide a much-needed chronicle to serve as guide for current and aspiring leaders who are contemplating the "next chapter" of their careers, to capture the urgency and the impact of the role, and the imperatives that come along with that.</p><p>Each episode of <em>The Final Act</em> will feature an in-depth interview with current and former leaders from across the technology and infosec space. We'll hear their candid stories, their successes, their regrets, and their practical advice on navigating career transitions with grace, foresight, and influence. We'll also invite other guests to provide broader perspectives on leadership, career development, and life after the traditional office.</p><p>It's about hearing and learning from those who have walked the path, or are currently walking it, and equipping the next wave of leaders with the insights they need to carry the torch forward. And it's about making sure we leave behind a field that's ready for the next generation, and a next generation that's ready for the field.</p><p><em>The Final Act</em> is more than a podcast; it's a conversation about the future of leadership, built on the foundations of the past. It’s about ensuring that the incredible wisdom accumulated over decades isn't lost but leveraged for the challenges and opportunities ahead.</p><p><strong>The first episode of <em>The Final Act</em> will be launching soon!</strong></p><p><strong>Subscribe today</strong>&nbsp;wherever you get your podcasts, and follow us on social media for updates.</p><ul><li><strong>Listen on your favourite podcast app</strong></li><li><strong>Watch on YouTube:</strong> <a href="https://youtube.com/@finalactpodcast?ref=distillingsecurity.com">https://youtube.com/@finalactpodcast</a></li><li><strong>Learn more at:</strong> <a href="https://distillingsecurity.com/finalact">https://distillingsecurity.com/finalact</a></li></ul> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>New Podcast Coming Soon: The Final Act</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ <p><strong>Announcing <em>The Final Act</em>: Navigating the Next Chapter of Tech and Security Leadership</strong></p><p><em>Click the <strong>Subscribe</strong> button at the upper right of the screen to be notified when new episodes of Distilling Security podcasts, including The Final Act are available.</em></p><p>We've all been there – heads down, building, innovating, leading teams through the ever-accelerating landscape of technology and cybersecurity. For many of us, this journey began decades ago, shaping not just our careers, but the very field we work in and the fabric of the organisations we serve. But what happens when the time comes to look beyond the daily grind? What does it mean to "leave well"?</p><p>Today, we're thrilled to announce a new podcast from the Distilling Security Network designed to explore these crucial, infrequently-discussed questions: <em>The Final Act</em>.</p><p><em>The Final Act</em> isn't just about hanging up your boots. It’s about understanding the profound implications of leadership transition in fields that grew up around us. If you're a seasoned tech or security leader, you know your fingerprints are all over the systems, the culture, and the strategy of your organisation. How do you prepare for your departure in a way that truly sets your successors up for success?</p><p>Our intent with this podcast is to provide a much-needed chronicle to serve as guide for current and aspiring leaders who are contemplating the "next chapter" of their careers, to capture the urgency and the impact of the role, and the imperatives that come along with that.</p><p>Each episode of <em>The Final Act</em> will feature an in-depth interview with current and former leaders from across the technology and infosec space. We'll hear their candid stories, their successes, their regrets, and their practical advice on navigating career transitions with grace, foresight, and influence. We'll also invite other guests to provide broader perspectives on leadership, career development, and life after the traditional office.</p><p>It's about hearing and learning from those who have walked the path, or are currently walking it, and equipping the next wave of leaders with the insights they need to carry the torch forward. And it's about making sure we leave behind a field that's ready for the next generation, and a next generation that's ready for the field.</p><p><em>The Final Act</em> is more than a podcast; it's a conversation about the future of leadership, built on the foundations of the past. It’s about ensuring that the incredible wisdom accumulated over decades isn't lost but leveraged for the challenges and opportunities ahead.</p><p><strong>The first episode of <em>The Final Act</em> will be launching soon!</strong></p><p><strong>Subscribe today</strong>&nbsp;wherever you get your podcasts, and follow us on social media for updates.</p><ul><li><strong>Listen on your favourite podcast app</strong></li><li><strong>Watch on YouTube:</strong> <a href="https://youtube.com/@finalactpodcast?ref=distillingsecurity.com">https://youtube.com/@finalactpodcast</a></li><li><strong>Learn more at:</strong> <a href="https://distillingsecurity.com/finalact">https://distillingsecurity.com/finalact</a></li></ul> ]]></itunes:summary>
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 62 - The 100 Years AI Flood</title>
          <link>https://distillingsecurity.com/episode-62-the-100-years-ai-flood/</link>
          <description></description>
          <pubDate>Mon, 03 Nov 2025 13:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912c803e3ba730001766b02 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/32b53907-921b-4dac-8af6-7f59c903f33b/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/E7O_KFc1Nss?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Great Security Debate 62 - The 100 Years AI Flood"></iframe></figure><p>The Great Security Debate is *back*! It’s been a busy year, but it’s time to get this show back on the air (and maybe on the road). Dan takes a break from the rat race, Erik took over the world, and Brian uses Elmer’s Glue to splice his network cables.</p><p>Topics in the show this week:&nbsp;</p><ul><li>AWS and Microsoft make the best cases for business continuity plans, the AI</li><li>Is public cloud reliable enough? Should we all move back to local data centres? How can we reliably assess that risk?</li><li>Want an AI Data Centre on your town? NIMBY vs Innovation!</li></ul><p>We will be back every 2 weeks on Mondays. Subscribe on YouTube at&nbsp;<a href="https://youtube.com/@greatsecuritydebate?ref=distillingsecurity.com" rel="noopener noreferrer">https://youtube.com/@greatsecuritydebate</a>to see our smiling faces as you watch, or in your favourite podcast application to listen on your commute or with your whole family around the radio.</p><p>See you on the 17th with more debates! And some entirely new shows coming from Distilling Security very soon, too. Subscribe to the newsletter on our website&nbsp;<a href="https://distillingsecurity.com/" rel="noopener noreferrer">https://distillingsecurity.com</a>&nbsp;to hear all about them</p><p>Links to mentioned articles and topics:</p><ul><li>AWS Outage – 20 October 2025 –&nbsp;<a href="https://www.bbc.com/news/articles/cev1en9077ro?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.bbc.com/news/articles/cev1en9077ro</a></li><li>Microsoft Azure Outage –&nbsp;<a href="https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724</a></li><li>37Signals move from AWS to Data Centre –&nbsp;<a href="https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd?ref=distillingsecurity.com" rel="noopener noreferrer">https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd</a></li><li>100 Years Flood –&nbsp;<a href="http://usgs.gov/?ref=distillingsecurity.com" rel="noopener noreferrer">usgs.gov</a>&nbsp;–&nbsp;<a href="https://www.usgs.gov/water-science-school/science/100-year-flood?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.usgs.gov/water-science-school/science/100-year-flood</a></li><li>Great Flood of 1937 –&nbsp;<a href="https://www.weather.gov/lmk/flood_37?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.weather.gov/lmk/flood_37</a></li><li>Impact of Jaguar Land Rover Incident –&nbsp;<a href="https://www.bbc.com/news/articles/c0qpl0v3gnzo?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.bbc.com/news/articles/c0qpl0v3gnzo</a></li><li>CDK Attack and Outage –&nbsp;<a href="https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers</a></li><li>Russian grain blockade against Ukraine –&nbsp;<a href="https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade</a></li><li>Saline, Michigan OpenAI Data Centre &amp; Pushback –&nbsp;<a href="https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c?ref=distillingsecurity.com" rel="noopener noreferrer">https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c</a></li><li>Racine, Wisconsin Foxconn and Microsoft site failures –&nbsp;<a href="https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/?ref=distillingsecurity.com" rel="noopener noreferrer">https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/</a></li><li>Racine, Wisconsin What happened to FoxConn?&nbsp;<a href="https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/</a></li><li>Gartner Hype Cycle –&nbsp;<a href="https://www.gartner.com/en/research/methodologies/gartner-hype-cycle?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.gartner.com/en/research/methodologies/gartner-hype-cycle</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 62 - The 100 Years AI Flood</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/32b53907-921b-4dac-8af6-7f59c903f33b/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/E7O_KFc1Nss?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Great Security Debate 62 - The 100 Years AI Flood"></iframe></figure><p>The Great Security Debate is *back*! It’s been a busy year, but it’s time to get this show back on the air (and maybe on the road). Dan takes a break from the rat race, Erik took over the world, and Brian uses Elmer’s Glue to splice his network cables.</p><p>Topics in the show this week:&nbsp;</p><ul><li>AWS and Microsoft make the best cases for business continuity plans, the AI</li><li>Is public cloud reliable enough? Should we all move back to local data centres? How can we reliably assess that risk?</li><li>Want an AI Data Centre on your town? NIMBY vs Innovation!</li></ul><p>We will be back every 2 weeks on Mondays. Subscribe on YouTube at&nbsp;<a href="https://youtube.com/@greatsecuritydebate?ref=distillingsecurity.com" rel="noopener noreferrer">https://youtube.com/@greatsecuritydebate</a>to see our smiling faces as you watch, or in your favourite podcast application to listen on your commute or with your whole family around the radio.</p><p>See you on the 17th with more debates! And some entirely new shows coming from Distilling Security very soon, too. Subscribe to the newsletter on our website&nbsp;<a href="https://distillingsecurity.com/" rel="noopener noreferrer">https://distillingsecurity.com</a>&nbsp;to hear all about them</p><p>Links to mentioned articles and topics:</p><ul><li>AWS Outage – 20 October 2025 –&nbsp;<a href="https://www.bbc.com/news/articles/cev1en9077ro?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.bbc.com/news/articles/cev1en9077ro</a></li><li>Microsoft Azure Outage –&nbsp;<a href="https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724</a></li><li>37Signals move from AWS to Data Centre –&nbsp;<a href="https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd?ref=distillingsecurity.com" rel="noopener noreferrer">https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd</a></li><li>100 Years Flood –&nbsp;<a href="http://usgs.gov/?ref=distillingsecurity.com" rel="noopener noreferrer">usgs.gov</a>&nbsp;–&nbsp;<a href="https://www.usgs.gov/water-science-school/science/100-year-flood?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.usgs.gov/water-science-school/science/100-year-flood</a></li><li>Great Flood of 1937 –&nbsp;<a href="https://www.weather.gov/lmk/flood_37?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.weather.gov/lmk/flood_37</a></li><li>Impact of Jaguar Land Rover Incident –&nbsp;<a href="https://www.bbc.com/news/articles/c0qpl0v3gnzo?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.bbc.com/news/articles/c0qpl0v3gnzo</a></li><li>CDK Attack and Outage –&nbsp;<a href="https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers</a></li><li>Russian grain blockade against Ukraine –&nbsp;<a href="https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade</a></li><li>Saline, Michigan OpenAI Data Centre &amp; Pushback –&nbsp;<a href="https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c?ref=distillingsecurity.com" rel="noopener noreferrer">https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c</a></li><li>Racine, Wisconsin Foxconn and Microsoft site failures –&nbsp;<a href="https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/?ref=distillingsecurity.com" rel="noopener noreferrer">https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/</a></li><li>Racine, Wisconsin What happened to FoxConn?&nbsp;<a href="https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/</a></li><li>Gartner Hype Cycle –&nbsp;<a href="https://www.gartner.com/en/research/methodologies/gartner-hype-cycle?ref=distillingsecurity.com" rel="noopener noreferrer">https://www.gartner.com/en/research/methodologies/gartner-hype-cycle</a></li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/GSD-62---New-Look---Square-Cover---Scaled.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 61 - Risky Risks</title>
          <link>https://distillingsecurity.com/episode-61-risky-risks/</link>
          <description></description>
          <pubDate>Mon, 12 May 2025 13:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912cb64e3ba730001766b50 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/dba0904a-8943-49b2-a9bb-94cdb059b5e2/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/sRGTzU3eUmw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 61 - Risky Risks: Live from the GTS Security Summit"></iframe></figure><p>The Great Security Debate crew recorded a live episode at the GTS Security Summit in Detroit, Michigan with special guest, Zah Gonzalvo, SVP of Financial, Climate, and Operational Risk at Banco Popular. Tune in for a great discussion on risk, risk mitigation, risk prioritisation, and risk in context. Yep, it’s all about risk!</p><p>Takeaways:</p><ul><li>The evolution of security has shifted from a binary perspective to a more nuanced understanding of risk management, acknowledging the need for flexibility in addressing diverse security challenges.&nbsp;</li><li>In contemporary discussions, it is increasingly evident that security must be integrated into business strategy, highlighting the imperative for security professionals to communicate effectively with stakeholders.&nbsp;</li><li>The role of the Chief Information Security Officer (CISO) has transcended traditional technological boundaries, necessitating a comprehensive grasp of business risk and operational efficiency.&nbsp;</li><li>Effective risk management within organizations requires a shared responsibility model, where every employee contributes to the overall security posture, thus reinforcing the concept that security is a collective endeavor.&nbsp;</li><li>Scenario analysis is a potent tool in risk management, enabling organizations to anticipate potential threats and understand the implications of various risk scenarios on their operations.&nbsp;</li><li>Engaging with business units to contextualize security risks in terms of operational impact and financial implications is vital for securing necessary budgets and resources for security initiatives.</li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 61 - Risky Risks</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/dba0904a-8943-49b2-a9bb-94cdb059b5e2/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/sRGTzU3eUmw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 61 - Risky Risks: Live from the GTS Security Summit"></iframe></figure><p>The Great Security Debate crew recorded a live episode at the GTS Security Summit in Detroit, Michigan with special guest, Zah Gonzalvo, SVP of Financial, Climate, and Operational Risk at Banco Popular. Tune in for a great discussion on risk, risk mitigation, risk prioritisation, and risk in context. Yep, it’s all about risk!</p><p>Takeaways:</p><ul><li>The evolution of security has shifted from a binary perspective to a more nuanced understanding of risk management, acknowledging the need for flexibility in addressing diverse security challenges.&nbsp;</li><li>In contemporary discussions, it is increasingly evident that security must be integrated into business strategy, highlighting the imperative for security professionals to communicate effectively with stakeholders.&nbsp;</li><li>The role of the Chief Information Security Officer (CISO) has transcended traditional technological boundaries, necessitating a comprehensive grasp of business risk and operational efficiency.&nbsp;</li><li>Effective risk management within organizations requires a shared responsibility model, where every employee contributes to the overall security posture, thus reinforcing the concept that security is a collective endeavor.&nbsp;</li><li>Scenario analysis is a potent tool in risk management, enabling organizations to anticipate potential threats and understand the implications of various risk scenarios on their operations.&nbsp;</li><li>Engaging with business units to contextualize security risks in terms of operational impact and financial implications is vital for securing necessary budgets and resources for security initiatives.</li></ul><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/IMG_6628.png" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 60 - Fantasy Hacker League</title>
          <link>https://distillingsecurity.com/episode-60-fantasy-hacker-league/</link>
          <description></description>
          <pubDate>Mon, 21 Oct 2024 13:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912cc2ee3ba730001766b63 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/4800a409-2470-49fd-ac2a-1e92dba12264/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/bqhjD-AsI4s?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 60 - Fantasy Hacker League"></iframe></figure><p>In this episode of The Great Security Debate, Dan, Brian and Erik invent (and copyright) the idea of a Fantasy Hacker League then dig into more serious discussions on deception technology, asset discovery challenges, and resource management. The conversation also delves into the impact of budget constraints on security projects, the mental toll on cybersecurity professionals, and the evolving role of CISOs in digital transformation. Issues such as job stress, burnout, and role mismatches among security leaders are addressed, alongside strategic insights on integrating security within broader business operations.</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 60 - Fantasy Hacker League</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/4800a409-2470-49fd-ac2a-1e92dba12264/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/bqhjD-AsI4s?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 60 - Fantasy Hacker League"></iframe></figure><p>In this episode of The Great Security Debate, Dan, Brian and Erik invent (and copyright) the idea of a Fantasy Hacker League then dig into more serious discussions on deception technology, asset discovery challenges, and resource management. The conversation also delves into the impact of budget constraints on security projects, the mental toll on cybersecurity professionals, and the evolving role of CISOs in digital transformation. Issues such as job stress, burnout, and role mismatches among security leaders are addressed, alongside strategic insights on integrating security within broader business operations.</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/GSD-60---New-Look---Square-Cover---Scaled.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 59 - Free Disaster Recovery Tests!</title>
          <link>https://distillingsecurity.com/episode-59-free-disaster-recovery-tests/</link>
          <description></description>
          <pubDate>Tue, 03 Sep 2024 13:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912ccabe3ba730001766b74 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/53c823d8-5261-48ba-b4a7-3ba5ce54e896/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/9KPDyHOd73A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 59   Free Disaster Recovery Test"></iframe></figure><p>Welcome to the Great Security Debate! In this episode, experts take on a multifaceted discussion about the intricacies of technology and cybersecurity. The debate navigates through the recent incident involving CrowdStrike and Microsoft, dissecting the layers of technology, processes, and the roles of different entities in maintaining security. Emphasizing the lessons learned, the debate also explores the challenges of disaster recovery, business continuity, and balancing risk in an increasingly complex digital landscape. Tune in as the hosts delve into the ramifications of over-consolidation, the implications of vendor lock-in, and the importance of maintaining a culture of quality and robust testing.</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 59 - Free Disaster Recovery Tests!</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/53c823d8-5261-48ba-b4a7-3ba5ce54e896/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/9KPDyHOd73A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 59   Free Disaster Recovery Test"></iframe></figure><p>Welcome to the Great Security Debate! In this episode, experts take on a multifaceted discussion about the intricacies of technology and cybersecurity. The debate navigates through the recent incident involving CrowdStrike and Microsoft, dissecting the layers of technology, processes, and the roles of different entities in maintaining security. Emphasizing the lessons learned, the debate also explores the challenges of disaster recovery, business continuity, and balancing risk in an increasingly complex digital landscape. Tune in as the hosts delve into the ramifications of over-consolidation, the implications of vendor lock-in, and the importance of maintaining a culture of quality and robust testing.</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/GSD-59---New-Look---Square-Cover.png" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 58 - To Insure or Not To Insure: It’s Not Even a Question</title>
          <link>https://distillingsecurity.com/episode-58-to-insure-or-not-to-insure-its-not-even-a-question/</link>
          <description></description>
          <pubDate>Mon, 01 Jul 2024 13:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912cfbfe3ba730001766b89 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/6b878415-5ca5-4001-af83-6dd903d99fe6/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/GSIdAsCIiaE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 58 - To Insure or Not To Insure: There Is No Question!"></iframe></figure><p>This episode of ‘The Great Security Debate’ delves into the complexities surrounding cyber insurance, discussing its impact on minimising business risks and ensuring compliance. Erik, Brian, and Dan talk about how connected systems and automation increase risks and integrates AI reliance concerns.&nbsp;</p><p>Insurance policies, force majeure, and government regulations get some quality discussion and debate time, revealing fears and misconceptions about standardised security controls vs. adaptive security practices. And last up: the practicality and pitfalls of self-insurance, government intervention, and the need for standardised security terminology.</p><p>Show Links:</p><ul><li><a href="https://www.cisa.gov/resources-tools/resources/cisa-secure-design-pledge?ref=distillingsecurity.com" rel="noopener noreferrer">CISA Secure by Design Pledge | CISA</a></li><li><a href="https://www.cisa.gov/news-events/alerts/2024/06/20/cisa-releases-guidance-single-sign-sso-adoption-small-and-medium-sized-businesses-smbs?ref=distillingsecurity.com" rel="noopener noreferrer">CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs) | CISA</a></li><li><a href="https://www.nbcnews.com/data-graphics/118th-congress-age-third-oldest-1789-rcna64117?ref=distillingsecurity.com" rel="noopener noreferrer">The 118th Congress is the third oldest since 1789</a></li><li><a href="https://amzn.to/4bqUL4d?ref=distillingsecurity.com" rel="noopener noreferrer">Book – The End of the World Is Just the Beginning</a></li><li><a href="https://rollcall.com/2024/06/28/supreme-courts-chevron-ruling-means-changes-for-writing-laws/?ref=distillingsecurity.com" rel="noopener noreferrer">Supreme Court’s ‘Chevron’ ruling means changes for writing laws – Roll Call</a></li><li><a href="https://www.wsj.com/articles/insurers-warn-standardizing-cyber-policies-could-limit-future-coverage-fb0b7876?ref=distillingsecurity.com" rel="noopener noreferrer">Insurers Warn Standardizing Cyber Policies Could Limit Future Coverage</a></li><li><a href="https://www.nytimes.com/2024/06/21/business/cyberattack-car-dealers-cdk.html?ref=distillingsecurity.com" rel="noopener noreferrer">Cyberattacks Disrupt Car Sales by Dealers in U.S. and Canada</a></li></ul><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 58 - To Insure or Not To Insure: It’s Not Even a Question</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/6b878415-5ca5-4001-af83-6dd903d99fe6/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/GSIdAsCIiaE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 58 - To Insure or Not To Insure: There Is No Question!"></iframe></figure><p>This episode of ‘The Great Security Debate’ delves into the complexities surrounding cyber insurance, discussing its impact on minimising business risks and ensuring compliance. Erik, Brian, and Dan talk about how connected systems and automation increase risks and integrates AI reliance concerns.&nbsp;</p><p>Insurance policies, force majeure, and government regulations get some quality discussion and debate time, revealing fears and misconceptions about standardised security controls vs. adaptive security practices. And last up: the practicality and pitfalls of self-insurance, government intervention, and the need for standardised security terminology.</p><p>Show Links:</p><ul><li><a href="https://www.cisa.gov/resources-tools/resources/cisa-secure-design-pledge?ref=distillingsecurity.com" rel="noopener noreferrer">CISA Secure by Design Pledge | CISA</a></li><li><a href="https://www.cisa.gov/news-events/alerts/2024/06/20/cisa-releases-guidance-single-sign-sso-adoption-small-and-medium-sized-businesses-smbs?ref=distillingsecurity.com" rel="noopener noreferrer">CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs) | CISA</a></li><li><a href="https://www.nbcnews.com/data-graphics/118th-congress-age-third-oldest-1789-rcna64117?ref=distillingsecurity.com" rel="noopener noreferrer">The 118th Congress is the third oldest since 1789</a></li><li><a href="https://amzn.to/4bqUL4d?ref=distillingsecurity.com" rel="noopener noreferrer">Book – The End of the World Is Just the Beginning</a></li><li><a href="https://rollcall.com/2024/06/28/supreme-courts-chevron-ruling-means-changes-for-writing-laws/?ref=distillingsecurity.com" rel="noopener noreferrer">Supreme Court’s ‘Chevron’ ruling means changes for writing laws – Roll Call</a></li><li><a href="https://www.wsj.com/articles/insurers-warn-standardizing-cyber-policies-could-limit-future-coverage-fb0b7876?ref=distillingsecurity.com" rel="noopener noreferrer">Insurers Warn Standardizing Cyber Policies Could Limit Future Coverage</a></li><li><a href="https://www.nytimes.com/2024/06/21/business/cyberattack-car-dealers-cdk.html?ref=distillingsecurity.com" rel="noopener noreferrer">Cyberattacks Disrupt Car Sales by Dealers in U.S. and Canada</a></li></ul><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/GSD-58---New-Look---Square-Cover---Scaled.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Distilling Security Michigan BBQ Meet-Up - July 18th</title>
          <link>https://distillingsecurity.com/distilling-security-michigan-bbq-meet-up-july-18th-6912c6751edcdb001bbde97d/</link>
          <description></description>
          <pubDate>Mon, 24 Jun 2024 03:50:41 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912c675e3ba730001766a8a ]]></guid>
          <category><![CDATA[ Live Event ]]></category>
          <content:encoded><![CDATA[ <figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/ds-lake-cass-event-2024-07-18-2.png" class="kg-image" alt="" loading="lazy" width="1080" height="1080" srcset="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/size/w600/2025/11/ds-lake-cass-event-2024-07-18-2.png 600w, https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/size/w1000/2025/11/ds-lake-cass-event-2024-07-18-2.png 1000w, https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/ds-lake-cass-event-2024-07-18-2.png 1080w" sizes="(min-width: 720px) 720px"></figure><p>Mark your calendars for the 18th of July, because we're hosting a get-together like no other! The event will kick off at 3:30 PM and run until 9:00 PM, giving us ample time to enjoy the beautiful surroundings of Cass Lake.</p><p>The agenda for the day is packed with activities. You can arrive anytime between 3:30-4:30 PM, after which we'll have a social hour leading up to dinner at 6:00 PM. For the adventurous, boat rides and swimming will be available from 5:00 PM to 9:00 PM. And though the party officially ends at 9:00 PM, we're more than happy to have you stick around to watch the sunset at 9:19 PM.</p><p>Remember to dress casually, and feel free to bring a change of clothes for the boat rides. We'll be providing food and drinks, so all you need to bring is your appetite! Parking will be available in the neighbourhood, and we'll provide more details as the event date approaches.</p><p>Now, let's talk about the food. Our menu features</p><ul><li>Thai Style Sticky Ribs,</li><li>Grilled Chicken Wings,</li><li>Wagyu A5 Skirt Steak, and</li><li>Possibly some homemade tube meat that goes in a bun.</li></ul><p>Our sides include:</p><ul><li>Homemade Tomato Basil Pasta,</li><li>Mac N Cheese,</li><li>Guacamole,</li><li>Salsa, and</li><li>Chips</li></ul><p>We're also serving Japanese Fried Rice and grilled vegetables, along with a variety of salads.</p><p>To quench your thirst, the <a href="https://www.detroitcitydistillery.com/?ref=distillingsecurity.com">Detroit City Distillery</a> will be on hand with mixed drinks, and we'll also have a variety of non-alcoholic beverages.</p><p>And a huge thanks to our sponsors, <a href="https://material.security/?ref=distillingsecurity.com">Material Security</a>, <a href="https://www.cyberhaven.com/?ref=distillingsecurity.com">Cyberhaven</a>, <a href="http://legitsecurity.com/?ref=distillingsecurity.com">Legit Security</a>, <a href="http://orca.security/?ref=distillingsecurity.com">Orca Security</a>, and <a href="https://www.imperva.com/?ref=distillingsecurity.com">Imperva</a> (now part of <a href="https://www.thalesgroup.com/en?ref=distillingsecurity.com">Thales</a>). Go check them out and see what they are all about.</p><p>So join us for an evening of socializing, swimming, boating, and indulging in some mouth-watering food. If you'd like to join, please register via the form</p><h2 id="registration-for-this-event-has-closed">Registration for this event has closed.</h2><h2 id="thanks-for-your-interest">Thanks for your interest.</h2><h2 id="please-sign-up-for-our-newsletter-to-stay-in-touch-with-us-about-future-events">Please sign up for our newsletter to stay in touch with us about future events!</h2> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Distilling Security Michigan BBQ Meet-Up - July 18th</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ <figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/ds-lake-cass-event-2024-07-18-2.png" class="kg-image" alt="" loading="lazy" width="1080" height="1080" srcset="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/size/w600/2025/11/ds-lake-cass-event-2024-07-18-2.png 600w, https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/size/w1000/2025/11/ds-lake-cass-event-2024-07-18-2.png 1000w, https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/ds-lake-cass-event-2024-07-18-2.png 1080w" sizes="(min-width: 720px) 720px"></figure><p>Mark your calendars for the 18th of July, because we're hosting a get-together like no other! The event will kick off at 3:30 PM and run until 9:00 PM, giving us ample time to enjoy the beautiful surroundings of Cass Lake.</p><p>The agenda for the day is packed with activities. You can arrive anytime between 3:30-4:30 PM, after which we'll have a social hour leading up to dinner at 6:00 PM. For the adventurous, boat rides and swimming will be available from 5:00 PM to 9:00 PM. And though the party officially ends at 9:00 PM, we're more than happy to have you stick around to watch the sunset at 9:19 PM.</p><p>Remember to dress casually, and feel free to bring a change of clothes for the boat rides. We'll be providing food and drinks, so all you need to bring is your appetite! Parking will be available in the neighbourhood, and we'll provide more details as the event date approaches.</p><p>Now, let's talk about the food. Our menu features</p><ul><li>Thai Style Sticky Ribs,</li><li>Grilled Chicken Wings,</li><li>Wagyu A5 Skirt Steak, and</li><li>Possibly some homemade tube meat that goes in a bun.</li></ul><p>Our sides include:</p><ul><li>Homemade Tomato Basil Pasta,</li><li>Mac N Cheese,</li><li>Guacamole,</li><li>Salsa, and</li><li>Chips</li></ul><p>We're also serving Japanese Fried Rice and grilled vegetables, along with a variety of salads.</p><p>To quench your thirst, the <a href="https://www.detroitcitydistillery.com/?ref=distillingsecurity.com">Detroit City Distillery</a> will be on hand with mixed drinks, and we'll also have a variety of non-alcoholic beverages.</p><p>And a huge thanks to our sponsors, <a href="https://material.security/?ref=distillingsecurity.com">Material Security</a>, <a href="https://www.cyberhaven.com/?ref=distillingsecurity.com">Cyberhaven</a>, <a href="http://legitsecurity.com/?ref=distillingsecurity.com">Legit Security</a>, <a href="http://orca.security/?ref=distillingsecurity.com">Orca Security</a>, and <a href="https://www.imperva.com/?ref=distillingsecurity.com">Imperva</a> (now part of <a href="https://www.thalesgroup.com/en?ref=distillingsecurity.com">Thales</a>). Go check them out and see what they are all about.</p><p>So join us for an evening of socializing, swimming, boating, and indulging in some mouth-watering food. If you'd like to join, please register via the form</p><h2 id="registration-for-this-event-has-closed">Registration for this event has closed.</h2><h2 id="thanks-for-your-interest">Thanks for your interest.</h2><h2 id="please-sign-up-for-our-newsletter-to-stay-in-touch-with-us-about-future-events">Please sign up for our newsletter to stay in touch with us about future events!</h2> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/DSC00103-scaled-1.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 57 - Wear a Stop Sign On Your Shirt</title>
          <link>https://distillingsecurity.com/episode-57-wear-a-stop-sign-on-your-shirt/</link>
          <description></description>
          <pubDate>Thu, 06 Jun 2024 13:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912d273e3ba730001766ba6 ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/da2d5eb8-3e52-4d3f-983a-8f0668d465a0/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/SM5aicdnC0A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 57 - Wear a Stop Sign On Your Shirt"></iframe></figure><p>In this episode of the Great Security Debate, Brian, Erik, and Dan dive into the latest trends in ransomware including an uptick in attacks against the hypervisor. Speaking of VMWare, we also “discuss” the way that Broadcom has handled the VMWare acquisition and why it both make sense (to them) and doesn’t (to many customers).</p><p>The debate also heads into the impact of AI in cyber threats, and compare strategies for mitigating risk, such as prioritising vulnerabilities and understanding the attack landscape.&nbsp;</p><p>Additionally, the conversation shifts to business practices in tech acquisitions and the potential future disruptions in the market and importance of balancing security measures with user experience, and the need for adaptive, short-term security roadmaps to stay ahead in an ever-changing environment.&nbsp;</p><p>And break the big news about an upcoming Distilling Security in-person meet-up in Michigan in July!</p><p>Show Notes:</p><ul><li><a href="https://arstechnica.com/information-technology/2024/04/broadcom-execs-say-vmware-price-subscription-complaints-are-unwarranted/?ref=distillingsecurity.com" rel="noopener noreferrer">Broadcom execs say VMware price, subscription complaints are unwarranted&nbsp; | Ars Technica</a></li><li><a href="https://blog.google/products/search/ai-overviews-update-may-2024/?ref=distillingsecurity.com" rel="noopener noreferrer">What happened with AI Overviews and next steps</a></li><li><a href="https://amzn.to/457gfBq?ref=distillingsecurity.com" rel="noopener noreferrer">Book – Titan: The Life of John D. Rockefeller, Sr.</a></li></ul><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 57 - Wear a Stop Sign On Your Shirt</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/da2d5eb8-3e52-4d3f-983a-8f0668d465a0/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/SM5aicdnC0A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 57 - Wear a Stop Sign On Your Shirt"></iframe></figure><p>In this episode of the Great Security Debate, Brian, Erik, and Dan dive into the latest trends in ransomware including an uptick in attacks against the hypervisor. Speaking of VMWare, we also “discuss” the way that Broadcom has handled the VMWare acquisition and why it both make sense (to them) and doesn’t (to many customers).</p><p>The debate also heads into the impact of AI in cyber threats, and compare strategies for mitigating risk, such as prioritising vulnerabilities and understanding the attack landscape.&nbsp;</p><p>Additionally, the conversation shifts to business practices in tech acquisitions and the potential future disruptions in the market and importance of balancing security measures with user experience, and the need for adaptive, short-term security roadmaps to stay ahead in an ever-changing environment.&nbsp;</p><p>And break the big news about an upcoming Distilling Security in-person meet-up in Michigan in July!</p><p>Show Notes:</p><ul><li><a href="https://arstechnica.com/information-technology/2024/04/broadcom-execs-say-vmware-price-subscription-complaints-are-unwarranted/?ref=distillingsecurity.com" rel="noopener noreferrer">Broadcom execs say VMware price, subscription complaints are unwarranted&nbsp; | Ars Technica</a></li><li><a href="https://blog.google/products/search/ai-overviews-update-may-2024/?ref=distillingsecurity.com" rel="noopener noreferrer">What happened with AI Overviews and next steps</a></li><li><a href="https://amzn.to/457gfBq?ref=distillingsecurity.com" rel="noopener noreferrer">Book – Titan: The Life of John D. Rockefeller, Sr.</a></li></ul><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/GSD-57---New-Look---Square-Cover---Scaled.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
        <item>
          <title>Episode 56 - Mine Everything</title>
          <link>https://distillingsecurity.com/episode-56-mine-everything/</link>
          <description></description>
          <pubDate>Wed, 05 Jun 2024 09:00:00 +0000</pubDate>
          <guid isPermaLink="false"><![CDATA[ 6912d3e4e3ba730001766bbe ]]></guid>
          <category><![CDATA[ Great Security Debate ]]></category>
          <content:encoded><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/9f4f5362-283a-4078-8870-4ea327401365/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/SjxZ2BVq-cY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 56 - Mine Everything"></iframe></figure><p>Sorry about the audio on this one. We have got the tech back on track for the next episode. I promise!</p><p>Join the Great Security Debate as Brian, Erik, and Dan delve into ‘pig slaughtering,’ a scam involving rapport building to swindle victims out of money.&nbsp;</p><p>The discussion explores the intersections of security awareness, blockchain technology, and the ethical implications of digital tracking tools like chain analysis. Featuring real-world cases, including child exploitation traced through blockchain, and the broader debate on privacy versus legality in technology use. Are public blockchain transactions truly private?&nbsp;</p><p>And how can we balance innovative tech with ethical concerns? Tune in to hear all about it</p><p>Show Notes:</p><ul><li><a href="https://amzn.to/4e9JSGr?ref=distillingsecurity.com" rel="noopener noreferrer">Movie: Oppenheimer</a></li><li><a href="https://www.theverge.com/2021/10/27/22748508/adobe-deepfake-tool-max-project-morpheus?ref=distillingsecurity.com" rel="noopener noreferrer">Adobe has built a deepfake tool, but it doesn’t know what to do with it – The Verge</a></li><li><a href="https://amzn.to/4e7zPSk?ref=distillingsecurity.com" rel="noopener noreferrer">Movie: Defending Your Life</a></li><li><a href="https://www.thurrott.com/cloud/296972/microsoft-edge-may-import-your-chrome-tabs-without-your-consent?ref=distillingsecurity.com" rel="noopener noreferrer">Microsoft Edge May Import Your Chrome Tabs Without Your Consent</a></li><li><a href="https://helpx.adobe.com/manage-account/using/machine-learning-faq.html?ref=distillingsecurity.com" rel="noopener noreferrer">Adobe content analysis FAQ</a></li><li><a href="https://www.eff.org/deeplinks/2022/06/how-federal-government-buys-our-cell-phone-location-data?ref=distillingsecurity.com" rel="noopener noreferrer">How the Federal Government Buys Our Cell Phone Location Data</a></li><li><a href="https://publicbydefault.fyi/?ref=distillingsecurity.com" rel="noopener noreferrer">Public By Default – Stories Found in Venmo Comments</a></li><li><a href="https://www.chainalysis.com/?ref=distillingsecurity.com" rel="noopener noreferrer">Chainalaysis</a></li><li><a href="https://amzn.to/4bGdQ3c?ref=distillingsecurity.com" rel="noopener noreferrer">Book: Tracers in the Dark</a></li><li><a href="https://www.youtube.com/watch?v=pLPpl2ISKTg&ref=distillingsecurity.com" rel="noopener noreferrer">Pig Butchering Scams: Last Week Tonight with John Oliver</a></li><li><a href="https://www.nytimes.com/interactive/2023/12/17/world/asia/myanmar-cyber-scam.html?ref=distillingsecurity.com" rel="noopener noreferrer">7 Months Inside an Online Scam Labor Camp</a></li></ul><p>Thanks for listening!</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></content:encoded>
          <enclosure url="" length="0" type="audio/mpeg" />
          <itunes:title>Episode 56 - Mine Everything</itunes:title>
          <itunes:author>Daniel Ayala</itunes:author>
          <itunes:subtitle></itunes:subtitle>
          <itunes:summary><![CDATA[ 
<!--kg-card-begin: html-->
<div style="width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;"><iframe style="width: 100%; height: 200px;" frameborder="no" scrolling="no" allow="clipboard-write" seamless src="https://player.captivate.fm/episode/9f4f5362-283a-4078-8870-4ea327401365/"></iframe></div>
<!--kg-card-end: html-->
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/SjxZ2BVq-cY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" title="Episode 56 - Mine Everything"></iframe></figure><p>Sorry about the audio on this one. We have got the tech back on track for the next episode. I promise!</p><p>Join the Great Security Debate as Brian, Erik, and Dan delve into ‘pig slaughtering,’ a scam involving rapport building to swindle victims out of money.&nbsp;</p><p>The discussion explores the intersections of security awareness, blockchain technology, and the ethical implications of digital tracking tools like chain analysis. Featuring real-world cases, including child exploitation traced through blockchain, and the broader debate on privacy versus legality in technology use. Are public blockchain transactions truly private?&nbsp;</p><p>And how can we balance innovative tech with ethical concerns? Tune in to hear all about it</p><p>Show Notes:</p><ul><li><a href="https://amzn.to/4e9JSGr?ref=distillingsecurity.com" rel="noopener noreferrer">Movie: Oppenheimer</a></li><li><a href="https://www.theverge.com/2021/10/27/22748508/adobe-deepfake-tool-max-project-morpheus?ref=distillingsecurity.com" rel="noopener noreferrer">Adobe has built a deepfake tool, but it doesn’t know what to do with it – The Verge</a></li><li><a href="https://amzn.to/4e7zPSk?ref=distillingsecurity.com" rel="noopener noreferrer">Movie: Defending Your Life</a></li><li><a href="https://www.thurrott.com/cloud/296972/microsoft-edge-may-import-your-chrome-tabs-without-your-consent?ref=distillingsecurity.com" rel="noopener noreferrer">Microsoft Edge May Import Your Chrome Tabs Without Your Consent</a></li><li><a href="https://helpx.adobe.com/manage-account/using/machine-learning-faq.html?ref=distillingsecurity.com" rel="noopener noreferrer">Adobe content analysis FAQ</a></li><li><a href="https://www.eff.org/deeplinks/2022/06/how-federal-government-buys-our-cell-phone-location-data?ref=distillingsecurity.com" rel="noopener noreferrer">How the Federal Government Buys Our Cell Phone Location Data</a></li><li><a href="https://publicbydefault.fyi/?ref=distillingsecurity.com" rel="noopener noreferrer">Public By Default – Stories Found in Venmo Comments</a></li><li><a href="https://www.chainalysis.com/?ref=distillingsecurity.com" rel="noopener noreferrer">Chainalaysis</a></li><li><a href="https://amzn.to/4bGdQ3c?ref=distillingsecurity.com" rel="noopener noreferrer">Book: Tracers in the Dark</a></li><li><a href="https://www.youtube.com/watch?v=pLPpl2ISKTg&ref=distillingsecurity.com" rel="noopener noreferrer">Pig Butchering Scams: Last Week Tonight with John Oliver</a></li><li><a href="https://www.nytimes.com/interactive/2023/12/17/world/asia/myanmar-cyber-scam.html?ref=distillingsecurity.com" rel="noopener noreferrer">7 Months Inside an Online Scam Labor Camp</a></li></ul><p>Thanks for listening!</p><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p> ]]></itunes:summary>
            <itunes:image href="https://storage.ghost.io/c/a1/98/a198ffae-ee5e-47e1-b1b8-a5f7aeac2c95/content/images/2025/11/GSD-57---New-Look---Square-Cover---Scaled-1.jpg" />
          <itunes:explicit>no</itunes:explicit>
        </item>
  </channel>

</rss>