<?xml version="1.0" encoding="UTF-8"?><!-- generator="podbean/5.5" -->
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
     xmlns:spotify="http://www.spotify.com/ns/rss"
     xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:media="http://search.yahoo.com/mrss/">

<channel>
    <title>Cyber People Podcast</title>
    <atom:link href="https://feed.podbean.com/latitudelive/feed.xml" rel="self" type="application/rss+xml"/>
    <link>https://latitudelive.podbean.com</link>
    <description>The Cyber People Podcast focusses on the people that help protect some of the largest companies across Australia and the globe. Join Will Wetherall as he follows their journey and stories in the world of cyber-security.</description>
    <pubDate>Thu, 05 Dec 2024 11:16:52 +1100</pubDate>
    <generator>https://podbean.com/?v=5.5</generator>
    <language>en</language>
        <copyright>Latitude Live - Copyright 2021 All rights reserved.</copyright>
    <category>Technology</category>
    <ttl>1440</ttl>
    <itunes:type>episodic</itunes:type>
          <itunes:summary></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
<itunes:category text="Technology" />
    <itunes:owner>
        <itunes:name>Will Wetherall</itunes:name>
            </itunes:owner>
    	<itunes:block>No</itunes:block>
	<itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://pbcdn1.podbean.com/imglogo/image-logo/10693432/Cyber_People_Cover7nzrj.png" />
    <image>
        <url>https://pbcdn1.podbean.com/imglogo/image-logo/10693432/Cyber_People_Cover7nzrj.png</url>
        <title>Cyber People Podcast</title>
        <link>https://latitudelive.podbean.com</link>
        <width>144</width>
        <height>144</height>
    </image>
    <item>
        <title>Can Active Directory Be Trusted?</title>
        <itunes:title>Can Active Directory Be Trusted?</itunes:title>
        <link>https://latitudelive.podbean.com/e/can-active-directory-be-trusted/</link>
                    <comments>https://latitudelive.podbean.com/e/can-active-directory-be-trusted/#comments</comments>        <pubDate>Thu, 05 Dec 2024 11:16:52 +1100</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/ad15485d-4f21-395f-933d-74310bc09133</guid>
                                    <description><![CDATA[<p>In this episode of Cyber People Podcast, we sit down with Kim Valois, an experienced Chief Information Security Officer (CISO), to unravel some of the most pressing topics in cybersecurity. Together, we dive into: -Risk Assessments &amp; Attack Surface Analysis: How to identify vulnerabilities and strengthen your organisation's defences. -Building a Security Strategy: The key pillars of creating a robust and scalable security framework. -Trusting Your Systems: Can critical systems like Active Directory still be trusted in an evolving threat landscape? Whether you're a cybersecurity professional or simply curious about protecting your systems, this conversation is packed with actionable insights and expert advice. Don't miss it!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Cyber People Podcast, we sit down with Kim Valois, an experienced Chief Information Security Officer (CISO), to unravel some of the most pressing topics in cybersecurity. Together, we dive into: -Risk Assessments &amp; Attack Surface Analysis: How to identify vulnerabilities and strengthen your organisation's defences. -Building a Security Strategy: The key pillars of creating a robust and scalable security framework. -Trusting Your Systems: Can critical systems like Active Directory still be trusted in an evolving threat landscape? Whether you're a cybersecurity professional or simply curious about protecting your systems, this conversation is packed with actionable insights and expert advice. Don't miss it!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2cgbkmpa8mzda84t/CPP_AUDIO_KIMa3hfv.mp3" length="109461024" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Cyber People Podcast, we sit down with Kim Valois, an experienced Chief Information Security Officer (CISO), to unravel some of the most pressing topics in cybersecurity. Together, we dive into: -Risk Assessments &amp; Attack Surface Analysis: How to identify vulnerabilities and strengthen your organisation's defences. -Building a Security Strategy: The key pillars of creating a robust and scalable security framework. -Trusting Your Systems: Can critical systems like Active Directory still be trusted in an evolving threat landscape? Whether you're a cybersecurity professional or simply curious about protecting your systems, this conversation is packed with actionable insights and expert advice. Don't miss it!]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3420</itunes:duration>
                <itunes:episode>19</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Truth About Cyber Certifications VS Degrees</title>
        <itunes:title>The Truth About Cyber Certifications VS Degrees</itunes:title>
        <link>https://latitudelive.podbean.com/e/the-truth-about-cyber-certifications-vs-degrees/</link>
                    <comments>https://latitudelive.podbean.com/e/the-truth-about-cyber-certifications-vs-degrees/#comments</comments>        <pubDate>Tue, 15 Oct 2024 12:50:27 +1100</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/b1fd0a0a-095d-38a0-b2ae-a5bd7e021d42</guid>
                                    <description><![CDATA[<p>We are delighted to welcome back Jason Ford, Senior Red Team Manager (Offensive Security Lead), who has done all the research (so you don't have to) on what's the best path to a career in cybersecurity—degrees or certifications? Joining him is Will Wetherall, our resident cyber recruitment expert, who shares his thoughts on what recruiters are really looking for in today’s job market. Together, they dive into the real pros and cons of both options, giving you insights from both the cybersecurity and recruitment sides. . Certifications or degrees—which one is the right choice for you? Let’s find out! 🎓💻</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We are delighted to welcome back Jason Ford, Senior Red Team Manager (Offensive Security Lead), who has done all the research (so you don't have to) on what's the best path to a career in cybersecurity—degrees or certifications? Joining him is Will Wetherall, our resident cyber recruitment expert, who shares his thoughts on what recruiters are really looking for in today’s job market. Together, they dive into the real pros and cons of both options, giving you insights from both the cybersecurity and recruitment sides. . Certifications or degrees—which one is the right choice for you? Let’s find out! 🎓💻</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/girjdxne2c5nsjw4/Cets_Vs_Degrees_mp379edb.mp3" length="80428515" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We are delighted to welcome back Jason Ford, Senior Red Team Manager (Offensive Security Lead), who has done all the research (so you don't have to) on what's the best path to a career in cybersecurity—degrees or certifications? Joining him is Will Wetherall, our resident cyber recruitment expert, who shares his thoughts on what recruiters are really looking for in today’s job market. Together, they dive into the real pros and cons of both options, giving you insights from both the cybersecurity and recruitment sides. . Certifications or degrees—which one is the right choice for you? Let’s find out! 🎓💻]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2512</itunes:duration>
                <itunes:episode>18</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Human Risk Management unpacked and the quest of Don’t Click on Sh*t</title>
        <itunes:title>Human Risk Management unpacked and the quest of Don’t Click on Sh*t</itunes:title>
        <link>https://latitudelive.podbean.com/e/human-risk-management-unpacked-and-the-quest-of-don-t-click-on-sht/</link>
                    <comments>https://latitudelive.podbean.com/e/human-risk-management-unpacked-and-the-quest-of-don-t-click-on-sht/#comments</comments>        <pubDate>Thu, 10 Oct 2024 15:07:03 +1100</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/734a0f77-c1e8-3fcb-8945-6eadc9f0e4a0</guid>
                                    <description><![CDATA[<p>Jacqueline Jayne (JJ) has spent her career as a conduit between people and technology and technology and people. She is on a mission to reduce human error in cybersecurity and educate individuals of all ages to stay safe online. Her approach is not typical, as you will find out!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Jacqueline Jayne (JJ) has spent her career as a conduit between people and technology and technology and people. She is on a mission to reduce human error in cybersecurity and educate individuals of all ages to stay safe online. Her approach is not typical, as you will find out!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/f8xvg54cby9xubd2/riverside_jj_will_oct_1_2024_001_william_wetherall_s_1btvaz.mp3" length="71005244" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Jacqueline Jayne (JJ) has spent her career as a conduit between people and technology and technology and people. She is on a mission to reduce human error in cybersecurity and educate individuals of all ages to stay safe online. Her approach is not typical, as you will find out!]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2218</itunes:duration>
                <itunes:episode>17</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>GRC Mastery with the UnixGuy</title>
        <itunes:title>GRC Mastery with the UnixGuy</itunes:title>
        <link>https://latitudelive.podbean.com/e/grc-mastery-with-the-unixguy/</link>
                    <comments>https://latitudelive.podbean.com/e/grc-mastery-with-the-unixguy/#comments</comments>        <pubDate>Thu, 22 Aug 2024 10:08:16 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/e750c8fc-fa4c-3526-bce3-4dd8c2097f9d</guid>
                                    <description><![CDATA[<p>We got a big episode of Cyber People Podcast out right now for you! </p>
<p>On this episode, we're joined by Abed Hamdan, a.k.a Unix Guy on YouTube, a Cyber Security &amp; Risk expert who plots his journey from Unix Engineer into Cyber Security. Abed reveals why GRC (Governance, Risk &amp; Compliance) is the most accessible entry into Cyber Security for those who want to kick start their cyber career, but aren't sure where to start. He also shares how to structure your CV in order to land your first cyber role.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We got a big episode of Cyber People Podcast out right now for you! </p>
<p>On this episode, we're joined by Abed Hamdan, a.k.a Unix Guy on YouTube, a Cyber Security &amp; Risk expert who plots his journey from Unix Engineer into Cyber Security. Abed reveals why GRC (Governance, Risk &amp; Compliance) is the most accessible entry into Cyber Security for those who want to kick start their cyber career, but aren't sure where to start. He also shares how to structure your CV in order to land your first cyber role.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fcwrt6med3gm552f/Abed_Audio92mkb.mp3" length="68916786" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We got a big episode of Cyber People Podcast out right now for you! 
On this episode, we're joined by Abed Hamdan, a.k.a Unix Guy on YouTube, a Cyber Security &amp; Risk expert who plots his journey from Unix Engineer into Cyber Security. Abed reveals why GRC (Governance, Risk &amp; Compliance) is the most accessible entry into Cyber Security for those who want to kick start their cyber career, but aren't sure where to start. He also shares how to structure your CV in order to land your first cyber role.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2152</itunes:duration>
                <itunes:episode>16</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>CISO Unplugged</title>
        <itunes:title>CISO Unplugged</itunes:title>
        <link>https://latitudelive.podbean.com/e/ciso-unplugged/</link>
                    <comments>https://latitudelive.podbean.com/e/ciso-unplugged/#comments</comments>        <pubDate>Tue, 09 Jul 2024 15:11:52 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/c2594b6f-8925-3b8c-9e77-753b42368905</guid>
                                    <description><![CDATA[<p>Vish is the Past CISO of the NSW Electoral Commission. He has led multiple uplift and transformation initiatives in Cyber and Business Resilience across major industry sectors globally. In this session, he will share insights from his recent roles and his experiences in overcoming varied challenges. He will also share his thoughts on how to progress their careers in the cyber industry using his career journey as an example. Finally, he will be talking about how he views the role of the Cyber Executive has transformed over the period.</p>





]]></description>
                                                            <content:encoded><![CDATA[<p>Vish is the Past CISO of the NSW Electoral Commission. He has led multiple uplift and transformation initiatives in Cyber and Business Resilience across major industry sectors globally. In this session, he will share insights from his recent roles and his experiences in overcoming varied challenges. He will also share his thoughts on how to progress their careers in the cyber industry using his career journey as an example. Finally, he will be talking about how he views the role of the Cyber Executive has transformed over the period.</p>





]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jgvw92sau3ziwv9b/riverside_will_may_28_2024_002_william_wetherall_s_18xw19.mp3" length="81365986" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Vish is the Past CISO of the NSW Electoral Commission. He has led multiple uplift and transformation initiatives in Cyber and Business Resilience across major industry sectors globally. In this session, he will share insights from his recent roles and his experiences in overcoming varied challenges. He will also share his thoughts on how to progress their careers in the cyber industry using his career journey as an example. Finally, he will be talking about how he views the role of the Cyber Executive has transformed over the period.





]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2542</itunes:duration>
                <itunes:episode>15</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Women in cyber, intersectionality, and bias-free recruitment</title>
        <itunes:title>Women in cyber, intersectionality, and bias-free recruitment</itunes:title>
        <link>https://latitudelive.podbean.com/e/women-in-cyber-intersectionality-and-bias-free-recruitment/</link>
                    <comments>https://latitudelive.podbean.com/e/women-in-cyber-intersectionality-and-bias-free-recruitment/#comments</comments>        <pubDate>Wed, 22 May 2024 15:27:36 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/39278535-c3c0-33b2-87d0-469c87c6df51</guid>
                                    <description><![CDATA[<p>In season 2, episode 7, we’re joined by Jo Stewart-Rattray. Jo is the CSO of Silverchain Group, the Director of Technology &amp; Security Assurance at the BRM Advisory, the VP of the National Rural Women’s Coalition and is also a Member of the National Congress of the ACS, whom she recently represented on stage at the 68th session of the UN’s Commission on the Status of Women. Jo talks candidly and passionately about how to encourage more diversity in tech and cyber, and shares a fresh and creative way to minimise unconscious bias when recruiting. She discusses the importance of intersectionality in improving security and how to achieve it, and explores solutions to some of the cyber challenges in the healthcare industry.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In season 2, episode 7, we’re joined by Jo Stewart-Rattray. Jo is the CSO of Silverchain Group, the Director of Technology &amp; Security Assurance at the BRM Advisory, the VP of the National Rural Women’s Coalition and is also a Member of the National Congress of the ACS, whom she recently represented on stage at the 68th session of the UN’s Commission on the Status of Women. Jo talks candidly and passionately about how to encourage more diversity in tech and cyber, and shares a fresh and creative way to minimise unconscious bias when recruiting. She discusses the importance of intersectionality in improving security and how to achieve it, and explores solutions to some of the cyber challenges in the healthcare industry.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6vfmjrxq8jcb7ftm/riverside_cyber_people_podcast_s_mar_28_2024_001_cyber_people_podcas_1614zg.mp3" length="85999329" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In season 2, episode 7, we’re joined by Jo Stewart-Rattray. Jo is the CSO of Silverchain Group, the Director of Technology &amp; Security Assurance at the BRM Advisory, the VP of the National Rural Women’s Coalition and is also a Member of the National Congress of the ACS, whom she recently represented on stage at the 68th session of the UN’s Commission on the Status of Women. Jo talks candidly and passionately about how to encourage more diversity in tech and cyber, and shares a fresh and creative way to minimise unconscious bias when recruiting. She discusses the importance of intersectionality in improving security and how to achieve it, and explores solutions to some of the cyber challenges in the healthcare industry.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2686</itunes:duration>
                <itunes:episode>14</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>CISO in the Wild</title>
        <itunes:title>CISO in the Wild</itunes:title>
        <link>https://latitudelive.podbean.com/e/ciso-in-the-wild/</link>
                    <comments>https://latitudelive.podbean.com/e/ciso-in-the-wild/#comments</comments>        <pubDate>Mon, 22 Apr 2024 12:08:03 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/669d5ed7-5a04-30aa-b608-2594e2171780</guid>
                                    <description><![CDATA[<p>In season 2, episode 6, we’re delighted to welcome experienced CISO, Grant McKechnie. Grant shares his unique insights on how to create the conditions for success in your cyber team, honing in on crucial topics such as ‘head space’ and burnout. As a CISO returning to the employment market, he reveals the habits and behaviours he has cultivated to ensure he puts his best foot forward.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In season 2, episode 6, we’re delighted to welcome experienced CISO, Grant McKechnie. Grant shares his unique insights on how to create the conditions for success in your cyber team, honing in on crucial topics such as ‘head space’ and burnout. As a CISO returning to the employment market, he reveals the habits and behaviours he has cultivated to ensure he puts his best foot forward.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/sy3rxktbvrfmbnu8/riverside_cyber_people_podcast_g_apr_12_2024_001_cyber_people_podcast9w672.mp3" length="80480352" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In season 2, episode 6, we’re delighted to welcome experienced CISO, Grant McKechnie. Grant shares his unique insights on how to create the conditions for success in your cyber team, honing in on crucial topics such as ‘head space’ and burnout. As a CISO returning to the employment market, he reveals the habits and behaviours he has cultivated to ensure he puts his best foot forward.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2514</itunes:duration>
                <itunes:episode>13</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How to build and manage a successful pen-testing practice?</title>
        <itunes:title>How to build and manage a successful pen-testing practice?</itunes:title>
        <link>https://latitudelive.podbean.com/e/how-to-build-and-manage-a-successful-pen-testing-practice/</link>
                    <comments>https://latitudelive.podbean.com/e/how-to-build-and-manage-a-successful-pen-testing-practice/#comments</comments>        <pubDate>Tue, 09 Apr 2024 17:18:08 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/cd744a17-1ba4-3670-94c8-e20bd56e5542</guid>
                                    <description><![CDATA[<p>In this episode, we are joined by veteran cybersecurity consultant and pen-tester Jason Ford. Jason shares his insights and strategies for building a successful pen-testing practice from the ground up.With over 9 years of experience in ethical hacking and penetration testing, Jason discusses the key elements you need to build a thriving pen-testing practice.Whether you are just starting out or looking to take your pen-testing firm to the next level, this information-packed episode is a must-listen. Jason's valuable advice will help you navigate the challenges and capitalise on the opportunities in this rapidly growing field.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we are joined by veteran cybersecurity consultant and pen-tester Jason Ford. Jason shares his insights and strategies for building a successful pen-testing practice from the ground up.With over 9 years of experience in ethical hacking and penetration testing, Jason discusses the key elements you need to build a thriving pen-testing practice.Whether you are just starting out or looking to take your pen-testing firm to the next level, this information-packed episode is a must-listen. Jason's valuable advice will help you navigate the challenges and capitalise on the opportunities in this rapidly growing field.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wt35vv/Jason_Ford_EP1bkkwl.mp3" length="89164579" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we are joined by veteran cybersecurity consultant and pen-tester Jason Ford. Jason shares his insights and strategies for building a successful pen-testing practice from the ground up.With over 9 years of experience in ethical hacking and penetration testing, Jason discusses the key elements you need to build a thriving pen-testing practice.Whether you are just starting out or looking to take your pen-testing firm to the next level, this information-packed episode is a must-listen. Jason's valuable advice will help you navigate the challenges and capitalise on the opportunities in this rapidly growing field.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2785</itunes:duration>
                <itunes:episode>12</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Cyber_People_Jason_Ford_t7kccv.png" />    </item>
    <item>
        <title>Pulling back the covers on the cyber world with Craig Ford</title>
        <itunes:title>Pulling back the covers on the cyber world with Craig Ford</itunes:title>
        <link>https://latitudelive.podbean.com/e/pulling-back-the-covers-on-the-cyber-world-with-craig-ford/</link>
                    <comments>https://latitudelive.podbean.com/e/pulling-back-the-covers-on-the-cyber-world-with-craig-ford/#comments</comments>        <pubDate>Tue, 27 Jun 2023 18:58:43 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/8156b01e-fd1c-3d2a-89af-20b2707e533a</guid>
                                    <description><![CDATA[<p>In today's episode of the Cyber people podcast we're thrilled to have Craig Ford, the esteemed Field Chief Technology Officer (CTO) at Baidam Solutions, joins us. In this episode, Craig tells us how the pen is one of our mightiest tools when it comes to encouraging more diversity and inclusion in the industry and building cyber awareness at the grass roots level of youth.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In today's episode of the Cyber people podcast we're thrilled to have Craig Ford, the esteemed Field Chief Technology Officer (CTO) at Baidam Solutions, joins us. In this episode, Craig tells us how the pen is one of our mightiest tools when it comes to encouraging more diversity and inclusion in the industry and building cyber awareness at the grass roots level of youth.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vttfsw/cyber-people-studio_cyber-people-podcast_lCraigmay-30-0848am-utc-riverside_1.mp3" length="87468936" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In today's episode of the Cyber people podcast we're thrilled to have Craig Ford, the esteemed Field Chief Technology Officer (CTO) at Baidam Solutions, joins us. In this episode, Craig tells us how the pen is one of our mightiest tools when it comes to encouraging more diversity and inclusion in the industry and building cyber awareness at the grass roots level of youth.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2732</itunes:duration>
                <itunes:episode>11</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Cyber_People_Branding_a2xmek.png" />    </item>
    <item>
        <title>S2,E3 - How leaders are building high performing Cyber teams with Leonard Kleinman</title>
        <itunes:title>S2,E3 - How leaders are building high performing Cyber teams with Leonard Kleinman</itunes:title>
        <link>https://latitudelive.podbean.com/e/how-leaders-are-building-high-performing-cyber-teams-with-leonard-kleinman/</link>
                    <comments>https://latitudelive.podbean.com/e/how-leaders-are-building-high-performing-cyber-teams-with-leonard-kleinman/#comments</comments>        <pubDate>Tue, 13 Jun 2023 10:28:02 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/ab58bd97-ebea-3423-91b9-56dc7be99ed7</guid>
                                    <description><![CDATA[<p>In today's episode of the Cyber people podcast we're thrilled to have Leonard Kleinman, the esteemed Field Chief Technology Officer (CTO) at Palo Alto Networks, join us. In our discussion, we'll delve into the strategies employed by leading figures in the cybersecurity field to build top-tier, highly efficient cyber teams.</p>
<p>Connect with us at: </p>
<p>↪ Instagram - https://www.instagram.com/latitude_it/
↪TikTok - https://www.tiktok.com/@latitudelive?is_from_webapp=1&sender_device=pc
↪Linkedin - https://www.linkedin.com/company/latitudeit/
↪ Newsletter -https://www.latitudeit.com.au/it-digital-newsletter
↪ Website & Blog - https://www.latitudeit.com.au</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In today's episode of the Cyber people podcast we're thrilled to have Leonard Kleinman, the esteemed Field Chief Technology Officer (CTO) at Palo Alto Networks, join us. In our discussion, we'll delve into the strategies employed by leading figures in the cybersecurity field to build top-tier, highly efficient cyber teams.</p>
<p>Connect with us at: </p>
<p>↪ Instagram - https://www.instagram.com/latitude_it/<br>
↪TikTok - https://www.tiktok.com/@latitudelive?is_from_webapp=1&sender_device=pc<br>
↪Linkedin - https://www.linkedin.com/company/latitudeit/<br>
↪ Newsletter -https://www.latitudeit.com.au/it-digital-newsletter<br>
↪ Website & Blog - https://www.latitudeit.com.au</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/665gkk/cyber-people-studio_cyber-people-podcast_len-0dvjvgz5s_cfr_2023-may-30-0848am-utc-riverside.mp3" length="118139417" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In today's episode of the Cyber people podcast we're thrilled to have Leonard Kleinman, the esteemed Field Chief Technology Officer (CTO) at Palo Alto Networks, join us. In our discussion, we'll delve into the strategies employed by leading figures in the cybersecurity field to build top-tier, highly efficient cyber teams.
Connect with us at: 
↪ Instagram - https://www.instagram.com/latitude_it/↪TikTok - https://www.tiktok.com/@latitudelive?is_from_webapp=1&sender_device=pc↪Linkedin - https://www.linkedin.com/company/latitudeit/↪ Newsletter -https://www.latitudeit.com.au/it-digital-newsletter↪ Website & Blog - https://www.latitudeit.com.au]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2952</itunes:duration>
                <itunes:episode>10</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Cyber_People_Branding_Len_Podbean_vge2m9.png" />    </item>
    <item>
        <title>S2,E2 | Chris Ong | My 21 year old self</title>
        <itunes:title>S2,E2 | Chris Ong | My 21 year old self</itunes:title>
        <link>https://latitudelive.podbean.com/e/s2e2-chris-ong-my-21-year-old-self/</link>
                    <comments>https://latitudelive.podbean.com/e/s2e2-chris-ong-my-21-year-old-self/#comments</comments>        <pubDate>Fri, 22 Jul 2022 17:58:00 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/506fd821-b698-3eae-a4d4-d0de93a770e0</guid>
                                    <description><![CDATA[<p>We are delighted to welcome Chris Ong, one of Australia's leading Identity Access Management Subject Matter Experts. With his trademark, inimitable candour, Chris shares his learnings from his career to date and what he'd tell his 21 year old self if he had the chance. Passionate about the human elements of cyber security, Chris also talks about leadership styles which foster the above and beyond mindset.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We are delighted to welcome Chris Ong, one of Australia's leading Identity Access Management Subject Matter Experts. With his trademark, inimitable candour, Chris shares his learnings from his career to date and what he'd tell his 21 year old self if he had the chance. Passionate about the human elements of cyber security, Chris also talks about leadership styles which foster the above and beyond mindset.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6qiq2v/Project_-_Chris_Will_S2E2_-_18_7_22_210_pma5dc7.mp3" length="50686454" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We are delighted to welcome Chris Ong, one of Australia's leading Identity Access Management Subject Matter Experts. With his trademark, inimitable candour, Chris shares his learnings from his career to date and what he'd tell his 21 year old self if he had the chance. Passionate about the human elements of cyber security, Chris also talks about leadership styles which foster the above and beyond mindset.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2111</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Instagram_content90yc7.jpg" />    </item>
    <item>
        <title>S02, E01 | Andrew Abel | Zero Trust Security Strategy</title>
        <itunes:title>S02, E01 | Andrew Abel | Zero Trust Security Strategy</itunes:title>
        <link>https://latitudelive.podbean.com/e/s2e1-andrew-abel-tbc-title/</link>
                    <comments>https://latitudelive.podbean.com/e/s2e1-andrew-abel-tbc-title/#comments</comments>        <pubDate>Wed, 27 Apr 2022 11:19:32 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/8e1af468-a444-3b63-8584-ff72729714ac</guid>
                                    <description><![CDATA[<p>We are delighted to welcome Andrew Abel, one of Australia's leading Zero Trust strategists, who talks to us about zero trust, aligning business and security strategy, diversity and collaboration in security. </p>
<p><a href='https://www.linkedin.com/in/andrew-abel-9b10547/'>Connect with Andrew on LinkedIn</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We are delighted to welcome Andrew Abel, one of Australia's leading Zero Trust strategists, who talks to us about zero trust, aligning business and security strategy, diversity and collaboration in security. </p>
<p><a href='https://www.linkedin.com/in/andrew-abel-9b10547/'>Connect with Andrew on LinkedIn</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zmfd3e/S2S1_-_Andrew_Abel_Will_Wetherall88o60.mp3" length="76389691" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We are delighted to welcome Andrew Abel, one of Australia's leading Zero Trust strategists, who talks to us about zero trust, aligning business and security strategy, diversity and collaboration in security. 
Connect with Andrew on LinkedIn.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3182</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>1</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Podcast_tile_3emz4h.png" />    </item>
    <item>
        <title>S1E6 | Shane Feeney |  Building an ISMS</title>
        <itunes:title>S1E6 | Shane Feeney |  Building an ISMS</itunes:title>
        <link>https://latitudelive.podbean.com/e/s1-e6-shane-feeney/</link>
                    <comments>https://latitudelive.podbean.com/e/s1-e6-shane-feeney/#comments</comments>        <pubDate>Wed, 10 Nov 2021 09:50:53 +1100</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/7d8be819-e6d5-328d-8c3f-6caa83f55fdf</guid>
                                    <description><![CDATA[<p>Shane Feeney is the Director of Cemax Consulting. </p>
<p>Shane is a certified ISO/IEC 27001 Lead Auditor and is a cyber security governance, risk, and compliance expert who helps companies obtain ISO/IEC 27001 certification.</p>
<p>In this episode, he walks us through Building an ISMS (Information Security Management System) using ISO/IEC 27001 and explains how doing this correctly can transform information security from a cost to a profit center. </p>
<p><a href='https://drive.google.com/file/d/1bfLWW7Gjv8tvIjqyx_sNM6LkITNXHPb7/view?usp=sharing'>Click here to view Shane's PowerPoint slides.</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Shane Feeney is the Director of Cemax Consulting. </p>
<p>Shane is a certified ISO/IEC 27001 Lead Auditor and is a cyber security governance, risk, and compliance expert who helps companies obtain ISO/IEC 27001 certification.</p>
<p>In this episode, he walks us through Building an ISMS (Information Security Management System) using ISO/IEC 27001 and explains how doing this correctly can transform information security from a cost to a profit center. </p>
<p><a href='https://drive.google.com/file/d/1bfLWW7Gjv8tvIjqyx_sNM6LkITNXHPb7/view?usp=sharing'>Click here to view Shane's PowerPoint slides.</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/37i73p/Shane_Feeney.mp3" length="87779288" type="audio/mpeg"/>
        <itunes:summary>Shane is a certified ISO/IEC 27001 Lead Auditor and is a cyber security governance, risk, and compliance expert who helps companies obtain ISO/IEC 27001 certification.

In this episode, he walks us through Building an ISMS (Information Security Management System) using ISO/IEC 27001 and explains how doing this correctly can transform information security from a cost to a profit center...

Shane Feeney, Director of Cemax Consulting</itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3657</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>9</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Ben_xby4ug.png" />    </item>
    <item>
        <title>S1E5 | Saaim Khan | Stop Selling Cyber Security Like it’s Snake Oil</title>
        <itunes:title>S1E5 | Saaim Khan | Stop Selling Cyber Security Like it’s Snake Oil</itunes:title>
        <link>https://latitudelive.podbean.com/e/s1e5-saaimwill/</link>
                    <comments>https://latitudelive.podbean.com/e/s1e5-saaimwill/#comments</comments>        <pubDate>Wed, 15 Sep 2021 12:12:26 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/e2680413-2044-3381-834e-9d49eb24279f</guid>
                                    <description><![CDATA[<p>In this episode, Saaim Khan, the brilliant and articulate director of Jumpstart Security, cyber protector of small businesses, enlightens us on:                          </p>
<ul><li>What’s really “just enough Security”</li>
<li>Paralysis by Compliance</li>
<li>What does Third-party risk really mean and how to tackle it</li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Saaim Khan, the brilliant and articulate director of Jumpstart Security, cyber protector of small businesses, enlightens us on:                          </p>
<ul><li>What’s really “just enough Security”</li>
<li>Paralysis by Compliance</li>
<li>What does Third-party risk really mean and how to tackle it</li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/th44dp/Saaim_Will_-_8_9_21a71hc.mp3" length="70266380" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Saaim Khan, the brilliant and articulate director of Jumpstart Security, cyber protector of small businesses, enlightens us on:                          
What’s really “just enough Security”
Paralysis by Compliance
What does Third-party risk really mean and how to tackle it
]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2927</itunes:duration>
                <itunes:episode>4</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Ben_7__7gbi7a.png" />    </item>
    <item>
        <title>S1E4 | Jackson Delahunt | Development Operations and Open Source Technology</title>
        <itunes:title>S1E4 | Jackson Delahunt | Development Operations and Open Source Technology</itunes:title>
        <link>https://latitudelive.podbean.com/e/s1e4-jackson/</link>
                    <comments>https://latitudelive.podbean.com/e/s1e4-jackson/#comments</comments>        <pubDate>Wed, 21 Apr 2021 12:12:50 +1000</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/9a7f2fb1-8d4c-3e7c-9167-3f8e0481b55e</guid>
                                    <description><![CDATA[<p>The Cyber People Podcast by William Wetherall - Episode 4 - In this episode, Jackson Delahunt, DevOps Maestro, speaks with passionate eloquence about DevOps, Open Source Technology, Hacking and Cyber Security. We could have talked for hours and we look forward to him coming back </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The Cyber People Podcast by William Wetherall - Episode 4 - In this episode, Jackson Delahunt, DevOps Maestro, speaks with passionate eloquence about DevOps, Open Source Technology, Hacking and Cyber Security. We could have talked for hours and we look forward to him coming back </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/y8wmb3/S1E4_-_Jackson_Della_Hunt_26t9se.mp3" length="89633772" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The Cyber People Podcast by William Wetherall - Episode 4 - In this episode, Jackson Delahunt, DevOps Maestro, speaks with passionate eloquence about DevOps, Open Source Technology, Hacking and Cyber Security. We could have talked for hours and we look forward to him coming back ]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3734</itunes:duration>
                <itunes:episode>3</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Ben_6__a3burx.png" />    </item>
    <item>
        <title>S1E3 | Ben Menzies | Origins: From Hacker to Principal Consultant for Security Integration &amp; Engineering</title>
        <itunes:title>S1E3 | Ben Menzies | Origins: From Hacker to Principal Consultant for Security Integration &amp; Engineering</itunes:title>
        <link>https://latitudelive.podbean.com/e/s1e2-origins-from-hacker-to-principal-consultant-for-security-integration-engineering/</link>
                    <comments>https://latitudelive.podbean.com/e/s1e2-origins-from-hacker-to-principal-consultant-for-security-integration-engineering/#comments</comments>        <pubDate>Thu, 01 Apr 2021 15:20:44 +1100</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/7ab9d50c-3c68-329c-8edd-a1b2894b1efb</guid>
                                    <description><![CDATA[<p>In this episode, Ben reveals his journey from Hacker to Cyber Security Engineer, discusses how Open Source Intelligence (OSINT) is used to create social engineering attack vectors, warns us off online quizzes and shows us how easy it is to stay safe online.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ben reveals his journey from Hacker to Cyber Security Engineer, discusses how Open Source Intelligence (OSINT) is used to create social engineering attack vectors, warns us off online quizzes and shows us how easy it is to stay safe online.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/djrj7k/e3_Ben_Menzies.mp3" length="103412006" type="audio/mpeg"/>
        <itunes:summary>In this episode, Ben reveals his journey from Hacker to Cyber Security Engineer, discusses how Open Source Intelligence (OSINT) is used to create social engineering attack vectors, warns us off online quizzes and shows us how easy it is to stay safe online.</itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>4308</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Ben_5__gspqve.png" />    </item>
    <item>
        <title>S1E2 | Ben Jones | Cyber Security for Small to Medium Enterprises</title>
        <itunes:title>S1E2 | Ben Jones | Cyber Security for Small to Medium Enterprises</itunes:title>
        <link>https://latitudelive.podbean.com/e/ben-jones-cyber-security-for-small-to-medium-enterprises/</link>
                    <comments>https://latitudelive.podbean.com/e/ben-jones-cyber-security-for-small-to-medium-enterprises/#comments</comments>        <pubDate>Tue, 23 Mar 2021 09:49:11 +1100</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/e8aaa8c2-049b-3122-8a5a-6fdca81e1e3a</guid>
                                    <description><![CDATA[<p>Ben Jones, CEO of Jumpstart Security, recounts the unlikely beginnings and unexpected chain of events that brought him into the Australian Cyber Security market and details the threats to businesses of 150 employees or less and the quick wins they can have to protect the integrity of their products, services, customers and data.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ben Jones, CEO of Jumpstart Security, recounts the unlikely beginnings and unexpected chain of events that brought him into the Australian Cyber Security market and details the threats to businesses of 150 employees or less and the quick wins they can have to protect the integrity of their products, services, customers and data.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ssf4sk/e2_Ben_Jones.mp3" length="114920721" type="audio/mpeg"/>
        <itunes:summary>Ben Jones, CEO of Jumpstart Security, recounts the unlikely beginnings and unexpected chain of events that brought him into the Australian Cyber Security market and details the threats to businesses of 150 employees or less and the quick wins they can have to protect the integrity of their products, services, customers and data.</itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>4788</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Ben_4__3umuup.png" />    </item>
    <item>
        <title>S1E1 | Bhanu Nanduri | A cyber journey from India to Australia</title>
        <itunes:title>S1E1 | Bhanu Nanduri | A cyber journey from India to Australia</itunes:title>
        <link>https://latitudelive.podbean.com/e/s1e1-pilot/</link>
                    <comments>https://latitudelive.podbean.com/e/s1e1-pilot/#comments</comments>        <pubDate>Mon, 01 Mar 2021 14:33:11 +1100</pubDate>
        <guid isPermaLink="false">latitudelive.podbean.com/790a4ff4-51dd-33b6-ab2b-8da5f78f5b66</guid>
                                    <description><![CDATA[<p>Bhanu is an industry-accredited security & risk management professional with 16 + years of strong techno-functional experience with cross cultures and diverse geographies in America, Europe and APAC regions with global organisations like HSBC, SHELL, TCS, Downer and Westpac.</p>
<p>Bhanu talks about his journey into the industry, the eccentricities of the Australian job market, the importance of embracing change, and cyber-security during the pandemic.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Bhanu is an industry-accredited security & risk management professional with 16 + years of strong techno-functional experience with cross cultures and diverse geographies in America, Europe and APAC regions with global organisations like HSBC, SHELL, TCS, Downer and Westpac.</p>
<p>Bhanu talks about his journey into the industry, the eccentricities of the Australian job market, the importance of embracing change, and cyber-security during the pandemic.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/m2d2xi/S1E1_Pilot_8dznk.mp3" length="132324542" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Bhanu is an industry-accredited security & risk management professional with 16 + years of strong techno-functional experience with cross cultures and diverse geographies in America, Europe and APAC regions with global organisations like HSBC, SHELL, TCS, Downer and Westpac.
Bhanu talks about his journey into the industry, the eccentricities of the Australian job market, the importance of embracing change, and cyber-security during the pandemic.]]></itunes:summary>
        <itunes:author>Will Wetherall</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>5513</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>1</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog10693432/Ben_3__858u7m.png" />    </item>
</channel>
</rss>
