<?xml version="1.0" encoding="utf-8"?>
<oembed>
  <version>1</version>
  <type>rich</type>
  <provider_name>Libsyn</provider_name>
  <provider_url>https://www.libsyn.com</provider_url>
  <height>90</height>
  <width>600</width>
  <title>Establishing your Information Security Program - Part 2</title>
  <description>This is the continuation of our podcast from last week with Phil Beyer.&#13;
We started out talking about risk registers, and we end the podcast with a little Q&amp;amp;amp;A about positions in companies (Chief Risk Officer, Chief Data Protection Officer), and whether these positions are useful.&#13;
&amp;amp;nbsp;&#13;
&amp;amp;nbsp;Risk registers - http://en.wikipedia.org/wiki/Risk_register&#13;
&amp;amp;nbsp;&#13;
Intro &amp;quot;Private Eye&amp;quot;, transition &amp;quot;Mining by Moonlight&amp;quot;, and Outro &amp;quot;Honeybee&amp;quot; created by Kevin MacLeod (incompetech.com)&amp;amp;nbsp;Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/</description>
  <author_name>BrakeSec Education Podcast</author_name>
  <author_url>https://www.youtube.com/c/BDSPodcast</author_url>
  <html>&lt;iframe title="Libsyn Player" style="border: none" src="//html5-player.libsyn.com/embed/episode/id/2930497/height/90/theme/custom/thumbnail/yes/direction/forward/render-playlist/no/custom-color/88AA3C/" height="90" width="600" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;</html>
  <thumbnail_url>https://assets.libsyn.com/secure/content/7357753</thumbnail_url>
</oembed>
