<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Education &amp; Training</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: EvgeniyShkolenko (iStock / Getty Images Plus)</em></p>

<p>Discover the latest in security education and training, featuring programs, certifications, and resources to enhance skills and knowledge in the security field.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2614-security-education-training</link>
    <language>en-us</language>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1775142497" type="image/png" length="470607"/>
    </item>
    <item>
      <title>Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Training programs provide essential baseline knowledge, b<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ut training alone does not make someone proficient.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102200</guid>
      <pubDate>Thu, 02 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102200-beyond-the-certificate-why-real-expertise-in-investigative-interviewing-comes-from-practice</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/01/Interview-by-Vitaly-Gariev.webp?t=1775057353" type="image/png" length="347211"/>
    </item>
    <item>
      <title>Breaking Down “The Mosaic Effect”</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Luke Norris, C<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">o-Founder and CEO of Kamiwaza, about <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“the mosaic effect” and how AI is shaping it today.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102186</guid>
      <pubDate>Thu, 26 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102186-breaking-down-the-mosaic-effect</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/SEC_Web_5Minutes-Norris-0326_1170x658.webp?t=1773855022" type="image/jpeg" length="84529"/>
    </item>
    <item>
      <title>What Does It Take to Be an Outstanding CSO or CISO?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, discusses what it takes to be a great CSO or CISO in the modern age.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102171</guid>
      <pubDate>Wed, 25 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102171-what-does-it-take-to-be-an-outstanding-cso-or-ciso</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/McHugh-podcast-news-header.webp?t=1773332170" type="image/png" length="132615"/>
    </item>
    <item>
      <title>Succeeding A Legendary Leader</title>
      <description>
        <![CDATA[<p>What happens when stepping into the shadow of a seemingly irreplaceable predecessor.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102193</guid>
      <pubDate>Wed, 25 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102193-succeeding-a-legendary-leader</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Leader-Feat-Slide1-1170x658.webp?t=1774281191" type="image/jpeg" length="184258"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773759029" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Is Crowdsourcing Your Security Plan a Career Risk? </title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Build meaningful insights from relationships with other security leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102176</guid>
      <pubDate>Mon, 23 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102176-is-crowdsourcing-your-security-plan-a-career-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Career-Feat-Slide1-1170x658.webp?t=1773667811" type="image/jpeg" length="101737"/>
    </item>
    <item>
      <title>Discussing Use of Force in Security: A Challenging Discussion?</title>
      <description>
        <![CDATA[<p>Some may consider the use of force in security to be a challenging discussion, but it must be had in order to improve functionally and ethically.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102161</guid>
      <pubDate>Fri, 13 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102161-discussing-use-of-force-in-security-a-challenging-discussion</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Edu-Feat-Slide1-1170x658.webp?t=1772810452" type="image/jpeg" length="94254"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>Critical Thinking Erosion: A Hidden Threat to Security Career Resilience</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>While cybersecurity is vital, it is only one piece of the larger security puzzle.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102117</guid>
      <pubDate>Mon, 16 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102117-critical-thinking-erosion-a-hidden-threat-to-security-career-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Career-Feat-Slide1-1170x658.webp?t=1772041699" type="image/jpeg" length="153150"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>What Background Checks Miss: The Human Layer Behind Modern Screening</title>
      <description>
        <![CDATA[<p>As background checks become more standard, they can run the risk of becoming less thorough.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102083</guid>
      <pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102083-what-background-checks-miss-the-human-layer-behind-modern-screening</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Edu-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="66133"/>
    </item>
    <item>
      <title>Private Sector Intelligence Careers</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>As corporate intelligence roles grow, gaps in analytic tradecraft education highlight the need for structured thinking and decision-support training.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102073</guid>
      <pubDate>Mon, 19 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102073-private-sector-intelligence-careers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Career-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="110926"/>
    </item>
    <item>
      <title>Escape Rooms, Mud Runs, and Game Nights: Cradles of Leadership?</title>
      <description>
        <![CDATA[<p>What team-building games can teach us about real leadership.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102072</guid>
      <pubDate>Fri, 16 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102072-escape-rooms-mud-runs-and-game-nights-cradles-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Leadership-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="121518"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
    <item>
      <title>Cybercrime Economics: AI’s Impact and How to Shift Defenses</title>
      <description>
        <![CDATA[<p>AI changed the economics of cybercrime. In 2026, defenses must change with it.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102056</guid>
      <pubDate>Wed, 31 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102056-cybercrime-economics-ais-impact-and-how-to-shift-defenses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Rendered-computer-with-coding-by-Growtika.webp?t=1766163379" type="image/png" length="281882"/>
    </item>
    <item>
      <title>Human Oversight Is the Missing Link in GenAI Trust</title>
      <description>
        <![CDATA[<p>Human oversight will determine when genAI becomes enterprise-grade.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102048</guid>
      <pubDate>Tue, 16 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102048-human-oversight-is-the-missing-link-in-genai-trust</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/15/AI-chip-up-close-by-Igor-Omilaev.webp?t=1765818573" type="image/png" length="445428"/>
    </item>
    <item>
      <title>The Gift of Leadership</title>
      <description>
        <![CDATA[<p>Security leaders discuss inspiring others through the gift of leadership this holiday season.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102042</guid>
      <pubDate>Mon, 15 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102042-the-gift-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Leadership-Feat-Slide1-1170x658.webp?t=1766527868" type="image/jpeg" length="35588"/>
    </item>
    <item>
      <title>2025 Corporate Security Job Market Shifts</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Adaptability is the foundation of resilience, both for corporate security programs and for individual security careers.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102041</guid>
      <pubDate>Fri, 12 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102041-2025-corporate-security-job-market-shifts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Career-Feat-Slide1-1170x658.webp?t=1766527867" type="image/jpeg" length="63676"/>
    </item>
    <item>
      <title>How Does Metadata Help in Digital Forensic Investigations?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Metadata proves to be a powerful ally in digital forensics investigations.</span>
</p><br><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102019</guid>
      <pubDate>Tue, 25 Nov 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102019-how-does-metadata-help-in-digital-forensic-investigations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/24/Magnifying-glass-over-laptop-by-Agence-Olloweb.webp?t=1764812378" type="image/png" length="332543"/>
    </item>
    <item>
      <title>Inside The 2025 Security Benchmark Report</title>
      <description>
        <![CDATA[<p>Rachelle Blair-Frasier, Editor in Chief at <em>Security</em> magazine, presents a selection of findings from The 2025 Security Benchmark Report.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102009</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102009-inside-the-2025-security-benchmark-report</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Talk-Feat-Slide1-1170x658.webp?t=1763047752" type="image/jpeg" length="83767"/>
    </item>
    <item>
      <title>Mind the GAP</title>
      <description>
        <![CDATA[<p>Six principles every security leader should remember when plans derail.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102004</guid>
      <pubDate>Mon, 17 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102004-mind-the-gap</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Leadership-Feat-Slide1-1170x658.webp?t=1762870037" type="image/jpeg" length="166648"/>
    </item>
    <item>
      <title>Security Job Postings and Pay Transparency Laws</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Compliance with pay transparency requirements is essential to responsible recruitment practices and risk management.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102003</guid>
      <pubDate>Fri, 14 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102003-security-job-postings-and-pay-transparency-laws</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-0925-Career-Feat-Slide1-1170x658.webp?t=1762869315" type="image/jpeg" length="92739"/>
    </item>
    <item>
      <title>Bringing AI to The SOC Is Not Intended to Replace Humans</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI in the SOC is showing true promise because it abandons the rigid, rules-based approaches of the past and embraces autonomous reasoning and continuous learning capabilities that have not been previously available.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101999</guid>
      <pubDate>Tue, 11 Nov 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101999-bringing-ai-to-the-soc-is-not-intended-to-replace-humans</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/10/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1762789612" type="image/png" length="201182"/>
    </item>
    <item>
      <title>Stepping Into Enterprise Security: How Public Safety Professionals Can Stand Out and Land Their First Role</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>This is a difficult year for professionals looking to shift from public safety to enterprise security, but with proper preparation, the move is possible.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101995</guid>
      <pubDate>Fri, 07 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101995-stepping-into-enterprise-security-how-public-safety-professionals-can-stand-out-and-land-their-first-role</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Edu-Feat-Slide1-1170x658.webp?t=1763157543" type="image/jpeg" length="87786"/>
    </item>
    <item>
      <title>Inside SECURITY 500: Reinventing Security Leadership</title>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em>Magazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference.
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101986</guid>
      <pubDate>Wed, 05 Nov 2025 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101986-inside-security-500-reinventing-security-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/05/SEC-Podcast-Header-11.5.25-Will-Bernhjelm.webp?t=1762363021" type="image/png" length="118979"/>
    </item>
  </channel>
</rss>
