<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Education &amp; Training</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: EvgeniyShkolenko (iStock / Getty Images Plus)</em></p>

<p>Discover the latest in security education and training, featuring programs, certifications, and resources to enhance skills and knowledge in the security field.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2614-security-education-training</link>
    <language>en-us</language>
    <item>
      <title>Why Most Workplace Violence Prevention Starts Too Late</title>
      <description>
        <![CDATA[<p>If your people are running, hiding, or fighting, the prevention window has already closed.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102302</guid>
      <pubDate>Fri, 15 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102302-why-most-workplace-violence-prevention-starts-too-late</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Man-with-covered-face-by-Jeremy-Weber.webp?t=1778775586" type="image/png" length="146283"/>
    </item>
    <item>
      <title>The Bench You'll Need in Three Years Depends on Decisions You Make Now</title>
      <description>
        <![CDATA[<p>Today’s hiring shortcut is tomorrow’s talent shortage.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102299</guid>
      <pubDate>Thu, 14 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709" type="image/png" length="302550"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Need to Think Like Business Leaders</title>
      <description>
        <![CDATA[<p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102288</guid>
      <pubDate>Wed, 06 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102288-cybersecurity-professionals-need-to-think-like-business-leaders</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516" type="image/png" length="448831"/>
    </item>
    <item>
      <title>Security Career or Security Blanket? Turning Fearful Staying into Commitment</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Building a culture where your best security people choose your organization is key.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102218</guid>
      <pubDate>Mon, 27 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102218-security-career-or-security-blanket-turning-fearful-staying-into-commitment</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Career-Feat-Slide1-1170x658.webp?t=1775661149" type="image/jpeg" length="73202"/>
    </item>
    <item>
      <title>Succeeding an Underwhelming Leader</title>
      <description>
        <![CDATA[<p>Security leaders discuss taking over leadership after an underperforming leader.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102217</guid>
      <pubDate>Fri, 24 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102217-succeeding-an-underwhelming-leader</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Leader-Feat-Slide1-1170x658.webp?t=1775660728" type="image/jpeg" length="35610"/>
    </item>
    <item>
      <title>Why Bridging Siloes Doesn’t Need to Be Complicated</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Bruce McIndoe provides actionable steps for bridging siloes.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102240</guid>
      <pubDate>Wed, 22 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102240-why-bridging-siloes-doesnt-need-to-be-complicated</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/McIndoe-podcast-news-header.webp?t=1776785504" type="image/png" length="120498"/>
    </item>
    <item>
      <title>Advance Your Cybersecurity Career</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security</em> magazine talks with a CISO about how cyber professionals can advance their careers.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102214</guid>
      <pubDate>Mon, 20 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102214-advance-your-cybersecurity-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Edu-Feat-Slide1-1170x658.webp?t=1776895797" type="image/jpeg" length="123294"/>
    </item>
    <item>
      <title>Democratized Software, Democratized Risk: Who’s Accountable When Everyone Codes?</title>
      <description>
        <![CDATA[<p>How to modernize risk management when software creation becomes broadly distributed. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102234</guid>
      <pubDate>Thu, 16 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102234-democratized-software-democratized-risk-whos-accountable-when-everyone-codes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Pink-and-orange-laptop-by-Joshua-Reddekopp.webp?t=1776268323" type="image/png" length="188461"/>
    </item>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1776276357" type="image/png" length="470607"/>
    </item>
    <item>
      <title>Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Training programs provide essential baseline knowledge, b<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ut training alone does not make someone proficient.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102200</guid>
      <pubDate>Thu, 02 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102200-beyond-the-certificate-why-real-expertise-in-investigative-interviewing-comes-from-practice</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/01/Interview-by-Vitaly-Gariev.webp?t=1775680874" type="image/png" length="347211"/>
    </item>
    <item>
      <title>Breaking Down “The Mosaic Effect”</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Luke Norris, C<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">o-Founder and CEO of Kamiwaza, about <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“the mosaic effect” and how AI is shaping it today.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102186</guid>
      <pubDate>Thu, 26 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102186-breaking-down-the-mosaic-effect</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/SEC_Web_5Minutes-Norris-0326_1170x658.webp?t=1773855022" type="image/jpeg" length="84529"/>
    </item>
    <item>
      <title>What Does It Take to Be an Outstanding CSO or CISO?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, discusses what it takes to be a great CSO or CISO in the modern age.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102171</guid>
      <pubDate>Wed, 25 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102171-what-does-it-take-to-be-an-outstanding-cso-or-ciso</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/McHugh-podcast-news-header.webp?t=1773332170" type="image/png" length="132615"/>
    </item>
    <item>
      <title>Succeeding A Legendary Leader</title>
      <description>
        <![CDATA[<p>What happens when stepping into the shadow of a seemingly irreplaceable predecessor.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102193</guid>
      <pubDate>Wed, 25 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102193-succeeding-a-legendary-leader</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Leader-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="184258"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1776276359" type="image/png" length="373204"/>
    </item>
    <item>
      <title>Is Crowdsourcing Your Security Plan a Career Risk? </title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Build meaningful insights from relationships with other security leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102176</guid>
      <pubDate>Mon, 23 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102176-is-crowdsourcing-your-security-plan-a-career-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Career-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="101737"/>
    </item>
    <item>
      <title>Discussing Use of Force in Security: A Challenging Discussion?</title>
      <description>
        <![CDATA[<p>Some may consider the use of force in security to be a challenging discussion, but it must be had in order to improve functionally and ethically.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102161</guid>
      <pubDate>Fri, 13 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102161-discussing-use-of-force-in-security-a-challenging-discussion</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Edu-Feat-Slide1-1170x658.webp?t=1772810452" type="image/jpeg" length="94254"/>
    </item>
    <item>
      <title>The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In today’s era of well-designed social engineering attacks, threat actors often develop new ways to leverage existing attack methods.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102156</guid>
      <pubDate>Thu, 05 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102156-the-great-security-culture-shift-building-a-proactive-defense-in-an-era-of-advanced-threats-and-social-engineering</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Lightbulb-on-blue-background-by-Sasun-Bughdaryan.webp?t=1772638164" type="image/png" length="336106"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>Why Traditional Upskilling Strategies Fall Short in Cybersecurity</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102130</guid>
      <pubDate>Thu, 19 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102130-why-traditional-upskilling-strategies-fall-short-in-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/SEC_Web_5Minutes-Ha-Hoang-0226_1170x658.webp?t=1771428841" type="image/jpeg" length="84530"/>
    </item>
    <item>
      <title>Critical Thinking Erosion: A Hidden Threat to Security Career Resilience</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>While cybersecurity is vital, it is only one piece of the larger security puzzle.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102117</guid>
      <pubDate>Mon, 16 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102117-critical-thinking-erosion-a-hidden-threat-to-security-career-resilience</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Career-Feat-Slide1-1170x658.webp?t=1772041699" type="image/jpeg" length="153150"/>
    </item>
    <item>
      <title>Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy</title>
      <description>
        <![CDATA[<p>The six-phase playbook of how romance scams actually work.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102124</guid>
      <pubDate>Fri, 13 Feb 2026 14:00:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102124-valentines-day-2026-inside-the-industrial-scale-romance-scam-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/Phone-showing-hearts-and-flirty-emojis-by-Markus-Winkler.webp?t=1771464182" type="image/png" length="372893"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>What Background Checks Miss: The Human Layer Behind Modern Screening</title>
      <description>
        <![CDATA[<p>As background checks become more standard, they can run the risk of becoming less thorough.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102083</guid>
      <pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102083-what-background-checks-miss-the-human-layer-behind-modern-screening</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Edu-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="66133"/>
    </item>
    <item>
      <title>Private Sector Intelligence Careers</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>As corporate intelligence roles grow, gaps in analytic tradecraft education highlight the need for structured thinking and decision-support training.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102073</guid>
      <pubDate>Mon, 19 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102073-private-sector-intelligence-careers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Career-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="110926"/>
    </item>
    <item>
      <title>Escape Rooms, Mud Runs, and Game Nights: Cradles of Leadership?</title>
      <description>
        <![CDATA[<p>What team-building games can teach us about real leadership.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102072</guid>
      <pubDate>Fri, 16 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102072-escape-rooms-mud-runs-and-game-nights-cradles-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-Leadership-Feat-Slide1-1170x658.webp?t=1769626264" type="image/jpeg" length="121518"/>
    </item>
    <item>
      <title>Agentic AI Security Is Complicated, and the Hyper-Scalers Know It</title>
      <description>
        <![CDATA[<p>3 best practices for secure and efficient Agentic AI adoption and use.</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102059</guid>
      <pubDate>Fri, 02 Jan 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102059-agentic-ai-security-is-complicated-and-the-hyper-scalers-know-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Illustrated-ladder.webp?t=1766174486" type="image/png" length="35018"/>
    </item>
    <item>
      <title>Humans at the Center of AI Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI isn’t erasing security roles. It’s reshaping them.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102058</guid>
      <pubDate>Thu, 01 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102058-humans-at-the-center-of-ai-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Person-with-lit-up-numbers-on-them-by-Huzeyfe-Turan.webp?t=1766166511" type="image/png" length="478637"/>
    </item>
    <item>
      <title>Cybercrime Economics: AI’s Impact and How to Shift Defenses</title>
      <description>
        <![CDATA[<p>AI changed the economics of cybercrime. In 2026, defenses must change with it.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102056</guid>
      <pubDate>Wed, 31 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102056-cybercrime-economics-ais-impact-and-how-to-shift-defenses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/Rendered-computer-with-coding-by-Growtika.webp?t=1766163379" type="image/png" length="281882"/>
    </item>
    <item>
      <title>Human Oversight Is the Missing Link in GenAI Trust</title>
      <description>
        <![CDATA[<p>Human oversight will determine when genAI becomes enterprise-grade.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102048</guid>
      <pubDate>Tue, 16 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102048-human-oversight-is-the-missing-link-in-genai-trust</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/15/AI-chip-up-close-by-Igor-Omilaev.webp?t=1765818573" type="image/png" length="445428"/>
    </item>
    <item>
      <title>The Gift of Leadership</title>
      <description>
        <![CDATA[<p>Security leaders discuss inspiring others through the gift of leadership this holiday season.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102042</guid>
      <pubDate>Mon, 15 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102042-the-gift-of-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Leadership-Feat-Slide1-1170x658.webp?t=1766527868" type="image/jpeg" length="35588"/>
    </item>
  </channel>
</rss>
