<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - Joshua Bellendir</title>
	<atom:link href="https://www.joshuabellendir.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.joshuabellendir.com/tag/cybersecurity/</link>
	<description>Global CIO &#124; Transformation Leader &#124; Trusted Advisor</description>
	<lastBuildDate>Sat, 22 Nov 2025 19:51:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2017/10/cropped-cropped-JBlogo.png?fit=32%2C32&#038;ssl=1</url>
	<title>Cybersecurity Archives - Joshua Bellendir</title>
	<link>https://www.joshuabellendir.com/tag/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">186330610</site>	<item>
		<title>The Growing Insider Threat: Why Trusted Access Is Now One of Cybersecurity’s Biggest Risks</title>
		<link>https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/</link>
					<comments>https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/#respond</comments>
		
		<dc:creator><![CDATA[Joshua]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 21:27:14 +0000</pubDate>
				<category><![CDATA[Tech & Business]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Crowdstrike]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insider Threats]]></category>
		<guid isPermaLink="false">https://www.joshuabellendir.com/?p=53955</guid>

					<description><![CDATA[<p>The rise in insider-driven breaches continues to be one of the most concerning trends in cybersecurity. This incident shared by Brian Krebs and reported by BleepingComputer is another reminder that even the strongest organizations (Crowdstrike) are vulnerable when trusted access is misused or compromised. These hacking groups are openly recruiting &#8230;</p>
<p>The post <a href="https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/">The Growing Insider Threat: Why Trusted Access Is Now One of Cybersecurity’s Biggest Risks</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The rise in insider-driven breaches continues to be one of the most concerning trends in cybersecurity. This incident shared by Brian Krebs and reported by <a href="https://www.linkedin.com/feed/?msgControlName=view_message_button&amp;msgConversationId=2-ZTZhYzI0ZTctYzFhNi00NmI2LWFjNjgtMjY3OWFiNjFmMjBkXzEwMA%3D%3D&amp;msgOverlay=true&amp;trk=false#">BleepingComputer</a> is another reminder that even the strongest organizations (Crowdstrike) are vulnerable when trusted access is misused or compromised.</p>



<p>These hacking groups are openly recruiting employees and paying for insider access. Their target list spans telecom, retail, tech, cloud, gaming, and BPO companies. The sophistication of their social engineering and the speed at which they exploit access continues to increase.</p>



<p>For many companies, the biggest risk is not just external attackers. It is the combination of human behavior, access sprawl, weak identity governance, and the absence of strong cultural reinforcement around security.</p>



<p>This raises an important question for all of us in the industry:</p>



<p>What steps are you taking inside your organization to reduce the risk of insider threats?</p>



<p>Are you doubling down on identity governance, monitoring privileged access, improving off-boarding processes, building stronger security awareness programs, or investing in tools that help detect unusual behavior across your environment?</p>



<p>Curious to hear how others are approaching this challenge and what is working well in your companies.</p>



<p>You can read the full article here: https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/</p>



<iframe src="https://www.linkedin.com/embed/feed/update/urn:li:share:7397702856666931200" height="1412" width="504" frameborder="0" allowfullscreen="" title="Embedded post"></iframe>
<p>The post <a href="https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/">The Growing Insider Threat: Why Trusted Access Is Now One of Cybersecurity’s Biggest Risks</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">53955</post-id>	</item>
		<item>
		<title>One Unprotected Laptop Is All It Takes</title>
		<link>https://www.joshuabellendir.com/one-unprotected-laptop/</link>
					<comments>https://www.joshuabellendir.com/one-unprotected-laptop/#respond</comments>
		
		<dc:creator><![CDATA[Joshua]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 06:30:07 +0000</pubDate>
				<category><![CDATA[Tech & Business]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Nikkei]]></category>
		<category><![CDATA[ZeroTrust]]></category>
		<guid isPermaLink="false">https://www.joshuabellendir.com/?p=53913</guid>

					<description><![CDATA[<p>A good reminder that one unprotected laptop can unravel even a solid security program. The Nikkei incident wasn’t about Slack or MFA failing, it was a compromised personal device used to access corporate systems. If we allow access from devices we can’t secure, we’re not practicing Zero Trust&#8230;we’re hoping for &#8230;</p>
<p>The post <a href="https://www.joshuabellendir.com/one-unprotected-laptop/">One Unprotected Laptop Is All It Takes</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A good reminder that one unprotected laptop can unravel even a solid security program. The Nikkei incident wasn’t about Slack or MFA failing, it was a compromised personal device used to access corporate systems. If we allow access from devices we can’t secure, we’re not practicing Zero Trust&#8230;we’re hoping for the best. </p>



<p>What’s your take: should unmanaged devices ever touch corporate systems? <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f914.png" alt="🤔" class="wp-smiley" style="height: 1em; max-height: 1em;" /><br><br>Read the full story on CSO Online:</p>



<div class="wp-block-link-preview-cards-card" data-url="https://www.csoonline.com/article/4086100/nikkeis-slack-breach-leaks-sensitive-data-from-more-than-17000-users.html" data-title="Nikkei&#039;s Slack breach leaks sensitive data from more than 17,000 users" data-description="The Nikkei incident highlights the enterprise risks associated with access to enterprise resources from non-enterprise-managed devices." data-image="https://www.csoonline.com/wp-content/uploads/2025/11/4086100-0-93972800-1762461019-shutterstock_1062285074.jpg?quality=50&amp;strip=all&amp;w=1024"></div>
<p>The post <a href="https://www.joshuabellendir.com/one-unprotected-laptop/">One Unprotected Laptop Is All It Takes</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.joshuabellendir.com/one-unprotected-laptop/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">53913</post-id>	</item>
		<item>
		<title>Agentic AI + Ransomware = The Next Cyber Threat Frontier</title>
		<link>https://www.joshuabellendir.com/agentic-ai-ransomware-the-next-cyber-threat-frontier/</link>
					<comments>https://www.joshuabellendir.com/agentic-ai-ransomware-the-next-cyber-threat-frontier/#respond</comments>
		
		<dc:creator><![CDATA[Joshua]]></dc:creator>
		<pubDate>Wed, 21 May 2025 22:38:00 +0000</pubDate>
				<category><![CDATA[Tech & Business]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Future of Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.joshuabellendir.com/?p=53986</guid>

					<description><![CDATA[<p>🚨 Agentic AI + Ransomware = The Next Cyber Threat Frontier 🚨 The rise of autonomous, goal-driven AI has massive implications for cybersecurity—and not in a good way. This eye-opening piece from KnowBe4 explores how Agentic AI could supercharge ransomware attacks, making them faster, smarter, and harder to stop. If &#8230;</p>
<p>The post <a href="https://www.joshuabellendir.com/agentic-ai-ransomware-the-next-cyber-threat-frontier/">Agentic AI + Ransomware = The Next Cyber Threat Frontier</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a8.png" alt="🚨" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Agentic AI + Ransomware = The Next Cyber Threat Frontier <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a8.png" alt="🚨" class="wp-smiley" style="height: 1em; max-height: 1em;" /><br><br>The rise of autonomous, goal-driven AI has massive implications for cybersecurity—and not in a good way. This eye-opening piece from KnowBe4 explores how Agentic AI could supercharge ransomware attacks, making them faster, smarter, and harder to stop.<br><br>If you&#8217;re in IT, cybersecurity, or executive leadership, it&#8217;s time to start planning for a very different kind of threat landscape.<br><br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Read the article: <a href="https://lnkd.in/gzni4seh">https://lnkd.in/gzni4seh</a></p>
<p>The post <a href="https://www.joshuabellendir.com/agentic-ai-ransomware-the-next-cyber-threat-frontier/">Agentic AI + Ransomware = The Next Cyber Threat Frontier</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.joshuabellendir.com/agentic-ai-ransomware-the-next-cyber-threat-frontier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">53986</post-id>	</item>
		<item>
		<title>Quoted in a Recent CIO.com Article: What CEOs Expect from Today’s IT Leaders</title>
		<link>https://www.joshuabellendir.com/what-ceos-expect-from-todays-it-leaders-reflections-on-a-recent-cio-com-article/</link>
					<comments>https://www.joshuabellendir.com/what-ceos-expect-from-todays-it-leaders-reflections-on-a-recent-cio-com-article/#respond</comments>
		
		<dc:creator><![CDATA[Joshua]]></dc:creator>
		<pubDate>Sat, 17 May 2025 22:52:00 +0000</pubDate>
				<category><![CDATA[Tech & Business]]></category>
		<category><![CDATA[Agentic AI]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CEO]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.joshuabellendir.com/?p=53991</guid>

					<description><![CDATA[<p>Every so often, an article comes along that captures the conversations many of us are having inside our organizations. CIO.com just published a thoughtful piece examining what CEOs expect from their IT leaders today — and it hits on several themes shaping the future of our profession. While speaking with &#8230;</p>
<p>The post <a href="https://www.joshuabellendir.com/what-ceos-expect-from-todays-it-leaders-reflections-on-a-recent-cio-com-article/">Quoted in a Recent CIO.com Article: What CEOs Expect from Today’s IT Leaders</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Every so often, an article comes along that captures the conversations many of us are having inside our organizations. CIO.com just published a thoughtful piece examining what CEOs expect from their IT leaders today — and it hits on several themes shaping the future of our profession.</p>



<p>While speaking with the reporter during her research for the article, I was struck by how consistently these priorities surface across industries. I was also quoted in the final piece, adding my perspective on how IT can better align with the business, but the broader insights from leaders across sectors make it well worth the read.</p>



<p>If you&#8217;re thinking about how the CIO role is evolving, here are a few ideas the article brings forward:</p>



<p><strong>1. CEOs want IT to lead, not follow</strong><br>Technology leaders are expected to directly influence revenue, customer experience, and operational excellence — not just support them.</p>



<p><strong>2. AI needs to deliver real value</strong><br>The shift from experimentation to practical, measurable outcomes is accelerating. CEOs want AI initiatives to solve real problems, not create new ones.</p>



<p><strong>3. Balancing transformation and stability</strong><br>Modernization efforts must coexist with the realities of legacy environments and day-to-day operational demands. It’s a tightrope every CIO knows well.</p>



<p><strong>4. Security and resilience remain foundational</strong><br>Economic and geopolitical pressures are pushing cybersecurity, regulatory readiness, and risk management further into the strategic spotlight.</p>



<p>These points mirror what I see in my own work and in discussions with other technology leaders. If you’re interested in how the CIO role is changing — and what’s being asked of us at the executive table — this article provides a clear snapshot of where things are heading.</p>



<p>You can read the full piece here:<br><a href="https://www.cio.com/article/3982258/ceos-top-priorities-for-it-leaders-today.html?utm_source=chatgpt.com">https://www.cio.com/article/3982258/ceos-top-priorities-for-it-leaders-today.html</a></p>
<p>The post <a href="https://www.joshuabellendir.com/what-ceos-expect-from-todays-it-leaders-reflections-on-a-recent-cio-com-article/">Quoted in a Recent CIO.com Article: What CEOs Expect from Today’s IT Leaders</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.joshuabellendir.com/what-ceos-expect-from-todays-it-leaders-reflections-on-a-recent-cio-com-article/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">53991</post-id>	</item>
		<item>
		<title>Cybersecurity Woman of the Year Awards Ceremony at Fontainebleau</title>
		<link>https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/</link>
					<comments>https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/#respond</comments>
		
		<dc:creator><![CDATA[Joshua]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 06:27:40 +0000</pubDate>
				<category><![CDATA[Tech & Business]]></category>
		<category><![CDATA[Awards]]></category>
		<category><![CDATA[Blackhat]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[WomanOfTheYear]]></category>
		<category><![CDATA[WomenInLeadership]]></category>
		<guid isPermaLink="false">https://joshuabellendir.com/?p=53569</guid>

					<description><![CDATA[<p>What a fantastic way to kick off the week—attending the Cybersecurity Woman of the Year Awards ceremony at Fontainebleau. Black Hat, a premier cybersecurity conference, is taking place this week in Las Vegas, and the United Cybersecurity Alliance held an awards ceremony to celebrate women in cybersecurity leadership roles. It &#8230;</p>
<p>The post <a href="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/">Cybersecurity Woman of the Year Awards Ceremony at Fontainebleau</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>What a fantastic way to kick off the week—attending the Cybersecurity Woman of the Year Awards ceremony at Fontainebleau. Black Hat, a premier cybersecurity conference, is taking place this week in Las Vegas, and the <a href="https://www.linkedin.com/in/joshuabellendir/recent-activity/all/#">United Cybersecurity Alliance</a> held an awards ceremony to celebrate women in cybersecurity leadership roles.</p>



<p>It was an honor to be invited to this gathering and to hear the success stories and journeys of these incredible women. It was also inspiring to learn how the sponsors are empowering and supporting women in technology through various initiatives. The insights I gained were very encouraging and are exactly what is needed to increase the number of women in technology roles today, and into the future. While I was just an attendee this year, I am excited to see how I can contribute and support these efforts in the future.</p>



<p>Are you in Vegas this week for Black Hat? I’m attending several networking and after-party events and would love to connect with my network. Additionally, we are actively recruiting for our IT team, specifically, we have three open roles in our Information Security team. If you or anyone you know may be interested, please DM me. Come join a growing team of technology superstars!</p>



<p><a href="https://www.linkedin.com/in/joshuabellendir/recent-activity/all/#">John Varcho</a> <a href="https://www.linkedin.com/in/joshuabellendir/recent-activity/all/#">Vaishali Gupte</a> <a href="https://www.linkedin.com/in/joshuabellendir/recent-activity/all/#">Robert Sellinger</a> <a href="https://www.linkedin.com/in/joshuabellendir/recent-activity/all/#">Giuseppe Greco</a> <a href="https://www.linkedin.com/in/joshuabellendir/recent-activity/all/#">FC .</a> <a href="https://www.linkedin.com/in/joshuabellendir/recent-activity/all/#">Dustin Dragotto</a></p>



<div data-carousel-extra='{&quot;blog_id&quot;:1,&quot;permalink&quot;:&quot;https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/&quot;}'  class="wp-block-jetpack-tiled-gallery aligncenter is-style-rectangular"><div class=""><div class="tiled-gallery__gallery"><div class="tiled-gallery__row"><div class="tiled-gallery__col" style="flex-basis:62.94540%"><figure class="tiled-gallery__item"><img decoding="async" data-attachment-id="53570" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084025096/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084025096.jpeg?fit=1280%2C1707&amp;ssl=1" data-orig-size="1280,1707" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084025096" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084025096.jpeg?fit=225%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084025096.jpeg?fit=373%2C497&amp;ssl=1" data-attachment-id="53570" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084025096/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084025096.jpeg?fit=1280%2C1707&amp;ssl=1" data-orig-size="1280,1707" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084025096" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084025096.jpeg?fit=225%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084025096.jpeg?fit=373%2C497&amp;ssl=1" role="button" tabindex="0" aria-label="Open image 1 of 4 in full-screen"srcset="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084025096-768x1024.jpeg?strip=info&#038;w=600&#038;ssl=1 600w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084025096-768x1024.jpeg?strip=info&#038;w=900&#038;ssl=1 900w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084025096-768x1024.jpeg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084025096-768x1024.jpeg?strip=info&#038;w=1280&#038;ssl=1 1280w" alt="" data-height="1707" data-id="53570" data-link="https://joshuabellendir.com/?attachment_id=53570" data-url="https://joshuabellendir.com/wp-content/uploads/2024/09/1723084025096-768x1024.jpeg" data-width="1280" src="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084025096-768x1024.jpeg?ssl=1" data-amp-layout="responsive"/></figure></div><div class="tiled-gallery__col" style="flex-basis:37.05460%"><figure class="tiled-gallery__item"><img decoding="async" data-attachment-id="53573" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084024607/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024607.jpeg?fit=1920%2C1440&amp;ssl=1" data-orig-size="1920,1440" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084024607" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024607.jpeg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024607.jpeg?fit=373%2C280&amp;ssl=1" data-attachment-id="53573" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084024607/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024607.jpeg?fit=1920%2C1440&amp;ssl=1" data-orig-size="1920,1440" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084024607" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024607.jpeg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024607.jpeg?fit=373%2C280&amp;ssl=1" role="button" tabindex="0" aria-label="Open image 2 of 4 in full-screen"srcset="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg?strip=info&#038;w=600&#038;ssl=1 600w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg?strip=info&#038;w=900&#038;ssl=1 900w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg?strip=info&#038;w=1500&#038;ssl=1 1500w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg?strip=info&#038;w=1800&#038;ssl=1 1800w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg?strip=info&#038;w=1920&#038;ssl=1 1920w" alt="" data-height="1440" data-id="53573" data-link="https://joshuabellendir.com/?attachment_id=53573" data-url="https://joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg" data-width="1920" src="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024607-1024x768.jpeg?ssl=1" data-amp-layout="responsive"/></figure><figure class="tiled-gallery__item"><img decoding="async" data-attachment-id="53572" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084024367/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024367.jpeg?fit=1920%2C1440&amp;ssl=1" data-orig-size="1920,1440" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084024367" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024367.jpeg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024367.jpeg?fit=373%2C280&amp;ssl=1" data-attachment-id="53572" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084024367/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024367.jpeg?fit=1920%2C1440&amp;ssl=1" data-orig-size="1920,1440" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084024367" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024367.jpeg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024367.jpeg?fit=373%2C280&amp;ssl=1" role="button" tabindex="0" aria-label="Open image 3 of 4 in full-screen"srcset="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg?strip=info&#038;w=600&#038;ssl=1 600w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg?strip=info&#038;w=900&#038;ssl=1 900w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg?strip=info&#038;w=1500&#038;ssl=1 1500w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg?strip=info&#038;w=1800&#038;ssl=1 1800w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg?strip=info&#038;w=1920&#038;ssl=1 1920w" alt="" data-height="1440" data-id="53572" data-link="https://joshuabellendir.com/?attachment_id=53572" data-url="https://joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg" data-width="1920" src="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024367-1024x768.jpeg?ssl=1" data-amp-layout="responsive"/></figure><figure class="tiled-gallery__item"><img decoding="async" data-attachment-id="53571" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084024457/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024457.jpeg?fit=1920%2C1440&amp;ssl=1" data-orig-size="1920,1440" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084024457" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024457.jpeg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024457.jpeg?fit=373%2C280&amp;ssl=1" data-attachment-id="53571" data-permalink="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/attachment/1723084024457/" data-orig-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024457.jpeg?fit=1920%2C1440&amp;ssl=1" data-orig-size="1920,1440" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1723084024457" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024457.jpeg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2024/09/1723084024457.jpeg?fit=373%2C280&amp;ssl=1" role="button" tabindex="0" aria-label="Open image 4 of 4 in full-screen"srcset="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg?strip=info&#038;w=600&#038;ssl=1 600w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg?strip=info&#038;w=900&#038;ssl=1 900w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg?strip=info&#038;w=1500&#038;ssl=1 1500w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg?strip=info&#038;w=1800&#038;ssl=1 1800w,https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg?strip=info&#038;w=1920&#038;ssl=1 1920w" alt="" data-height="1440" data-id="53571" data-link="https://joshuabellendir.com/?attachment_id=53571" data-url="https://joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg" data-width="1920" src="https://i0.wp.com/joshuabellendir.com/wp-content/uploads/2024/09/1723084024457-1024x768.jpeg?ssl=1" data-amp-layout="responsive"/></figure></div></div></div></div></div>
<p>The post <a href="https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/">Cybersecurity Woman of the Year Awards Ceremony at Fontainebleau</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.joshuabellendir.com/cybersecurity-woman-of-the-year-awards-ceremony-at-fontainebleau/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">53569</post-id>	</item>
	</channel>
</rss>
