<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
		>

	<!-- RSS feed defaults - main content -->
	<channel>
		<title>IbyIMD</title>
		<atom:link href="https://www.imd.org/ibyimd/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
		<link>https://www.imd.org</link>
		<description></description>
		<lastBuildDate>Tue, 07 Apr 2026 15:02:48 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
		
		<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.imd.org/wp-content/uploads/2022/10/cropped-IMD-Logo-Blue-on-transparent-Square-for-Circle-Crop-RGB-100x100.png</url>
	<title>Cybersecurity - IMD Business School</title>
	<link>https://www.imd.org</link>
	<width>32</width>
	<height>32</height>
</image> 
		
		<!-- Loop through posts and generate RSS items -->
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Is quantum computing the next big cybersecurity risk?</title>
				<link>https://www.imd.org/ibyimd/governance/quantum-computing-cybersecurity-risk/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fgovernance%2Fquantum-computing-cybersecurity-risk%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/?p=337850</guid>
				<category><![CDATA[Governance]]></category>
				<dc:creator>I by IMD</dc:creator>
				<pubDate>Thu, 26 Mar 2026 07:59:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Businesses must prepare now for post-quantum cryptography, as quantum computing could render today’s encryption obsolete and expose sensitive data to future cyber threats....]]></description>
				<content:encoded><![CDATA[Businesses must prepare now for post-quantum cryptography, as quantum computing could render today’s encryption obsolete and expose sensitive data to future cyber threats....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2026/03/Quantum-Computer-2.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>The rise of AI and cyberattacks: Why boards must be extra vigilant in 2026</title>
				<link>https://www.imd.org/ibyimd/governance/the-rise-of-ai-and-cyberattacks/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fgovernance%2Fthe-rise-of-ai-and-cyberattacks%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/?p=319956</guid>
				<category><![CDATA[Governance]]></category>
				<dc:creator>Didier Cossin, Yukie Saito</dc:creator>
				<pubDate>Mon, 05 Jan 2026 08:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Amid continued turbulence and transformation, boards must be ready to tackle the unexpected in the year ahead to strengthen their digital and strategic resilience....]]></description>
				<content:encoded><![CDATA[Amid continued turbulence and transformation, boards must be ready to tackle the unexpected in the year ahead to strengthen their digital and strategic resilience....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2026/01/The-rise-of-AI-and-cyberattacks-2.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Building digital resilience: Why cyber is no longer just a technology concern </title>
				<link>https://www.imd.org/ibyimd/artificial-intelligence/why-cyber-is-no-longer-just-a-technology-concern/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fartificial-intelligence%2Fwhy-cyber-is-no-longer-just-a-technology-concern%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/?p=308752</guid>
				<category><![CDATA[Artificial Intelligence]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Tue, 04 Nov 2025 07:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[From psychological manipulation tactics to social engineering and weaponized wearable technology, 2025 has seen it all. ...]]></description>
				<content:encoded><![CDATA[From psychological manipulation tactics to social engineering and weaponized wearable technology, 2025 has seen it all. ...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/11/Building-digital-resilience-2-1.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>When AI becomes the weapon: How to get ahead in the AI cybersecurity arms race</title>
				<link>https://www.imd.org/ibyimd/artificial-intelligence/when-ai-becomes-the-weapon-how-to-get-ahead-in-the-ai-cybersecurity-arms-race/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fartificial-intelligence%2Fwhen-ai-becomes-the-weapon-how-to-get-ahead-in-the-ai-cybersecurity-arms-race%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/?p=308169</guid>
				<category><![CDATA[Artificial Intelligence]]></category>
				<dc:creator>Jay Clark</dc:creator>
				<pubDate>Tue, 09 Dec 2025 08:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[AI is reshaping cybersecurity, arming both hackers and defenders. Learn how to stay ahead in the fast-evolving AI cybersecurity arms race....]]></description>
				<content:encoded><![CDATA[AI is reshaping cybersecurity, arming both hackers and defenders. Learn how to stay ahead in the fast-evolving AI cybersecurity arms race....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/11/When-AI-becomes-the-weapon-2.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>At the World Economic Forum’s Dubai meetings: Five ideas for a fractured world </title>
				<link>https://www.imd.org/ibyimd/geopolitics/five-ideas-for-a-fractured-world/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fgeopolitics%2Ffive-ideas-for-a-fractured-world%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/?p=306915</guid>
				<category><![CDATA[Geopolitics]]></category>
				<dc:creator>David Bach, Simon J. Evenett, Stéphane J. G. Girod, Öykü Işık, Vanina Farber</dc:creator>
				<pubDate>Fri, 17 Oct 2025 13:51:40 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Leaders at the WEF’s Annual Meetings of the Global Future Councils and Cybersecurity focused less on rivalry and more on action. ...]]></description>
				<content:encoded><![CDATA[Leaders at the WEF’s Annual Meetings of the Global Future Councils and Cybersecurity focused less on rivalry and more on action. ...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/10/Dubai-skyline.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Taming the AI Agent Wild West: 4 steps for CIOs to take control </title>
				<link>https://www.imd.org/ibyimd/technology/taming-the-ai-agent-wild-west-4-steps-for-cios-to-take-control/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Ftaming-the-ai-agent-wild-west-4-steps-for-cios-to-take-control%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/?p=269138</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>Amit M. Joshi, José Parra Moyano, Ram Bala, Natarajan Balasubramanian</dc:creator>
				<pubDate>Tue, 01 Jul 2025 06:59:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[From the untamed rise of semi-autonomous agents to growing concerns around accountability and security risks, AI agents are creating new headaches for CIOs. Here's how tech leaders can navigate the challenges. ...]]></description>
				<content:encoded><![CDATA[From the untamed rise of semi-autonomous agents to growing concerns around accountability and security risks, AI agents are creating new headaches for CIOs. Here's how tech leaders can navigate the challenges. ...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/07/Taming-the-AI-Agent-Wild-West-2.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Try this drill with your team today to prepare for a ransomware attack</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/try-this-drill-to-prepare-for-a-ransomware-attack/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Ftry-this-drill-to-prepare-for-a-ransomware-attack%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=4071</guid>
				<category><![CDATA[Brain Circuits]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Fri, 18 Jun 2021 07:00:13 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[A new cybersecurity report is making headlines for its finding the vast majority of ransomware victims are attacked more than once and the costs are steep. Are you prepared to handle this...]]></description>
				<content:encoded><![CDATA[A new cybersecurity report is making headlines for its finding the vast majority of ransomware victims are attacked more than once and the costs are steep. Are you prepared to handle this...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2021/06/ransomeware.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>How do we tackle digital’s crisis of trust?</title>
				<link>https://www.imd.org/ibyimd/technology/how-do-we-tackle-digitals-crisis-of-trust/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Fhow-do-we-tackle-digitals-crisis-of-trust%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=4142</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Tue, 22 Jun 2021 08:56:26 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Public and private sector actors must work together to adopt existing tech solutions for the crisis in trust, while fostering platforms for stronger stakeholder engagement and building more robust frameworks for legislation...]]></description>
				<content:encoded><![CDATA[Public and private sector actors must work together to adopt existing tech solutions for the crisis in trust, while fostering platforms for stronger stakeholder engagement and building more robust frameworks for legislation...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/png" 
						url="https://www.imd.org/wp-content/uploads/2021/06/IMD_StGallenSymp_WhitePaper_Round1_Idea1-e1624351866459.png" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Corporate Digital Responsibility: the next ethical frontier</title>
				<link>https://www.imd.org/ibyimd/innovation/corporate-digital-responsibility-the-next-ethical-frontier/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Finnovation%2Fcorporate-digital-responsibility-the-next-ethical-frontier%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=5854</guid>
				<category><![CDATA[Innovation]]></category>
				<dc:creator>Öykü Işık, Michael R. Wade</dc:creator>
				<pubDate>Fri, 01 Oct 2021 13:34:34 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[There have been two megatrends that have dominated the last decade: digitization and ethics and sustainability, but so far there have been few points of intersection between these two trends, largely because...]]></description>
				<content:encoded><![CDATA[There have been two megatrends that have dominated the last decade: digitization and ethics and sustainability, but so far there have been few points of intersection between these two trends, largely because...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2021/10/LTTwebinar-assets_ReLive_IbyIMD_1October2021_LandingPage-1200x680-1.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>How to prepare for the digital new year</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/how-to-prepare-for-the-digital-new-year/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Fhow-to-prepare-for-the-digital-new-year%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=7216</guid>
				<category><![CDATA[Brain Circuits]]></category>
				<dc:creator>developers</dc:creator>
				<pubDate>Mon, 03 Jan 2022 06:00:27 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[As we get back to work and aspire to a prosperous new year, it's a good time to run through exercises to protect our digital business....]]></description>
				<content:encoded><![CDATA[As we get back to work and aspire to a prosperous new year, it's a good time to run through exercises to protect our digital business....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2022/01/joshua-sortino-LqKhnDzSF-8-unsplash-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Six cybersecurity trends for companies to get to grips with in 2022 </title>
				<link>https://www.imd.org/ibyimd/videos/leading-in-turbulent-times/six-cybersecurity-trends-for-companies-to-get-to-grips-with-in-2022/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fvideos%2Fleading-in-turbulent-times%2Fsix-cybersecurity-trends-for-companies-to-get-to-grips-with-in-2022%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=9427</guid>
				<category><![CDATA[Leading in Turbulent Times]]></category>
				<dc:creator></dc:creator>
				<pubDate>Fri, 13 May 2022 06:29:14 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[The pressure of digital transformation and geopolitical tensions are making organizations more vulnerable to cyberattacks. In this webinar, Professor Öykü Isik explained how companies can anticipate threats and execute best practices....]]></description>
				<content:encoded><![CDATA[The pressure of digital transformation and geopolitical tensions are making organizations more vulnerable to cyberattacks. In this webinar, Professor Öykü Isik explained how companies can anticipate threats and execute best practices....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2022/05/RELIVE-FeaturedImage-1440x868-1.jpg" 
						width="198"
						height="283"
					></media:content>
								<enclosure url="https://www.imd.org/wp-content/uploads/2024/06/FINAL-PODCAST-CEO-Dialogue_VODAPHONE-1.mp3" length="39684478" type="audio/mpeg" />
<enclosure url="https://www.imd.org/wp-content/uploads/2024/05/CEO-Dialogue-Novo-Nordisk-Lars-Fruergaard-Jorgensen-PODCAST-AUDIO.mp3" length="70994489" type="audio/mpeg" />
<enclosure url="https://www.imd.org/wp-content/uploads/2024/03/FINAL-PODCAST-CEO-DIALOGUE-ACWA-w-Marco-Arcelli-V03-2024_03_20_1.mp3" length="45798422" type="audio/mpeg" />
<enclosure url="https://www.imd.org/wp-content/uploads/2024/02/PODCAST-Henkel-CEO-Dialogue-Carsten-Knobel-PODCAST.mp3" length="66343126" type="audio/mpeg" />

							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Strengthen governance to restore consumer trust in data</title>
				<link>https://www.imd.org/ibyimd/technology/strengthen-governance-to-restore-consumer-trust-in-data/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Fstrengthen-governance-to-restore-consumer-trust-in-data%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=9445</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>developers</dc:creator>
				<pubDate>Mon, 16 May 2022 09:47:36 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Creating better data governance involves boosting transparency and safeguarding against bias - and cyber breaches...]]></description>
				<content:encoded><![CDATA[Creating better data governance involves boosting transparency and safeguarding against bias - and cyber breaches...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2022/05/MicrosoftTeams-image-184-e1652695512719-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Three things executives are getting wrong about cybersecurity</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/three-things-executives-are-getting-wrong-about-cybersecurity/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Fthree-things-executives-are-getting-wrong-about-cybersecurity%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=15138</guid>
				<category><![CDATA[Brain Circuits]]></category>
				<dc:creator>developers</dc:creator>
				<pubDate>Thu, 01 Sep 2022 06:00:04 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Are you guilty of making one of these cybersecurity blunders? Take the test to see if you are putting your data at risk....]]></description>
				<content:encoded><![CDATA[Are you guilty of making one of these cybersecurity blunders? Take the test to see if you are putting your data at risk....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2022/08/fly-d-9PivUW7l1m4-unsplash-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>No hiding place: &#8216;bossware&#8217; is spying on you in the home, office and car</title>
				<link>https://www.imd.org/ibyimd/audio-articles/no-hiding-place-bossware-is-spying-on-you-in-the-home-office-and-car/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Faudio-articles%2Fno-hiding-place-bossware-is-spying-on-you-in-the-home-office-and-car%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=15943</guid>
				<category><![CDATA[Audio articles]]></category>
				<dc:creator>Jerry Davis</dc:creator>
				<pubDate>Mon, 24 Oct 2022 09:06:30 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[More than 500 technologies have been created to monitor employees and contract workers to ensure efficiency and compliance. It’s a sinister turn of events, but there is a better way....]]></description>
				<content:encoded><![CDATA[More than 500 technologies have been created to monitor employees and contract workers to ensure efficiency and compliance. It’s a sinister turn of events, but there is a better way....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2022/10/pexels-scott-webb-430208-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Cyber security: how to fortify the software supply chain </title>
				<link>https://www.imd.org/ibyimd/strategy/cyber-security-how-to-fortify-the-software-supply-chain/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fstrategy%2Fcyber-security-how-to-fortify-the-software-supply-chain%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=19707</guid>
				<category><![CDATA[Strategy]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Tue, 18 Jul 2023 07:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Increased IT integration between companies and suppliers has introduced new vulnerabilities. How can organizations prepare for the staggering rise in breaches through third-party vendors? ...]]></description>
				<content:encoded><![CDATA[Increased IT integration between companies and suppliers has introduced new vulnerabilities. How can organizations prepare for the staggering rise in breaches through third-party vendors? ...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2023/07/MicrosoftTeams-image-48-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Putting cybersecurity on the executive radar </title>
				<link>https://www.imd.org/ibyimd/innovation/putting-cybersecurity-on-the-executive-radar/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Finnovation%2Fputting-cybersecurity-on-the-executive-radar%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=18830</guid>
				<category><![CDATA[Innovation]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Tue, 08 Aug 2023 07:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Every board must be seriously engaged with the cybersecurity threat, warns IMD’s Öykü Işık...]]></description>
				<content:encoded><![CDATA[Every board must be seriously engaged with the cybersecurity threat, warns IMD’s Öykü Işık...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2023/05/pexels-tima-miroshnichenko-5380642-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>What might digital transformation look like over the next decade?</title>
				<link>https://www.imd.org/ibyimd/innovation/what-might-digital-transformation-look-like-over-the-next-decade/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Finnovation%2Fwhat-might-digital-transformation-look-like-over-the-next-decade%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=20103</guid>
				<category><![CDATA[Innovation]]></category>
				<dc:creator>Lazaros Goutas</dc:creator>
				<pubDate>Thu, 10 Aug 2023 07:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Every now and then, one exercise we like to perform at the Digital Business Transformation Center is to look into our metaphorical crystal ball to try and predict some of the digital...]]></description>
				<content:encoded><![CDATA[Every now and then, one exercise we like to perform at the Digital Business Transformation Center is to look into our metaphorical crystal ball to try and predict some of the digital...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2023/08/pexels-tara-winstead-8386440-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>What every executive should know about AI and cybersecurity</title>
				<link>https://www.imd.org/ibyimd/technology/what-every-executive-should-know-about-ai-and-cybersecurity/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Fwhat-every-executive-should-know-about-ai-and-cybersecurity%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=21118</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>Michael D. Watkins, Ralf Weissbeck</dc:creator>
				<pubDate>Thu, 21 Sep 2023 07:32:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Understanding AI's role in cybersecurity is crucial. By grasping its potential and challenges, you can ensure a secure and forward-thinking digital environment for your organization....]]></description>
				<content:encoded><![CDATA[Understanding AI's role in cybersecurity is crucial. By grasping its potential and challenges, you can ensure a secure and forward-thinking digital environment for your organization....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2023/09/adi-goldstein-EUsVwEOsblE-unsplash-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Women in cybersecurity: Navigating the digital frontier</title>
				<link>https://www.imd.org/ibyimd/podcasts/women-in-cybersecurity-navigating-the-digital-frontier/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fpodcasts%2Fwomen-in-cybersecurity-navigating-the-digital-frontier%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=21488</guid>
				<category><![CDATA[Podcasts]]></category>
				<dc:creator>developers</dc:creator>
				<pubDate>Mon, 02 Oct 2023 13:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Cybersecurity is a rapidly evolving field, critical for protecting our digital identities and data. In recent years, women have been making significant strides in this male-dominated industry, contributing their unique perspectives and...]]></description>
				<content:encoded><![CDATA[Cybersecurity is a rapidly evolving field, critical for protecting our digital identities and data. In recent years, women have been making significant strides in this male-dominated industry, contributing their unique perspectives and...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2023/10/AdobeStock_624131083-scaled.jpeg" 
						width="198"
						height="283"
					></media:content>
								<enclosure url="https://www.imd.org/ibyimd/wp-content/uploads/2023/10/FINAL-Why-Women-are-Cracking-the-Cybersecurity-Code-Anjali.mp3?_=2" length="25453845" type="audio/mpeg" />
<enclosure url="https://www.imd.org/wp-content/uploads/2023/10/FINAL-Why-Women-are-Cracking-the-Cybersecurity-Code-Anjali.mp3" length="25453845" type="audio/mpeg" />

							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Quantum computing, and why you need to care </title>
				<link>https://www.imd.org/ibyimd/audio-articles/quantum-computing-and-why-you-need-to-care/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Faudio-articles%2Fquantum-computing-and-why-you-need-to-care%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=22726</guid>
				<category><![CDATA[Audio articles]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Wed, 22 Nov 2023 14:49:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[The quantum era is arriving and organizations need to start thinking about encryption now, says Öykü Işık, Professor of Digital Strategy and Cybersecurity....]]></description>
				<content:encoded><![CDATA[The quantum era is arriving and organizations need to start thinking about encryption now, says Öykü Işık, Professor of Digital Strategy and Cybersecurity....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2023/11/AdobeStock_305828091-scaled.jpeg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>AI regulation: Turning compliance into competitive advantage </title>
				<link>https://www.imd.org/ibyimd/artificial-intelligence/ai-regulation-turning-compliance-into-competitive-advantage/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fartificial-intelligence%2Fai-regulation-turning-compliance-into-competitive-advantage%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=26499</guid>
				<category><![CDATA[Artificial Intelligence]]></category>
				<dc:creator></dc:creator>
				<pubDate>Fri, 12 Apr 2024 13:45:09 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[How navigating regulatory changes around AI can not only safeguard your organization against emerging threats but also foster ethical and sustainable innovation ...]]></description>
				<content:encoded><![CDATA[How navigating regulatory changes around AI can not only safeguard your organization against emerging threats but also foster ethical and sustainable innovation ...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2024/03/LTT-Webinar-assets-11April-EVENT-IbyIMDHomepage-LiveEventsSection-SMALL-1086x484-1.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>From follower to leader: Taiwan’s financial sector accelerates digital transformation  </title>
				<link>https://www.imd.org/ibyimd/finance/from-follower-to-leader-taiwans-financial-sector-accelerates-digital-transformation/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ffinance%2Ffrom-follower-to-leader-taiwans-financial-sector-accelerates-digital-transformation%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=25976</guid>
				<category><![CDATA[Finance]]></category>
				<dc:creator>Jialu Shan, Yingfen Lin</dc:creator>
				<pubDate>Mon, 15 Apr 2024 06:55:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Taiwan is undergoing a financial revolution, surging ahead in digital transformation, propelled by a convergence of global trends and local innovations....]]></description>
				<content:encoded><![CDATA[Taiwan is undergoing a financial revolution, surging ahead in digital transformation, propelled by a convergence of global trends and local innovations....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2024/03/digital.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Cyber resiliency: Building a secure future</title>
				<link>https://www.imd.org/ibyimd/leadership/cyber-resiliency-building-a-secure-future/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fleadership%2Fcyber-resiliency-building-a-secure-future%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=22733</guid>
				<category><![CDATA[Leadership]]></category>
				<dc:creator>Jamie Woodruff</dc:creator>
				<pubDate>Thu, 27 Jun 2024 06:56:15 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[To safeguard your organization from persistent cyber threats, look beyond technology and focus on educating your people, says prominent cybersecurity expert and ethical hacker Jamie Woodruff....]]></description>
				<content:encoded><![CDATA[To safeguard your organization from persistent cyber threats, look beyond technology and focus on educating your people, says prominent cybersecurity expert and ethical hacker Jamie Woodruff....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2024/06/General-image-banner-35.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Last bite of the cookie? </title>
				<link>https://www.imd.org/ibyimd/technology/last-bite-of-the-cookie/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Flast-bite-of-the-cookie%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=27146</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Fri, 28 Jun 2024 06:45:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Google’s latest reprieve for third-party cookies will be only temporary, warns IMD’s Öykü Işık...]]></description>
				<content:encoded><![CDATA[Google’s latest reprieve for third-party cookies will be only temporary, warns IMD’s Öykü Işık...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>The critical cybersecurity lesson from the Microsoft outage</title>
				<link>https://www.imd.org/ibyimd/technology/the-critical-cybersecurity-lesson-from-the-microsoft-outage/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Fthe-critical-cybersecurity-lesson-from-the-microsoft-outage%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=30034</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Fri, 19 Jul 2024 16:02:49 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[The IT debacle is a big reminder that cybersecurity is not just about defending against malicious attacks but also about ensuring system availability. ...]]></description>
				<content:encoded><![CDATA[The IT debacle is a big reminder that cybersecurity is not just about defending against malicious attacks but also about ensuring system availability. ...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2022/10/ns048-17_ceo-keynotes_430x222-1.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Think like your enemies to stay safe with AI</title>
				<link>https://www.imd.org/ibyimd/artificial-intelligence/think-like-your-enemies-to-stay-safe-with-ai/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fartificial-intelligence%2Fthink-like-your-enemies-to-stay-safe-with-ai%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=29730</guid>
				<category><![CDATA[Artificial Intelligence]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Tue, 23 Jul 2024 07:54:33 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Know AI’s strengths and weaknesses to shield your organization from increasingly sophisticated cyberattacks....]]></description>
				<content:encoded><![CDATA[Know AI’s strengths and weaknesses to shield your organization from increasingly sophisticated cyberattacks....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2024/07/AdobeStock_433354289-1.jpeg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Full transparency: 10 lessons from the cyber-attack on the British Library </title>
				<link>https://www.imd.org/ibyimd/technology/full-transparency-10-lessons-from-the-cyber-attack-on-the-british-library/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Ftechnology%2Ffull-transparency-10-lessons-from-the-cyber-attack-on-the-british-library%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=32178</guid>
				<category><![CDATA[Technology]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Mon, 30 Sep 2024 08:37:51 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[When the British Library fell victim to a major ransomware attack it opted for a policy of full transparency. Here we outline what government organizations, NGOs, and businesses can learn from the...]]></description>
				<content:encoded><![CDATA[When the British Library fell victim to a major ransomware attack it opted for a policy of full transparency. Here we outline what government organizations, NGOs, and businesses can learn from the...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2024/09/Cyber-attack-on-British-library-Featured.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>AI and cybersecurity: Think like a thief to catch a thief</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/brain-circuits-ai/ai-and-cybersecurity-think-like-a-thief-to-catch-a-thief/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Fbrain-circuits-ai%2Fai-and-cybersecurity-think-like-a-thief-to-catch-a-thief%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=34849</guid>
				<category><![CDATA[AI]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Thu, 05 Dec 2024 07:58:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[As digital tools become more sophisticated, it’s crucial to keep three key things in mind to protect your organization from cyber-attack....]]></description>
				<content:encoded><![CDATA[As digital tools become more sophisticated, it’s crucial to keep three key things in mind to protect your organization from cyber-attack....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/png" 
						url="https://www.imd.org/wp-content/uploads/2024/12/BCcybersecurity.png" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>As Trump looms large over Davos, executives keep calm and carry on</title>
				<link>https://www.imd.org/ibyimd/2025-trends/as-trump-looms-large-over-davos-executives-keep-calm-and-carry-on/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2F2025-trends%2Fas-trump-looms-large-over-davos-executives-keep-calm-and-carry-on%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=36430</guid>
				<category><![CDATA[2025 Trends]]></category>
				<dc:creator>David Bach, Simon J. Evenett, Öykü Işık, Arturo Bris, Julia Binder, Knut Haanaes, Sophie Bacq, Jennifer Jordan, Sarah E. Toms, Natalia Olynec</dc:creator>
				<pubDate>Fri, 24 Jan 2025 13:24:51 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Business leaders at this year’s World Economic Forum sought to block out the political noise and focus on what’s happening in the real economy....]]></description>
				<content:encoded><![CDATA[Business leaders at this year’s World Economic Forum sought to block out the political noise and focus on what’s happening in the real economy....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/01/AM250122_Special-Address-by-Donald-J-Trump-President-of-the-United-States-of-America_2025©WEF_BvonLoebell-8937-1.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>Cybersecurity: Risks and opportunities in the scaling of industrial AI</title>
				<link>https://www.imd.org/ibyimd/artificial-intelligence/cybersecurity-industrial-ai-risks-opportunities/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fartificial-intelligence%2Fcybersecurity-industrial-ai-risks-opportunities%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=37557</guid>
				<category><![CDATA[Artificial Intelligence]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Fri, 28 Feb 2025 16:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Concerns over the ‘unpredictability’ of AI are widespread, but Industrial AI proves the value proposition of this tool, says Öykü Işık. This article explains how to build security into your strategy....]]></description>
				<content:encoded><![CDATA[Concerns over the ‘unpredictability’ of AI are widespread, but Industrial AI proves the value proposition of this tool, says Öykü Işık. This article explains how to build security into your strategy....]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/02/AdobeStock_490909213.jpeg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>We need more women in digital and cybersecurity. Here’s how we can attract them</title>
				<link>https://www.imd.org/ibyimd/diversity-inclusion/we-need-more-women-in-digital-and-cybersecurity-heres-how-we-can-attract-them/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fdiversity-inclusion%2Fwe-need-more-women-in-digital-and-cybersecurity-heres-how-we-can-attract-them%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=37738</guid>
				<category><![CDATA[Diversity, Equity, and Inclusion]]></category>
				<dc:creator>Öykü Işık</dc:creator>
				<pubDate>Thu, 13 Mar 2025 08:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Widespread bias and lack of inclusivity across the tech world deters women from pursuing careers in the sector. This is a significant business risk. Here are some practical actions every reader can...]]></description>
				<content:encoded><![CDATA[Widespread bias and lack of inclusivity across the tech world deters women from pursuing careers in the sector. This is a significant business risk. Here are some practical actions every reader can...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/03/women-in-digital-and-cybersecurity-2.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
		 
			
			
			<!-- Individual RSS item -->
			<item>
				<title>What do you know about cybersecurity risks when scaling industrial AI?</title>
				<link>https://www.imd.org/ibyimd/brain-circuits/brain-circuits-ai/what-do-you-know-about-cybersecurity-risks-when-scaling-industrial-ai/</link>
				<!-- Custom secure login link with redirect parameter -->
				<securelink>https://www.imd.org/wp-login.php?saml_sso&amp;redirect_to=ibyimd%2Fbrain-circuits%2Fbrain-circuits-ai%2Fwhat-do-you-know-about-cybersecurity-risks-when-scaling-industrial-ai%2F</securelink>
				<guid isPermaLink="false">https://www.imd.org/ibyimd/?p=40278</guid>
				<category><![CDATA[AI]]></category>
				<dc:creator>Buhle Luvuno</dc:creator>
				<pubDate>Wed, 14 May 2025 07:00:00 +0000</pubDate>
				<!-- Custom excerpt in both description and encoded content -->
				<description><![CDATA[Companies are rushing to embrace the game-changing opportunities to improve operations and scale that AI offers; yet many are unaware of the pitfalls. Test your knowledge of the risks here – and...]]></description>
				<content:encoded><![CDATA[Companies are rushing to embrace the game-changing opportunities to improve operations and scale that AI offers; yet many are unaware of the pitfalls. Test your knowledge of the risks here – and...]]></content:encoded>
				<!-- Media enclosure for featured image (Yahoo MRSS extension) -->
									<media:content xmlns:media="http://search.yahoo.com/mrss/" 
						medium="image" 
						type="image/jpeg" 
						url="https://www.imd.org/wp-content/uploads/2025/05/AdobeStock_13402636934-scaled.jpg" 
						width="198"
						height="283"
					></media:content>
								
							</item>
			</channel>
</rss>