<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Fri, 14 Nov 2025 18:34:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</title>
		<link>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles</link>
					<comments>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 18:34:47 +0000</pubDate>
				<category><![CDATA[Geek]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[framework]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1760</guid>

					<description><![CDATA[<p>— And why your SOC might actually need a Bard 🐉⚔️ Cybersecurity teams are often compared to armies, fire brigades, or special forces. Personally? I think they&#8217;re much closer to a party of heroes in a classic fantasy role-playing game. No matter how many frameworks, SIEMs, or AI tools we summon, defending a digital kingdom [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles">What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lessons from Sun Tzu’s &#8220;The Art of War&#8221; in Cybersecurity: Timeless Wisdom or Outdated Tactics?</title>
		<link>https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war</link>
					<comments>https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 29 Mar 2025 13:08:40 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[security strategy]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1742</guid>

					<description><![CDATA[<p>Introduction Sun Tzu’s &#34;The Art of War&#34; is a legendary strategic treatise written more than 2,500 years ago. Its enduring principles of warfare strategy have transcended military boundaries, influencing disciplines from business management to competitive sports. In today’s digital age, its relevance is increasingly apparent in the cybersecurity landscape, particularly for CISOs of medium-sized enterprises, [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war">Lessons from Sun Tzu’s &#8220;The Art of War&#8221; in Cybersecurity: Timeless Wisdom or Outdated Tactics?</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity</title>
		<link>https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases</link>
					<comments>https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 09 Feb 2025 18:52:45 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[Psychologie]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1510</guid>

					<description><![CDATA[<p>Why We Keep Losing Despite Stronger Security Controls Over the past three years, businesses have almost doubled their confidence in cybersecurity—rising from 32% in 2021 to 54% in 2024 (The Global Cost of Ransomware Study, 2025). Despite this, ransomware’s impact has only grown: 40% of affected companies suffered significant revenue losses, 58% experienced operational downtime, [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases">Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/ransomware-resilience-cognitive-biases/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Cyber Security 2025: Key Threats and Essential Strategies for Your Business</title>
		<link>https://jeanchristophvonoertzen.com/ai-cyber-security-2025</link>
					<comments>https://jeanchristophvonoertzen.com/ai-cyber-security-2025#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 07:05:05 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[OWASP]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1505</guid>

					<description><![CDATA[<p>Artificial Intelligence is transforming businesses and industries worldwide, but with this transformation comes unprecedented challenges. The recent launch of Cisco AI Defense, a specialized AI security solution, highlights the urgency of securing AI applications. According to Cisco, only 29% of enterprises feel fully prepared to detect and prevent unauthorized manipulations of AI systems. This low [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/ai-cyber-security-2025">AI Cyber Security 2025: Key Threats and Essential Strategies for Your Business</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/ai-cyber-security-2025/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SPQA: A Radical AI Architecture—and Why Security Must Adapt</title>
		<link>https://jeanchristophvonoertzen.com/spqa-a-radical-ai-architecture-and-why-security-must-adapt</link>
					<comments>https://jeanchristophvonoertzen.com/spqa-a-radical-ai-architecture-and-why-security-must-adapt#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 21 Dec 2024 18:00:04 +0000</pubDate>
				<category><![CDATA[Geek]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AI]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1486</guid>

					<description><![CDATA[<p>Introduction Until recently, many developers laughed at the notion that Artificial Intelligence might write their code someday. Yet code assistants like Cursor, Bolt.new, and Copilot—already adopted by 51% of enterprises [1]—show how swiftly AI is reshaping software development. At the same time, spending on generative AI skyrocketed from $2.3 billion in 2023 to $13.8 billion [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/spqa-a-radical-ai-architecture-and-why-security-must-adapt">SPQA: A Radical AI Architecture—and Why Security Must Adapt</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/spqa-a-radical-ai-architecture-and-why-security-must-adapt/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>European Cybersecurity Awareness Month: Key Takeaways for a Safer Digital Future</title>
		<link>https://jeanchristophvonoertzen.com/european-cybersecurity-awareness-month-key-takeaways-for-a-safer-digital-future</link>
					<comments>https://jeanchristophvonoertzen.com/european-cybersecurity-awareness-month-key-takeaways-for-a-safer-digital-future#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 02 Dec 2024 23:16:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[cybersecurity awareness month]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1482</guid>

					<description><![CDATA[<p>October is synonymous with the European Cybersecurity Awareness Month (ECSM), a time when cybersecurity professionals around the world unite to promote awareness and share valuable insights. Throughout this month, I shared a series of LinkedIn posts that highlighted various facets of cybersecurity, including password managers, multifactor authentication (MFA), the dangers of phishing, and the revolutionary [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/european-cybersecurity-awareness-month-key-takeaways-for-a-safer-digital-future">European Cybersecurity Awareness Month: Key Takeaways for a Safer Digital Future</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/european-cybersecurity-awareness-month-key-takeaways-for-a-safer-digital-future/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISSP Essentials: Why It’s Crucial Beyond IT and My Best Exam Prep Tips</title>
		<link>https://jeanchristophvonoertzen.com/cissp-essentials-why-its-crucial-beyond-it-and-my-best-exam-prep-tips</link>
					<comments>https://jeanchristophvonoertzen.com/cissp-essentials-why-its-crucial-beyond-it-and-my-best-exam-prep-tips#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 27 Jul 2024 16:42:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[CISSP]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[online exam]]></category>
		<category><![CDATA[tips]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1456</guid>

					<description><![CDATA[<p>What is the CISSP (for non-IT people)? Most people in my social circle aren&#8217;t involved in information security, nor are they in IT. So when I shared my achievement of passing the CISSP exam, they congratulated me, but I could see in their eyes that they were uncertain about how much of a celebration I [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/cissp-essentials-why-its-crucial-beyond-it-and-my-best-exam-prep-tips">CISSP Essentials: Why It’s Crucial Beyond IT and My Best Exam Prep Tips</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/cissp-essentials-why-its-crucial-beyond-it-and-my-best-exam-prep-tips/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; MailFail &#8211; Who&#8217;s Spoofing Your Email and How Are They Doing It?</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 27 Jun 2024 18:22:15 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[dkim]]></category>
		<category><![CDATA[dmarc]]></category>
		<category><![CDATA[spf]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1452</guid>

					<description><![CDATA[<p>My key takeaways SPF ensures that the SMTP FROM domain explicitly allows the connecting IP address. SPF does NOT ensure that the email address seen by the user is the one which was checked. the existance of SMTP FROM and the From field is a vulnarability: SPF checks SMTP FROM but most mail clients show [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it">Webinar takeaway &#8211; MailFail &#8211; Who&#8217;s Spoofing Your Email and How Are They Doing It?</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Boosting Cybersecurity in German SMEs with Gamification and Serious Play</title>
		<link>https://jeanchristophvonoertzen.com/boosting-cybersecurity-in-german-smes-with-gamification-and-serious-play</link>
					<comments>https://jeanchristophvonoertzen.com/boosting-cybersecurity-in-german-smes-with-gamification-and-serious-play#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 01 May 2024 13:14:14 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[gamification]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1409</guid>

					<description><![CDATA[<p>TL;DR Gamified cybersecurity training offers an engaging and effective way to improve security awareness and practices within German SMEs. The ALARM Information Security project demonstrates the success of integrating gamification into training, enhancing retention and understanding of cybersecurity principles. By leveraging customized game scenarios, regular workshops, and participatory feedback loops, SMEs can bolster their cybersecurity [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/boosting-cybersecurity-in-german-smes-with-gamification-and-serious-play">Boosting Cybersecurity in German SMEs with Gamification and Serious Play</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/boosting-cybersecurity-in-german-smes-with-gamification-and-serious-play/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Unlock Effective Cybersecurity: Simplify Policies with the Clarity of the OSI Model</title>
		<link>https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model</link>
					<comments>https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 18 Mar 2024 23:01:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[security policy]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1336</guid>

					<description><![CDATA[<p>TL;DR Diving into the essence of effective cybersecurity, this article shines a light on the transformative power of simplifying policy language, inspired by the OSI model&#8217;s structured communication layers. It goes beyond theoretical insights, offering actionable strategies for CISOs to demystify complex jargon and make cybersecurity policies accessible and engaging for every team member. Highlighting [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model">Unlock Effective Cybersecurity: Simplify Policies with the Clarity of the OSI Model</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
